Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
600000sqm_pdf.exe

Overview

General Information

Sample Name:600000sqm_pdf.exe
Analysis ID:635260
MD5:3e08fed24c7e27a75f6d9c52fc226376
SHA1:d00231c828b96ff0178ab59240e5ba53f7b0ce25
SHA256:10c1f9eb418d31fb36efefe032ccd9a8a057728cd757dca4e47ed124e9e8d791
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Initial sample is a PE file and has a suspicious name
C2 URLs / IPs found in malware configuration
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • 600000sqm_pdf.exe (PID: 6444 cmdline: "C:\Users\user\Desktop\600000sqm_pdf.exe" MD5: 3E08FED24C7E27A75F6D9C52FC226376)
    • oampomo.exe (PID: 6532 cmdline: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym MD5: 420F226DE2598C3A2DE1C56C9607055F)
      • oampomo.exe (PID: 6636 cmdline: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym MD5: 420F226DE2598C3A2DE1C56C9607055F)
  • cleanup
{"C2 list": ["www.theayushtrivedi.xyz/m1e8/"], "decoy": ["balanceforpaws.com", "landseamed.com", "drayseavci.com", "tattydaddystattoos.com", "fzkj-qtq.com", "garagedoorrepairwestcovina.com", "mixmarkt.site", "mark-ebook2store.com", "vermeer-mi.com", "shopspliced.com", "alrafidane.net", "themaisonmargiela.com", "suncasacentral-vsip.net", "creatcard-mine.site", "studiopounce.com", "hao685.com", "ipanemashoesaustralia.com", "51898dy.com", "nfttoknow.com", "multiple-player.com", "npbtechteam.com", "cyptocred.com", "pradsley-portfolio.site", "stangerenterprises.com", "swz9.com", "m3mofficespace.com", "projectyoka.com", "magazini-kristi.com", "fortunekey-vt.com", "joshlortiz9.net", "joincfn.com", "amazttt.com", "jjewelryun.com", "basecampsolarkit.com", "klausstilling.com", "mendce.online", "projectextinguish.com", "voyagedecor.com", "caliaboriginal.com", "shelfdb.club", "asianshemalestube.com", "bestimonials.com", "narroyo.space", "zzbzjx.com", "ilamatrix.com", "reviewmymedication.com", "acurademo.com", "tllechateau.com", "nun.finance", "99onlinesports-18.xyz", "visitqrcode.com", "for-policy-ingame.xyz", "kurui800.com", "manugryson.net", "bottomboitatz.com", "creaactivos.com", "culionerosx.com", "satknight.com", "agpglassco.com", "freshmeneve.com", "realjoboptionalfreedoms.com", "mid-puzzle.com", "asop-shop.com", "3dnkf.com"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    SourceRuleDescriptionAuthorStrings
    1.2.oampomo.exe.1360000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
      1.2.oampomo.exe.1360000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      1.2.oampomo.exe.1360000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x17a49:$sqlite3step: 68 34 1C 7B E1
      • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
      • 0x17a78:$sqlite3text: 68 38 2A 90 C5
      • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
      • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
      1.2.oampomo.exe.1360000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.oampomo.exe.1360000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        Click to see the 1 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.theayushtrivedi.xyz/m1e8/"], "decoy": ["balanceforpaws.com", "landseamed.com", "drayseavci.com", "tattydaddystattoos.com", "fzkj-qtq.com", "garagedoorrepairwestcovina.com", "mixmarkt.site", "mark-ebook2store.com", "vermeer-mi.com", "shopspliced.com", "alrafidane.net", "themaisonmargiela.com", "suncasacentral-vsip.net", "creatcard-mine.site", "studiopounce.com", "hao685.com", "ipanemashoesaustralia.com", "51898dy.com", "nfttoknow.com", "multiple-player.com", "npbtechteam.com", "cyptocred.com", "pradsley-portfolio.site", "stangerenterprises.com", "swz9.com", "m3mofficespace.com", "projectyoka.com", "magazini-kristi.com", "fortunekey-vt.com", "joshlortiz9.net", "joincfn.com", "amazttt.com", "jjewelryun.com", "basecampsolarkit.com", "klausstilling.com", "mendce.online", "projectextinguish.com", "voyagedecor.com", "caliaboriginal.com", "shelfdb.club", "asianshemalestube.com", "bestimonials.com", "narroyo.space", "zzbzjx.com", "ilamatrix.com", "reviewmymedication.com", "acurademo.com", "tllechateau.com", "nun.finance", "99onlinesports-18.xyz", "visitqrcode.com", "for-policy-ingame.xyz", "kurui800.com", "manugryson.net", "bottomboitatz.com", "creaactivos.com", "culionerosx.com", "satknight.com", "agpglassco.com", "freshmeneve.com", "realjoboptionalfreedoms.com", "mid-puzzle.com", "asop-shop.com", "3dnkf.com"]}
        Source: 600000sqm_pdf.exeReversingLabs: Detection: 24%
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: www.theayushtrivedi.xyz/m1e8/Avira URL Cloud: Label: phishing
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeReversingLabs: Detection: 34%
