Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207 (renamed file extension from 17207 to exe)
Analysis ID:626424
MD5:14848f52302c15e27b26fee5fada11c1
SHA1:04d62d915bd1a81c4b5ed35df6edb953107398c8
SHA256:4ac982ea35522a13de30ff7ddbbec9becf2c7528a48f0aff377e3d6758a7ae7b
Tags:exe
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe (PID: 5944 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe" MD5: 14848F52302C15E27B26FEE5FADA11C1)
    • miylwnpd.exe (PID: 3908 cmdline: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl MD5: FF4C2F4D6E1FA34E8B958993C0DE134D)
      • miylwnpd.exe (PID: 1900 cmdline: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl MD5: FF4C2F4D6E1FA34E8B958993C0DE134D)
  • cleanup
{"C2 list": ["www.beamaster.info/p0ip/"], "decoy": ["webberkerr.com", "lelezhuanshu.xyz", "weedformellc.com", "ikzoekeenbedrijfsruimte.com", "swahlove.com", "dubaidesertsafari.travel", "atozmedicalimages.com", "uniytriox.com", "clickyourcat.com", "shandun-safety.com", "pakmart.center", "roxxiesixx.com", "twistedtaqueriachicago.com", "studynursingaustralia.online", "wellnesstestinggroup.com", "justusebias.com", "yqvzs.com", "co1l7o8vy.com", "lightning.legal", "cardamagescanner.com", "megawatchinc.com", "sadebademli.com", "bcoky.com", "unleashingyou-lifecoaching.com", "epsubtitles.online", "susanpetersonrealty.com", "gdderui.com", "claris-studio.cloud", "cryptomnis.com", "1ens.domains", "localbusinessassets.com", "et9n7e4vf.com", "quoteypants.com", "bokepremaja18.biz", "xiangqinmao.com", "lilot-pland45.site", "exilings.com", "nft-id.net", "sport-outdoorpacks.com", "plnykosik.online", "cidesadelcentro.com", "stunning-black.xyz", "zoeyunker.com", "videogamesgroup.com", "autodnstest.com", "bookworms.store", "69817269.com", "one-session22-lp.com", "modelofindia.com", "kennnyshands.com", "otopenishop.net", "freegameswithoutdownload.online", "alaskanwave.net", "tjkt8.com", "abv.wiki", "protoncarsale.com", "zhipurc.com", "psicologamoderna.com", "hidinginplainsight.digital", "cuamini-trankien.xyz", "yustunning.com", "apeironpay.xyz", "allowdrops.xyz", "allyouneedstore.xyz"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8f92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x16335:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15de1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x16437:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x165af:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x99aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1505c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa722:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18809:$sqlite3step: 68 34 1C 7B E1
    • 0x1891c:$sqlite3step: 68 34 1C 7B E1
    • 0x18838:$sqlite3text: 68 38 2A 90 C5
    • 0x1895d:$sqlite3text: 68 38 2A 90 C5
    • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
    SourceRuleDescriptionAuthorStrings
    1.2.miylwnpd.exe.2cb0000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
      1.2.miylwnpd.exe.2cb0000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x7e08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8192:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15535:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14fe1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15637:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x157af:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x8baa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1425c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9922:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1ab87:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1bc8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      1.2.miylwnpd.exe.2cb0000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x17a09:$sqlite3step: 68 34 1C 7B E1
      • 0x17b1c:$sqlite3step: 68 34 1C 7B E1
      • 0x17a38:$sqlite3text: 68 38 2A 90 C5
      • 0x17b5d:$sqlite3text: 68 38 2A 90 C5
      • 0x17a4b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x17b73:$sqlite3blob: 68 53 D8 7F 8C
      1.2.miylwnpd.exe.2cb0000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.miylwnpd.exe.2cb0000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8f92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x16335:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15de1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x16437:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x165af:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x99aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1505c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa722:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        Click to see the 1 