Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SHIPMENTDOCUMENTSPDF.exe

Overview

General Information

Sample Name:SHIPMENTDOCUMENTSPDF.exe
Analysis ID:598602
MD5:db995bcbc1b1ffe95cbde7f316b577bc
SHA1:95049e53f64a1b5050d697d88ccc8bf62d58e3f6
SHA256:bb95fa20a55260f729584b7932c7dba208dcc5b0a7597be447a72e481e0dcb09
Tags:exe
Infos:

Detection

AveMaria UACMe
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected UACMe UAC Bypass tool
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Yara detected AveMaria stealer
Initial sample is a PE file and has a suspicious name
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Found potential dummy code loops (likely to delay analysis)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Program does not show much activity (idle)
Abnormal high CPU Usage

Classification

  • System is w10x64
  • SHIPMENTDOCUMENTSPDF.exe (PID: 6796 cmdline: "C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe" MD5: DB995BCBC1B1FFE95CBDE7F316B577BC)
  • cleanup
{"C2 url": "goodies.dynamic-dns.net", "port": 5200}
SourceRuleDescriptionAuthorStrings
00000000.00000002.542027781.0000000000B7F000.00000002.00001000.00020000.00000000.sdmpCodoso_Gh0st_1Detects Codoso APT Gh0st MalwareFlorian Roth
  • 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
  • 0xdf0:$c1: Elevation:Administrator!new:
00000000.00000002.542027781.0000000000B7F000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
    00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmpCodoso_Gh0st_1Detects Codoso APT Gh0st MalwareFlorian Roth
    • 0x1972f:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
    • 0x1972f:$c1: Elevation:Administrator!new:
    00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
      00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
        • 0xd80:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpackCodoso_Gh0st_1Detects Codoso APT Gh0st MalwareFlorian Roth
        • 0xd80:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        • 0xd80:$c1: Elevation:Administrator!new:
        0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
          0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
          • 0x191f0:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
          0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpackCodoso_Gh0st_1Detects Codoso APT Gh0st MalwareFlorian Roth
          • 0x191f0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
          • 0x191f0:$c1: Elevation:Administrator!new:
          Click to see the 25 entries
          No Sigma rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: SHIPMENTDOCUMENTSPDF.exeAvira: detected
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpackMalware Configuration Extractor: AveMaria {"C2 url": "goodies.dynamic-dns.net", "port": 5200}
          Source: SHIPMENTDOCUMENTSPDF.exeVirustotal: Detection: 57%Perma Link
          Source: SHIPMENTDOCUMENTSPDF.exeMetadefender: Detection: 23%Perma Link
          Source: SHIPMENTDOCUMENTSPDF.exeReversingLabs: Detection: 61%
          Source: goodies.dynamic-dns.netAvira URL Cloud: Label: phishing
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpackAvira: Label: TR/Patched.Ren.Gen3
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpackAvira: Label: TR/Redcap.ghjpt

          Exploits

          barindex
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.542027781.0000000000B7F000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SHIPMENTDOCUMENTSPDF.exe PID: 6796, type: MEMORYSTR
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\W7H64\Desktop\VCSamples-master\VC2010Samples\ATL\OLEDB\Consumer\DynamicConsumer\licensing.pdb source: SHIPMENTDOCUMENTSPDF.exe

          Networking

          barindex
          Source: Malware configuration extractorURLs: goodies.dynamic-dns.net
          Source: SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
          Source: SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: GetRawInputData

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
          Source: initial sampleStatic PE information: Filename: SHIPMENTDOCUMENTSPDF.exe
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.29289af.3.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
          Source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000000.00000002.542027781.0000000000B7F000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeCode function: String function: 010D1DBB appears 36 times
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeCode function: String function: 010D1E1F appears 171 times
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeProcess Stats: CPU usage > 98%
          Source: SHIPMENTDOCUMENTSPDF.exeVirustotal: Detection: 57%
          Source: SHIPMENTDOCUMENTSPDF.exeMetadefender: Detection: 23%
          Source: SHIPMENTDOCUMENTSPDF.exeReversingLabs: Detection: 61%
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeFile read: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeJump to behavior
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeFile created: C:\Program Files\Microsoft DN1Jump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@1/0@0/0
          Source: SHIPMENTDOCUMENTSPDF.exeStatic file information: File size 2554880 > 1048576
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x165000
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Users\W7H64\Desktop\VCSamples-master\VC2010Samples\ATL\OLEDB\Consumer\DynamicConsumer\licensing.pdb source: SHIPMENTDOCUMENTSPDF.exe
          Source: SHIPMENTDOCUMENTSPDF.exeStatic PE information: section name: .00cfg