        Source: 1.2.oampomo.exe.1360000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
        Source: 600000sqm_pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: Binary string: C:\pjsyx\ecdmzv\soib\f8d22d90ac844b09bdb3de6c05ef8729\rjfwqq\mzlbtikj\Release\mzlbtikj.pdb source: 600000sqm_pdf.exe, 00000000.00000002.293681966.000000000040B000.00000004.00000001.01000000.00000003.sdmp, 600000sqm_pdf.exe, 00000000.00000002.294050571.00000000026EE000.00000004.00000800.00020000.00000000.sdmp, oampomo.exe, 00000001.00000000.258025111.000000000022B000.00000002.00000001.01000000.00000004.sdmp, oampomo.exe, 00000001.00000002.265372271.000000000022B000.00000002.00000001.01000000.00000004.sdmp, oampomo.exe, 00000002.00000000.263027610.000000000022B000.00000002.00000001.01000000.00000004.sdmp, oampomo.exe.0.dr, nsm7EC9.tmp.0.dr
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00405426 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00405D9C SetErrorMode,SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_004026A1 FindFirstFileA,

        Networking

        barindex
        Source: Malware configuration extractorURLs: www.theayushtrivedi.xyz/m1e8/
        Source: oampomo.exe, 00000001.00000002.265543322.00000000013DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00404FDD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: initial sampleStatic PE information: Filename: 600000sqm_pdf.exe
        Source: 600000sqm_pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 600000sqm_pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_004032FA EntryPoint,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_004047EE
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00406083
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0021521D
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00226880
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00226880
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0022959D
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0022496E
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0022959D
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00226DF2
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_002285D1
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0022959D
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_002167AA
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0021526B
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_002285D1
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00227364
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0022496E
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00DF0A25
        Source: 600000sqm_pdf.exeReversingLabs: Detection: 24%
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeFile read: C:\Users\user\Desktop\600000sqm_pdf.exeJump to behavior
        Source: 600000sqm_pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\600000sqm_pdf.exe "C:\Users\user\Desktop\600000sqm_pdf.exe"
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeProcess created: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeProcess created: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsm7EC8.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/4@0/0
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00402078 CoCreateInstance,MultiByteToWideChar,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00404333 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
        Source: Binary string: C:\pjsyx\ecdmzv\soib\f8d22d90ac844b09bdb3de6c05ef8729\rjfwqq\mzlbtikj\Release\mzlbtikj.pdb source: 600000sqm_pdf.exe, 00000000.00000002.293681966.000000000040B000.00000004.00000001.01000000.00000003.sdmp, 600000sqm_pdf.exe, 00000000.00000002.294050571.00000000026EE000.00000004.00000800.00020000.00000000.sdmp, oampomo.exe, 00000001.00000000.258025111.000000000022B000.00000002.00000001.01000000.00000004.sdmp, oampomo.exe, 00000001.00000002.265372271.000000000022B000.00000002.00000001.01000000.00000004.sdmp, oampomo.exe, 00000002.00000000.263027610.000000000022B000.00000002.00000001.01000000.00000004.sdmp, oampomo.exe.0.dr, nsm7EC9.tmp.0.dr
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0021F035 push ecx; ret
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00405DDA GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\oampomo.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0021521D RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00405426 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00405D9C SetErrorMode,SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_004026A1 FindFirstFileA,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0021E891 _memset,IsDebuggerPresent,