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.beamaster.info/p0ip/"], "decoy": ["webberkerr.com", "lelezhuanshu.xyz", "weedformellc.com", "ikzoekeenbedrijfsruimte.com", "swahlove.com", "dubaidesertsafari.travel", "atozmedicalimages.com", "uniytriox.com", "clickyourcat.com", "shandun-safety.com", "pakmart.center", "roxxiesixx.com", "twistedtaqueriachicago.com", "studynursingaustralia.online", "wellnesstestinggroup.com", "justusebias.com", "yqvzs.com", "co1l7o8vy.com", "lightning.legal", "cardamagescanner.com", "megawatchinc.com", "sadebademli.com", "bcoky.com", "unleashingyou-lifecoaching.com", "epsubtitles.online", "susanpetersonrealty.com", "gdderui.com", "claris-studio.cloud", "cryptomnis.com", "1ens.domains", "localbusinessassets.com", "et9n7e4vf.com", "quoteypants.com", "bokepremaja18.biz", "xiangqinmao.com", "lilot-pland45.site", "exilings.com", "nft-id.net", "sport-outdoorpacks.com", "plnykosik.online", "cidesadelcentro.com", "stunning-black.xyz", "zoeyunker.com", "videogamesgroup.com", "autodnstest.com", "bookworms.store", "69817269.com", "one-session22-lp.com", "modelofindia.com", "kennnyshands.com", "otopenishop.net", "freegameswithoutdownload.online", "alaskanwave.net", "tjkt8.com", "abv.wiki", "protoncarsale.com", "zhipurc.com", "psicologamoderna.com", "hidinginplainsight.digital", "cuamini-trankien.xyz", "yustunning.com", "apeironpay.xyz", "allowdrops.xyz", "allyouneedstore.xyz"]}
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeVirustotal: Detection: 41%Perma Link
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeReversingLabs: Detection: 34%
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeVirustotal: Detection: 20%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeReversingLabs: Detection: 24%
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\sltck\alpfsb\pnlp\5a4eb681595f48a7816b70c325f39788\dfkzie\sffldbix\Release\sffldbix.pdb source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe, 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmp, miylwnpd.exe, 00000001.00000000.230322990.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000002.00000000.232221642.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, nsaF211.tmp.0.dr, miylwnpd.exe.0.dr
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_004069A4 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_0040290B FindFirstFileW,

        Networking

        barindex
        Source: Malware configuration extractorURLs: www.beamaster.info/p0ip/
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_0040580F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E1890
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E9C12
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E96A0
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E7E88
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002EC3BD
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002EA184
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002EB3F1
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeVirustotal: Detection: 41%
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeReversingLabs: Detection: 34%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeJump to behavior
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCommand line argument: ^F.
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile created: C:\Users\user\AppData\Local\Temp\nsaF210.tmpJump to behavior
        Source: classification engineClassification label: mal84.troj.winEXE@5/4@0/0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_004021AA CoCreateInstance,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00404ABB GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\sltck\alpfsb\pnlp\5a4eb681595f48a7816b70c325f39788\dfkzie\sffldbix\Release\sffldbix.pdb source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe, 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmp, miylwnpd.exe, 00000001.00000000.230322990.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000002.00000000.232221642.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, nsaF211.tmp.0.dr, miylwnpd.exe.0.dr
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E2445 push ecx; ret
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile created: C:\Users\user\AppData\Local\Temp\miylwnpd.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E1890 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_004069A4 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_0040290B FindFirstFileW,
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E7A95 IsDebuggerPresent,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E558A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E86ED __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E439B SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E43CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E3283 cpuid
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E3EC8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Command and Scripting Interpreter
        Path Interception1
        Access Token Manipulation
        1
        Access Token Manipulation
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default Accounts1
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        11
        Process Injection
        LSASS Memory13
        Security Software Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Exfiltration Over Bluetooth1
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Software Packing
        NTDS14
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe41%VirustotalBrowse
        SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe34%ReversingLabsWin32.Trojan.Nsisx