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
          Source: SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
          Source: SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
          Source: SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe TID: 7088Thread sleep count: 60 > 30
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exeProcess Stats: CPU usage > 85% for more than 60s
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SHIPMENTDOCUMENTSPDF.exe PID: 6796, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception2
          Masquerading
          11
          Input Capture
          1
          Security Software Discovery
          Remote Services11
          Input Capture
          Exfiltration Over Other Network Medium1
          Application Layer Protocol
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts111
          Virtualization/Sandbox Evasion
          LSASS Memory111
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Software Packing
          Security Account Manager2
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Deobfuscate/Decode Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Hidden Users
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SHIPMENTDOCUMENTSPDF.exe58%VirustotalBrowse
          SHIPMENTDOCUMENTSPDF.exe24%MetadefenderBrowse
          SHIPMENTDOCUMENTSPDF.exe62%ReversingLabsWin32.Trojan.AveMariaRat
          SHIPMENTDOCUMENTSPDF.exe100%AviraTR/AD.MortyStealer.vctqk
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          0.2.SHIPMENTDOCUMENTSPDF.exe.291053f.4.unpack100%AviraTR/Patched.Ren.Gen3Download File
          0.2.SHIPMENTDOCUMENTSPDF.exe.a30000.0.unpack100%AviraTR/Redcap.ghjptDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          goodies.dynamic-dns.net3%VirustotalBrowse
          goodies.dynamic-dns.net100%Avira URL Cloudphishing
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          goodies.dynamic-dns.nettrue
          • 3%, Virustotal, Browse
          • Avira URL Cloud: phishing
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://github.com/syohex/java-simple-mine-sweeperC:SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, SHIPMENTDOCUMENTSPDF.exe, 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmpfalse
            high
            No contacted IP infos
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:598602
            Start date and time:2022-03-28 18:28:20 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 22s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:SHIPMENTDOCUMENTSPDF.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:19
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.expl.evad.winEXE@1/0@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 100% (good quality ratio 97.6%)
            • Quality average: 71.9%
            • Quality standard deviation: 20.2%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.35.228.56
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, sls.update.microsoft.com, e1723.g.akamaiedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            No simulations
            No context
            No context
            No context
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):3.945070832085131
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:SHIPMENTDOCUMENTSPDF.exe
            File size:2554880
            MD5:db995bcbc1b1ffe95cbde7f316b577bc
            SHA1:95049e53f64a1b5050d697d88ccc8bf62d58e3f6
            SHA256:bb95fa20a55260f729584b7932c7dba208dcc5b0a7597be447a72e481e0dcb09
            SHA512:c09beeab2ab7c7b65d92547f1559409012a2b1f787b4d399d8c745bf16ed2178261c64ae089582123b0111a385ba6c7d698091fe4ce72ab8af1f17a40214f120
            SSDEEP:12288:3BEnRe1ljhm1xvNkPJziiPuumDNWnr3Q5WOVI6L4qj7neunRxHfk7D4pa7+oJb:+o1ld8r2JUNJ5WOVI6L7jr/
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M5h4.T.g.T.g.T.gf0.f.T.gf0.f.T.gf0.f.T.g.#.f.T.g.#.f.T.g.#.f:T.gf0.f.T.gf0.f.T.g.T.g.T.g.#.f.T.g.#.g.T.g.#.f.T.gRich.T.g.......
            Icon Hash:00828e8e8686b000
            Entrypoint:0x4010af
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
            DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x620E49BC [Thu Feb 17 13:12:28 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:05bdc6a6adf04eca38d0953caca5e0fa
            Instruction
            jmp 00007F12A0C903A1h
            jmp 00007F12A0D0E5CCh
            jmp 00007F12A0CE2B57h
            jmp 00007F12A0C911D2h
            jmp 00007F12A0D1813Dh
            jmp 00007F12A0C96598h
            jmp 00007F12A0C9C173h
            jmp 00007F12A0C734BEh
            jmp 00007F12A0C851F9h
            jmp 00007F12A0C84644h
            jmp 00007F12A0D15F2Fh
            jmp 00007F12A0C9779Ah
            jmp 00007F12A0CD1BE5h
            jmp 00007F12A0C90320h
            jmp 00007F12A0CB948Bh
            jmp 00007F12A0C83D06h
            jmp 00007F12A0CB4091h
            jmp 00007F12A0C7342Ch
            jmp 00007F12A0CBED57h
            jmp 00007F12A0CE8C5Eh
            jmp 00007F12A0CC7F3Dh
            jmp 00007F12A0CBE8E8h
            jmp 00007F12A0C941D3h