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00DF06F7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00DF061D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00DF03F8 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00DF0772 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00DF0736 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00224395 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
        Source: C:\Users\user\Desktop\600000sqm_pdf.exeCode function: 0_2_00405DDA GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0022538A __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_002214BB SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_002214EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeProcess created: C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_0021FE73 cpuid
        Source: C:\Users\user\AppData\Local\Temp\oampomo.exeCode function: 1_2_00220FE8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.oampomo.exe.1360000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts12
        Native API
        Path Interception11
        Process Injection
        11
        Process Injection
        1
        Input Capture
        1
        System Time Discovery
        Remote Services1
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Obfuscated Files or Information
        LSASS Memory13
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares1
        Clipboard Data
        Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS13
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        600000sqm_pdf.exe24%ReversingLabsWin32.Trojan.Injexa
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\oampomo.exe34%ReversingLabsWin32.Trojan.Jaik
        SourceDetectionScannerLabelLinkDownload
        1.2.oampomo.exe.1360000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        www.theayushtrivedi.xyz/m1e8/1%VirustotalBrowse
        www.theayushtrivedi.xyz/m1e8/100%Avira URL Cloudphishing
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        www.theayushtrivedi.xyz/m1e8/true
        • 1%, Virustotal, Browse
        • Avira URL Cloud: phishing
        low
        No contacted IP infos
        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:635260
        Start date and time: 27/05/202218:01:452022-05-27 18:01:45 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 1s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:600000sqm_pdf.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:26
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@5/4@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 94.9% (good quality ratio 89%)
        • Quality average: 78.3%
        • Quality standard deviation: 28.9%
        HCA Information:
        • Successful, ratio: 96%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Adjust boot time
        • Enable AMSI
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.223.24.244
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\600000sqm_pdf.exe
        File Type:data
        Category:dropped
        Size (bytes):4846
        Entropy (8bit):6.19128158947241
        Encrypted:false
        SSDEEP:96:2c4cTOkDU0x2rpbmSYIKxxVjGqRjkfDHy4vzvQRy8B3/dnD52+oG:2Ov8rpqTX5GqRjkrHVzvQg8dVnD52BG
        MD5:24F50F0F58C0C96C0CF910BA8ABF860E
        SHA1:D03E9B72D9ACA8220924C6FE42E53B2DC20521FE
        SHA-256:09D99B98DEAC1E6BF491CB455BADA50485D69719A1F5FCD6A8220D33FCB12943
        SHA-512:F766E4244246023A28A283C512E28D2B2CBDE238B9652530669F40CE422CC089D99A5F1C21F50C5ECB509FDD3600101282BAA2ED3BE4BEC4BA1D4DFF32956396
        Malicious:false
        Reputation:low
        Preview:......T3|3....|Z/..?Y....?Y...|Z'.8.....|Z+.......R.'......v..v.#......R.'......v..v........R.'......v.7v........R.'......v.?v.;|B....U...?....Fv..v..T..|...6v..v.3T..T..R.>..U.(.T.....R.=v...vZ+|./U......|.....Z...........7....?........z)..X.T.(X.v.+.|1../.....T....v./.Z......8.......|....TZ+..T./...6=...T3...?Y..'T..T.....T..T.T..T.>T.>.v.'v..T..T..T..v.T.'T..6=..W.%9@.....W...=..WY. @._.......=..W.d@........=...T3|3..?Y...8.'....R..v..|B'...T..9..T..v..T.'.v.'4.....z?..T..FU...6.v...v..#R..FU..>..v...v..#U.U...?.R....WY. @...........v.+4.R.........v.+|B+...|Z/.4.8./....T./6=...T3|3..?Y...8.'....R.?v..|B'...T..9..T..v..T.'.v.'4..F...z?.{u...T..FU...6.v..?v..;T..FU..>..v..?v..;T..FU....v..?v..;T...6U.....v..?v..;R..FU..>..v..?v..;U.U...?.R..?.W.%9@...........v.+|B....T..T..v.4.....................v.+|B+...|Z/.4.8./....T./6=...T3|3.8.'....R..v..|B'...T..9..T..v..T.'.v.'4......z?..T..FU...6.v...v...T..FU..>..v...v...U.U...?.R...W.d@..........v.+4........h..