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\miylwnpd.exe20%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\miylwnpd.exe24%ReversingLabsWin32.Trojan.Midie
        SourceDetectionScannerLabelLinkDownload
        1.2.miylwnpd.exe.2cb0000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        www.beamaster.info/p0ip/0%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        www.beamaster.info/p0ip/true
        • Avira URL Cloud: safe
        low
        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exefalse
          high
          No contacted IP infos
          Joe Sandbox Version:34.0.0 Boulder Opal
          Analysis ID:626424
          Start date and time: 14/05/202200:37:342022-05-14 00:37:34 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 4m 54s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207 (renamed file extension from 17207 to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:22
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal84.troj.winEXE@5/4@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 99.8% (good quality ratio 94.3%)
          • Quality average: 83.4%
          • Quality standard deviation: 27.2%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 23.211.6.115
          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):80384
          Entropy (8bit):6.294028811173466
          Encrypted:false
          SSDEEP:1536:XsTaC+v1CUfr0oxAomP3cX/4pi2sWjcdjXI:ua5wUD1/ui5j4
          MD5:FF4C2F4D6E1FA34E8B958993C0DE134D
          SHA1:8E8DE477AD67E1B107396B8B9BE749363EF10640
          SHA-256:38DD484E87FBD4520A99EAD1FDC0010F45A3D5F8A22B1BBD01E3FCBD56104AB3
          SHA-512:D64482AB140944CF138E47914EFD3EE2362E0FE98D519A89EAE6D31E03E9C51BFCBB4D44BA634526F393613F0AD8C14971BA240DBF2560BC57FF1C3705967F36
          Malicious:true
          Antivirus:
          • Antivirus: Virustotal, Detection: 20%, Browse
          • Antivirus: ReversingLabs, Detection: 24%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w...w...w...%`..w...%^..w...%a.w......w...w..w..p....w..p.~..w..p....w..Rich.w..................PE..L.....~b............................7.............@.......................................@..................................$.......p..................................T...............................@............................................text...U........................... ..`.rdata...N.......P..................@..@.data... 1...0......................@....rsrc........p.......*..............@..@.reloc...............,..............@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:data
          Category:dropped
          Size (bytes):274424
          Entropy (8bit):7.537223383847658
          Encrypted:false
          SSDEEP:3072:5vonGilTM+lGDSQ7923iyT+7EqtxRuNfpzqk2POHpfA6zIya5wUD1/ui5j4:5von9M+0eQ79IoTtcC6fA6zmwQu
          MD5:0A075A0200A53ACFD831038EC6C896F1
          SHA1:07E7D01FA876F8A37EE6FE1FAA34BA6C97A8E402
          SHA-256:DF91BE25213DA8243E34DCCBE3017FD53F9F493DD516D9D55263501375BA4122
          SHA-512:F43698C1374F37CD9F2F64866E611A8F0E98CE0107094AD1AB2AE1158E9993DE5586B4F8A8869414805C80DC88E40B9791172D9CC8CAC36DC1E34DB03E5F8445
          Malicious:false
          Reputation:low
          Preview:.3......,...................h...T%.......2.......3..........................................................................................................................................................................................................................................G...................j...............................................................................................................................^.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:data
          Category:dropped
          Size (bytes):175615
          Entropy (8bit):7.990059953409327
          Encrypted:true
          SSDEEP:3072:2vonGilTM+lGDSQ7923iyT+7EqtxRuNfpzqk2POHpfA6zY:2von9M+0eQ79IoTtcC6fA6zY
          MD5:6EB3509F6E43EEA8950ADBC156A96248
          SHA1:019A49C79CFB4503F005BA4347FD5EBF8C99718E
          SHA-256:F203F8DB5CFD1E17D03DD57BA2766F15F2A189E80080089C673BED271C87CDB7
          SHA-512:95F99448679A60B2707DE05E3D348CFB4F6E4112E2780ED53CC6E540C7493A0169316EBEAF992274D4474B8F36FEA5357CD2794AD8AA77CC6FEC2C48CC892CD9
          Malicious:false
          Reputation:low
          Preview:...PH....[!...X............#....._=.Be...>.....i.`..n.......%.m.8..$./L.+..S..9.1.64.%....W5..,.?....Cj/..f.1}8.....)i..5B\.......i...Ym....V.32Ay.+8y.-.............].U.v..:...m.0.......E}.7j....q9......Y..G.}....Z..N.........{!........O.O.0.....a%|x....^H....x.".1".'q...<.....=.Xe...>......i.`..n........,....c...74..=rlp.....{.9..GZ.^.........HX.7Ab.%.V.)i..5B<..E...].....6..$........0...@...>..a,./_....n.M:f=.:.....0..S....E..7j...oq......h.OG.}....Z...../......{!W.......O.........a,|x....G..Z.x."..".5'q......._=.Be...>.....i.`..n........,....c...74..=rlp.....{.9..GZ.^.........HX.7Ab.%.V.)i..5B<..E...].....6..$........0...@...>..a,./_....n.U.v..:...P.0."S....E}.7j...oq.........G.}....Z...../......{!W.......O.........a,|x....G..Z.x."..".5'q......._=.Be...>.....i.`..n........,....c...74..=rlp.....{.9..GZ.^.........HX.7Ab.%.V.)i..5B<..E...].....6..$........0...@...>..a,./_....n.U.v..:...P.0."S....E}.7j...oq.........G.}....Z...../..