            jmp 00007F12A0C972AEh
            jmp 00007F12A0CC81C9h
            jmp 00007F12A0CD4A04h
            jmp 00007F12A0CE98BFh
            jmp 00007F12A0CD349Ah
            jmp 00007F12A0C93FB5h
            jmp 00007F12A0CD2530h
            jmp 00007F12A0C93FBBh
            jmp 00007F12A0CF6AF6h
            jmp 00007F12A0CB9231h
            jmp 00007F12A0C9432Ch
            jmp 00007F12A0C75AC7h
            jmp 00007F12A0C72E72h
            jmp 00007F12A0CB3A7Dh
            jmp 00007F12A0C8DC88h
            jmp 00007F12A0C97283h
            jmp 00007F12A0D13C9Eh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x26b43c0xc8.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x26f0000x43c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2700000x6004.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xfdeb00x38.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xfea0c0x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xfdee80x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x26b0000x43c.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xd1f140xd2000False0.273263113839data5.42725734583IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0xd30000x2e7dc0x2e800False0.167485719086data3.57125252786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x1020000x168e580x165000False0.111753490459data1.96106010749IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .idata0x26b0000x15f00x1600False0.334339488636data4.55588507155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .tls0x26d0000x3090x400False0.021484375data0.0111738187212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .00cfg0x26e0000x10e0x200False0.03515625data0.110557131259IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x26f0000x43c0x600False0.182291666667data2.14297088193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x2700000x7d110x7e00False0.57902405754data5.74904151788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_MANIFEST0x26f1700x17dXML 1.0 document textEnglishUnited States
            DLLImport
            KERNEL32.dllHeapFree, HeapSize, GetProcessHeap, InitializeCriticalSectionEx, DeleteCriticalSection, Sleep, VirtualAlloc, VirtualProtect, FindResourceExW, LoadResource, LockResource, SizeofResource, FindResourceW, MultiByteToWideChar, WideCharToMultiByte, FreeConsole, AcquireSRWLockExclusive, AssignProcessToJobObject, CloseHandle, CompareStringW, ConnectNamedPipe, CreateDirectoryW, CreateEventW, HeapReAlloc, GetProcessId, GetProcessTimes, GetQueuedCompletionStatus, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDefaultLCID, GetSystemDirectoryW, IsValidLocale, IsWow64Process, K32GetPerformanceInfo, K32GetProcessMemoryInfo, K32QueryWorkingSetEx, ReadConsoleW, ReadFile, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, SetStdHandle, HeapQueryInformation, SetEnvironmentVariableW, FreeEnvironmentStringsW, HeapAlloc, HeapDestroy, SetLastError, GetLastError, RaiseException, GetProcessHeaps, DecodePointer, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, SetConsoleCtrlHandler, WriteConsoleW, GetFileType, EnumSystemLocalesW, GetUserDefaultLCID, GetLocaleInfoW, CreateFileW, LCMapStringW, GetTimeFormatW, GetDateFormatW, GetCurrentThread, WriteFile, HeapValidate, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, IsDebuggerPresent, OutputDebugStringW, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, SetEvent, ResetEvent, WaitForSingleObjectEx, GetModuleHandleW, GetProcAddress, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetSystemInfo, VirtualQuery
            USER32.dllGetActiveWindow, SetProcessWindowStation, TranslateMessage, UnregisterClassW, SendMessageTimeoutW, MessageBoxW, SetProcessDPIAware, UnregisterClassA
            ADVAPI32.dllGetKernelObjectSecurity, GetAce, FreeSid, EventWrite, EventUnregister, GetLengthSid
            ole32.dllCoTaskMemRealloc, CoTaskMemFree, CoInitialize, CoUninitialize, CoCreateInstance
            OLEAUT32.dllSysAllocString, VariantCopy, SysAllocStringLen, SysFreeString, SafeArrayDestroy, VariantInit, VariantClear, VariantChangeType
            SHLWAPI.dllPathMatchSpecW
            USERENV.dllDestroyEnvironmentBlock, CreateEnvironmentBlock
            VERSION.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
            WINMM.dlltimeGetTime
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found
            No statistics
            Target ID:0
            Start time:20:29:35
            Start date:28/03/2022
            Path:C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe"
            Imagebase:0x10d0000
            File size:2554880 bytes
            MD5 hash:DB995BCBC1B1FFE95CBDE7F316B577BC
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 00000000.00000002.542027781.0000000000B7F000.00000002.00001000.00020000.00000000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.542027781.0000000000B7F000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.542642008.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.541978426.0000000000A44000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
            Reputation:low

            No disassembly