        Process:C:\Users\user\Desktop\600000sqm_pdf.exe
        File Type:data
        Category:dropped
        Size (bytes):333039
        Entropy (8bit):7.539849969909107
        Encrypted:false
        SSDEEP:6144:ZRocEP2nYwkIbzFxoypqHZWU26zgYcg5v3zZWxvBvipvncWdJsSGw:zsP2n7keXoypeXdDcg5v3zIvccWnsS
        MD5:56919D917C91AA748752CF88F254CB38
        SHA1:1AC3EF9E10CC8E3BFDAD099533915F4D43B47131
        SHA-256:7B4782A70EB6A35F1EA9F6F3ABAE92F947C322461C9BADBD9DF3426DE4F044B9
        SHA-512:DCB34FFC5381F062AF614C51595928D10F6B0132AF3FD57ECECC09BEFBFC00B1CB4F288696785D1CA43581390DBFAB5D8A6D75C9BCB40E349B533A7EE1FF2C34
        Malicious:false
        Reputation:low
        Preview:........,...................:...........,...................................................................................................................................................................................................................................................B...................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\600000sqm_pdf.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):134144
        Entropy (8bit):6.412383509028528
        Encrypted:false
        SSDEEP:1536:NFTOG+x8+YaGDARvmJVBqNvnlajcCOO0LdXU8JiA1OynPl6zqjzswa+98qSIJnXR:efbnR6BqNvncvhwdYz2swteq4iG5sFv
        MD5:420F226DE2598C3A2DE1C56C9607055F
        SHA1:2328B1AFCBD3823CBD499A1508FD9506E85E3664
        SHA-256:85B26D2C71B2D64678749F5F1C338AC41D383F9CACE83471AA946D56ADD9ECA8
        SHA-512:C9CFBE723BDFB4933AD87F510304943D3979D1745153F8A26947C5A0A51FD442D513086C7CF76DD813343330E094C8123CFA172AD71AC2FBA861382C7A8315B3
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 34%
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........(.}c{.}c{.}c{./.{.}c{./.{.}c{./.{.}c{(.bz.}c{.}b{.}c{y.gz.}c{y..{.}c{y.az.}c{Rich.}c{........................PE..L...6..b..........................................@..........................`............@..........................................@.......................P..........T...............................@............................................text...5........................... ..`.rdata..>N.......P..................@..@.data....1..........................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\600000sqm_pdf.exe
        File Type:data
        Category:dropped
        Size (bytes):189439
        Entropy (8bit):7.990149083409857
        Encrypted:true