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:data
          Category:dropped
          Size (bytes):5171
          Entropy (8bit):6.118274194888097
          Encrypted:false
          SSDEEP:96:BXrtcxDxcjguWPxAcgUAyF1DQHWF3yW5SSn/MLmyJo3XFWDNbxUuyFxFV04mxkzq:2WguW5TAquH8cSn/MLmyJo3XFWZAFnRw
          MD5:ACB8234D1D848397EC3B1EB59A25AC91
          SHA1:7D17F048DDC6D19A40898B6079D36E0E1BDAB195
          SHA-256:942BD175D04B7C5567EB7F3EABC39866736B8922C68539D16DA9A32A839B5820
          SHA-512:601CA88B29149B9DDADECF29BBBBAAE1B626B84AE8C7BD580EB7BDF64FB3CDC9CD20563EFAEA229640194CE27684024EA62C8DE148E81CC045C40E9AFCB77459
          Malicious:false
          Reputation:low
          Preview:..%...........].".M."..m".M."...u.J.qE.....Y.r.!r....u..v.....U..Qr.!r....u..k.....=..9r.!r....u..<.....e..ar.!r....u........M..I.....7.%..M...!...m..i.......d.......q..L.?...Z\....q..O..q....Y.i].........)(fF.qr.U.r.=.r.e..r.M..r.m.r...[....!Z...Y-....]r.U...%"(..]..q.....J.).......) f..Y...]...dO!.....".M."..u..%..6.!.-..%.......L..L...u..q..%....%....u..qdO!...wK..........O....rR..........O%.. ...........O%.....E".M."..J.u......U..q..u.....qK....q..q..u..u.i..(...M...%..%..d... U.. Q...%.Ll... U.. Q...%..M...(U...rR.f.....?prr..Y."..r.%..rrr..Y..Y.....]...J.]......]dO.......".M."..J.uE.....M..q..u.....qK....q..q..u..u.i......M".......%..%..d... M.. I..!..%.Ll... M.. I.....%.<l.. M.. I....d.%..?....M...I...%.Ll... M.. I.(.%..M...(M...wK.o......qrr..Y.....%........r..r..r..r.!r.%.4srr..Y..Y.....]...J.]......]dO.......J.u......i..q..u.....qK....q..q..u..u.i......M...%..%..d... i.. ...!..%.Ll... i.. ....%..M...(i.. ..H.....Aqrr..Y.#r.!r.%..pr
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.333983439825163
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File size:428316
          MD5:14848f52302c15e27b26fee5fada11c1
          SHA1:04d62d915bd1a81c4b5ed35df6edb953107398c8
          SHA256:4ac982ea35522a13de30ff7ddbbec9becf2c7528a48f0aff377e3d6758a7ae7b
          SHA512:aee08da4569bc969db4c086cb89950e311aaab9bf94677d9ba532b256ed5a29cc5942d48ca7c58ec8bee095d8e84b1f91935d61a9c601e1f9950c93a4ddd99c3
          SSDEEP:6144:eOtIldxqG7hiusCwlvcyHQOEYf5iTQuuAxjNnmJvLtVeV+hLk7:eORQiuqEyHH1GtNnmFBi+lg
          TLSH:B694E092D5C041A5EC794B34B53B1D3A16A7FFB9BCF9EA8E864D71312B732C2401B942
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....Oa.................h....:....