        SSDEEP:3072:pHYBv4lcDMXPbKnH40O7YkIbhxoQujgFxo0vQU+3TzU+fnWU26RbhgYcgOyfH3zq:eocEP2nYwkIbzFxoypqHZWU26zgYcg5m
        MD5:883E8E6E1970481CD91AE93A1A43A47B
        SHA1:F051F3955C4C37205160406E71E8E2A5BFC3F076
        SHA-256:3B31B72CBBA1FE88740655612674F220EEEE903CD4640FDB6858CFF7C10BBA55
        SHA-512:CA6CB93CB058F44821696674697982D13837031BB46D325102489164F335CCFA770ED812F9919A44699AECB5461A137D8A87BAD852C1A1FA5513A624F8DC0C64
        Malicious:false
        Reputation:low
        Preview:v..;..v[p..pv.07......o..........=.....t.9....1.U..u.q.@.G....y-Mw.t.....&.v...k2.K.AW..@(r..B...,T..?....mD"+..;",..[Qd.u....L.>O.........B.........K...}..og.^...."y....r.k.'...j.{...U#.+..z..T.....8<b...._e.k^.^..".+.B8....36..7...H...U....M.6.a.k..v[..w........"....wp..l....=.......9....1.E..u.q.@.G....Z.M.6.0...._.w{....j_sW..f........w.o...y..x.R..U.....[Qd.uS...M.=./)y#I....B8..*....<K^&W.....ze..O./hv.GX.r.k.'...Z.....U.#.+..}.o.>....8<b..b..4...k..XV.".+.B8.0"T36..7...H...U.Q....6.a.k..v[p.6......{."....wp.......=.....t.9....1.U..u.q.@.G....Z.M.6.0...._.w{....j_sW..f........w.o...y..x.R..U.....[Qd.uS...M.=./)y#I....B8..*....<K^&W.....ze..O./hv.GX.r.k.'...j.{...UT".+..}.o.....8<b..b..4...k^.X..".+.B8.0"T36..7...H...U.Q....6.a.k..v[p.6......{."....wp.......=.....t.9....1.U..u.q.@.G....Z.M.6.0...._.w{....j_sW..f........w.o...y..x.R..U.....[Qd.uS...M.=./)y#I....B8..*....<K^&W.....ze..O./hv.GX.r.k.'...j.{...UT".+..}.o.....8<b..b..4...k^.X..".+.B8.
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Entropy (8bit):7.137966707966572
        TrID:
        • Win32 Executable (generic) a (10002005/4) 92.16%
        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:600000sqm_pdf.exe
        File size:407658
        MD5:3e08fed24c7e27a75f6d9c52fc226376
        SHA1:d00231c828b96ff0178ab59240e5ba53f7b0ce25
        SHA256:10c1f9eb418d31fb36efefe032ccd9a8a057728cd757dca4e47ed124e9e8d791
        SHA512:6dc8596a94585f2ee7b83975bf93c370188e145c4fd1d7d5194454455ef5b9c2afaa9c97d86e923e1cf87f61e5e3d7dbdabd13487930454ae8b6086efa97cbd4
        SSDEEP:6144:10YOG0SkOr1KCHtyOBumZ1JP0iMiBrOMSO0r28Wp+9mlTC39cm2HO7rI:a9+gOYU1Nr+VrfW4JH2L
        TLSH:CF84E0E6E78148A5ED5207B588378C3A6293BE7EBC70A60E575E78716F733D3006250B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........qJ...$...$...$./.{...$...%.;.$.".y...$..3....$.f."...$.Rich..$.........................PE..L.....iF.................Z.........