          Icon Hash:81090f232b232380
          Entrypoint:0x403646
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x614F9AA9 [Sat Sep 25 21:54:49 2021 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:61259b55b8912888e90f516ca08dc514
          Instruction
          push ebp
          mov ebp, esp
          sub esp, 000003F4h
          push ebx
          push esi
          push edi
          push 00000020h
          pop edi
          xor ebx, ebx
          push 00008001h
          mov dword ptr [ebp-14h], ebx
          mov dword ptr [ebp-04h], 0040A230h
          mov dword ptr [ebp-10h], ebx
          call dword ptr [004080C8h]
          mov esi, dword ptr [004080CCh]
          lea eax, dword ptr [ebp-00000140h]
          push eax
          mov dword ptr [ebp-0000012Ch], ebx
          mov dword ptr [ebp-2Ch], ebx
          mov dword ptr [ebp-28h], ebx
          mov dword ptr [ebp-00000140h], 0000011Ch
          call esi
          test eax, eax
          jne 00007F16FCE2A37Ah
          lea eax, dword ptr [ebp-00000140h]
          mov dword ptr [ebp-00000140h], 00000114h
          push eax
          call esi
          mov ax, word ptr [ebp-0000012Ch]
          mov ecx, dword ptr [ebp-00000112h]
          sub ax, 00000053h
          add ecx, FFFFFFD0h
          neg ax
          sbb eax, eax
          mov byte ptr [ebp-26h], 00000004h
          not eax
          and eax, ecx
          mov word ptr [ebp-2Ch], ax
          cmp dword ptr [ebp-0000013Ch], 0Ah
          jnc 00007F16FCE2A34Ah
          and word ptr [ebp-00000132h], 0000h
          mov eax, dword ptr [ebp-00000134h]
          movzx ecx, byte ptr [ebp-00000138h]
          mov dword ptr [007A8B58h], eax
          xor eax, eax
          mov ah, byte ptr [ebp-0000013Ch]
          movzx eax, ax
          or eax, ecx
          xor ecx, ecx
          mov ch, byte ptr [ebp-2Ch]
          movzx ecx, cx
          shl eax, 10h
          or eax, ecx
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b90000x28ee8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x67c40x6800False0.675180288462data6.49518266675IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xa0000x39ebb80x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          .ndata0x3a90000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x3b90000x28ee80x29000False0.555979658918data5.77947429109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_ICON0x3b92800x10828dataEnglishUnited States
          RT_ICON0x3c9aa80x1013cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
          RT_ICON0x3d9be80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294901499, next used block 4294901499EnglishUnited States
          RT_ICON0x3dde100x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294901501, next used block 4294901757EnglishUnited States
          RT_ICON0x3e03b80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294967294, next used block 4294967294EnglishUnited States
          RT_ICON0x3e14600x468GLS_BINARY_LSB_FIRSTEnglishUnited States
          RT_DIALOG0x3e18c80x100dataEnglishUnited States
          RT_DIALOG0x3e19c80x11cdataEnglishUnited States
          RT_DIALOG0x3e1ae80x60dataEnglishUnited States
          RT_GROUP_ICON0x3e1b480x5adataEnglishUnited States
          RT_MANIFEST0x3e1ba80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
          DLLImport
          ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
          SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
          USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Target ID:0
          Start time:00:38:34
          Start date:14/05/2022
          Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe"
          Imagebase:0x400000
          File size:428316 bytes
          MD5 hash:14848F52302C15E27B26FEE5FADA11C1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          Target ID:1
          Start time:00:38:36
          Start date:14/05/2022
          Path:C:\Users\user\AppData\Local\Temp\miylwnpd.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
          Imagebase:0x2e0000
          File size:80384 bytes
          MD5 hash:FF4C2F4D6E1FA34E8B958993C0DE134D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Antivirus matches:
          • Detection: 20%, Virustotal, Browse
          • Detection: 24%, ReversingLabs
          Reputation:low

          Target ID:2
          Start time:00:38:37
          Start date:14/05/2022
          Path:C:\Users\user\AppData\Local\Temp\miylwnpd.exe
          Wow64 process (32bit):
          Commandline:C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
          Imagebase:
          File size:80384 bytes
          MD5 hash:FF4C2F4D6E1FA34E8B958993C0DE134D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          No disassembly