        Icon Hash:f131617131042321
        Entrypoint:0x4032fa
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x4669CEB6 [Fri Jun 8 21:48:38 2007 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:55f3dfd13c0557d3e32bcbc604441dd3
        Instruction
        sub esp, 00000180h
        push ebx
        push ebp
        push esi
        xor ebx, ebx
        push edi
        mov dword ptr [esp+18h], ebx
        mov dword ptr [esp+10h], 00409170h
        xor esi, esi
        mov byte ptr [esp+14h], 00000020h
        call dword ptr [00407030h]
        push ebx
        call dword ptr [00407278h]
        mov dword ptr [00423FD4h], eax
        push ebx
        lea eax, dword ptr [esp+34h]
        push 00000160h
        push eax
        push ebx
        push 0041F4E8h
        call dword ptr [00407154h]
        push 0040922Ch
        push 00423720h
        call 00007F7FF12DC318h
        call dword ptr [004070B4h]
        mov edi, 00429000h
        push eax
        push edi
        call 00007F7FF12DC306h
        push ebx
        call dword ptr [00407108h]
        cmp byte ptr [00429000h], 00000022h
        mov dword ptr [00423F20h], eax
        mov eax, edi
        jne 00007F7FF12D9B7Ch
        mov byte ptr [esp+14h], 00000022h
        mov eax, 00429001h
        push dword ptr [esp+14h]
        push eax
        call 00007F7FF12DBDF9h
        push eax
        call dword ptr [00407218h]
        mov dword ptr [esp+1Ch], eax
        jmp 00007F7FF12D9BD5h
        cmp cl, 00000020h
        jne 00007F7FF12D9B78h
        inc eax
        cmp byte ptr [eax], 00000020h
        je 00007F7FF12D9B6Ch
        cmp byte ptr [eax], 00000022h
        mov byte ptr [esp+14h], 00000020h
        jne 00007F7FF12D9B78h
        inc eax
        mov byte ptr [esp+14h], 00000022h
        cmp byte ptr [eax], 0000002Fh
        jne 00007F7FF12D9BA5h
        inc eax
        cmp byte ptr [eax], 00000053h
        jne 00007F7FF12D9B80h
        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a00xb4.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x20118.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x70000x288.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x59ac0x5a00False0.668142361111data6.45807821776IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .rdata0x70000x117a0x1200False0.4453125data5.17513527374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x90000x1afd80x400False0.6015625data4.98110806401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x2c0000x201180x20200False0.325077517023data4.21955172329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x2c2800x468GLS_BINARY_LSB_FIRSTEnglishUnited States
        RT_ICON0x2c6e80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
        RT_ICON0x2d7900x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294901759, next used block 4294901503EnglishUnited States
        RT_ICON0x2fd380x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294967295, next used block 4294113788EnglishUnited States
        RT_ICON0x33f600x10828dataEnglishUnited States
        RT_ICON0x447880x74bePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
        RT_DIALOG0x4bc480x100dataEnglishUnited States
        RT_DIALOG0x4bd480x11cdataEnglishUnited States
        RT_DIALOG0x4be680x60dataEnglishUnited States
        RT_GROUP_ICON0x4bec80x5adataEnglishUnited States
        RT_MANIFEST0x4bf280x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
        DLLImport
        KERNEL32.dllSetFileTime, CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, CreateFileA, GetFileSize, GetModuleFileNameA, GetTickCount, GetCurrentProcess, CloseHandle, ExitProcess, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, SetErrorMode, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, CopyFileA
        USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, CreateDialogParamA, DestroyWindow, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
        GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
        SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
        ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
        ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Target ID:0
        Start time:18:02:55
        Start date:27/05/2022
        Path:C:\Users\user\Desktop\600000sqm_pdf.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\600000sqm_pdf.exe"
        Imagebase:0x400000
        File size:407658 bytes
        MD5 hash:3E08FED24C7E27A75F6D9C52FC226376
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Target ID:1
        Start time:18:02:58
        Start date:27/05/2022
        Path:C:\Users\user\AppData\Local\Temp\oampomo.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Imagebase:0x210000
        File size:134144 bytes
        MD5 hash:420F226DE2598C3A2DE1C56C9607055F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.265512226.0000000001360000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Antivirus matches:
        • Detection: 34%, ReversingLabs
        Reputation:low

        Target ID:2
        Start time:18:03:00
        Start date:27/05/2022
        Path:C:\Users\user\AppData\Local\Temp\oampomo.exe
        Wow64 process (32bit):
        Commandline:C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
        Imagebase:
        File size:134144 bytes
        MD5 hash:420F226DE2598C3A2DE1C56C9607055F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        No disassembly