Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U00d6DEME FORMU.exe

Overview

General Information

Sample Name:#U00d6DEME FORMU.exe
Analysis ID:635282
MD5:0204546cc8568a60d97947c5fd6ccd49
SHA1:ff7c492dd728279cd763af6fa525606431fc8db0
SHA256:eddc1ee1fafda4fe7cf6d114276c992806f33d7527d346464bad7033875fbd66
Tags:exeFormbookgeoTUR
Infos:

Detection

FormBook
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
C2 URLs / IPs found in malware configuration
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • #U00d6DEME FORMU.exe (PID: 6304 cmdline: "C:\Users\user\Desktop\#U00d6DEME FORMU.exe" MD5: 0204546CC8568A60D97947C5FD6CCD49)
    • erltu.exe (PID: 6336 cmdline: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph MD5: 2603B527A791BAA25AC589C33B254470)
      • erltu.exe (PID: 6356 cmdline: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph MD5: 2603B527A791BAA25AC589C33B254470)
  • cleanup
{"C2 list": ["www.liuchenggang.com/b0y1/"], "decoy": ["newindexpress.com", "tg5szfdz.xyz", "aims1881.com", "bonaegroup.com", "be99caboi8.xyz", "weddingcentrepieces.com", "acigdmodel.com", "ketotax.info", "learnedware.com", "learning-rich-work.store", "multipreset.store", "flyttfirmaorebro.com", "58bilisim.xyz", "joseketofitdiet.site", "duomeishop.com", "programacaozerobarriga.site", "gygezau517.xyz", "awesometutorials.xyz", "hwvzfn3t.xyz", "nycexoticbullies.com", "smallbizmaker.com", "isarfeuer.com", "wacker-silicones.com", "tongtoto.com", "xofitessentials.com", "begep.space", "paperbackbookbox.com", "ihhsiljc.beauty", "jankarbaniye.com", "boli-12.xyz", "gridwriter.com", "377manhua.com", "willywaw98cop.com", "acumelet.com", "theupgradeexperiencemedia.com", "pimientamultimedia.com", "phoenixgold.xyz", "plunderdseign.com", "erdberrehausgsd.net", "aboutsprouts.com", "castle-clash.com", "nwcabin.com", "kurtizanki-spb.com", "yqphx.xyz", "casinowithout.com", "jctcopera.com", "antalyaluxuryvilla.xyz", "sagedidthis.com", "144z.xyz", "iska4peps.life", "rightthewrong.biz", "zib0bsivacf8.xyz", "beijingzhongruanchuangheng.site", "jylfxx.net", "newsletterexperience.com", "rnrprowash.com", "bylunakdy.com", "upasev.online", "businessreputationmanager.com", "kidsacooking.com", "brangusprimebeef.com", "nickhaven.com", "o1apopdpzhah.xyz", "negociodigital.store"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    SourceRuleDescriptionAuthorStrings
    1.2.erltu.exe.b40000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
      1.2.erltu.exe.b40000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      1.2.erltu.exe.b40000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x17a49:$sqlite3step: 68 34 1C 7B E1
      • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
      • 0x17a78:$sqlite3text: 68 38 2A 90 C5
      • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
      • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
      1.2.erltu.exe.b40000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.erltu.exe.b40000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        Click to see the 1 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.liuchenggang.com/b0y1/"], "decoy": ["newindexpress.com", "tg5szfdz.xyz", "aims1881.com", "bonaegroup.com", "be99caboi8.xyz", "weddingcentrepieces.com", "acigdmodel.com", "ketotax.info", "learnedware.com", "learning-rich-work.store", "multipreset.store", "flyttfirmaorebro.com", "58bilisim.xyz", "joseketofitdiet.site", "duomeishop.com", "programacaozerobarriga.site", "gygezau517.xyz", "awesometutorials.xyz", "hwvzfn3t.xyz", "nycexoticbullies.com", "smallbizmaker.com", "isarfeuer.com", "wacker-silicones.com", "tongtoto.com", "xofitessentials.com", "begep.space", "paperbackbookbox.com", "ihhsiljc.beauty", "jankarbaniye.com", "boli-12.xyz", "gridwriter.com", "377manhua.com", "willywaw98cop.com", "acumelet.com", "theupgradeexperiencemedia.com", "pimientamultimedia.com", "phoenixgold.xyz", "plunderdseign.com", "erdberrehausgsd.net", "aboutsprouts.com", "castle-clash.com", "nwcabin.com", "kurtizanki-spb.com", "yqphx.xyz", "casinowithout.com", "jctcopera.com", "antalyaluxuryvilla.xyz", "sagedidthis.com", "144z.xyz", "iska4peps.life", "rightthewrong.biz", "zib0bsivacf8.xyz", "beijingzhongruanchuangheng.site", "jylfxx.net", "newsletterexperience.com", "rnrprowash.com", "bylunakdy.com", "upasev.online", "businessreputationmanager.com", "kidsacooking.com", "brangusprimebeef.com", "nickhaven.com", "o1apopdpzhah.xyz", "negociodigital.store"]}
        Source: #U00d6DEME FORMU.exeVirustotal: Detection: 52%Perma Link
        Source: #U00d6DEME FORMU.exeReversingLabs: Detection: 36%
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: www.liuchenggang.com/b0y1/Avira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeVirustotal: Detection: 47%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeReversingLabs: Detection: 43%
        Source: 1.2.erltu.exe.b40000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
        Source: #U00d6DEME FORMU.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: Binary string: C:\ffsoc\ohboce\qvij\0902cf37fdf1425d9289d1e37d1cf733\cdrrer\lqscatwa\Release\lqscatwa.pdb source: #U00d6DEME FORMU.exe, 00000000.00000002.314547108.00000000026B3000.00000004.00000800.00020000.00000000.sdmp, #U00d6DEME FORMU.exe, 00000000.00000002.314271950.000000000040B000.00000004.00000001.01000000.00000003.sdmp, erltu.exe, 00000001.00000000.276075436.000000000102B000.00000002.00000001.01000000.00000004.sdmp, erltu.exe, 00000001.00000002.280816354.000000000102B000.00000002.00000001.01000000.00000004.sdmp, erltu.exe, 00000002.00000002.542844457.000000000102B000.00000002.00000001.01000000.00000004.sdmp, erltu.exe.0.dr, nsz96AE.tmp.0.dr
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00405426 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00405D9C SetErrorMode,SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_004026A1 FindFirstFileA,

        Networking

        barindex
        Source: Malware configuration extractorURLs: www.liuchenggang.com/b0y1/
        Source: #U00d6DEME FORMU.exe, 00000000.00000002.314392216.00000000006BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00404FDD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: #U00d6DEME FORMU.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_004032FA EntryPoint,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_004047EE
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00406083
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0102496E
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0102959D
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01026880
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_010285D1
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_010138EE
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01026DF2
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01026880
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01026880
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01027364
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0102496E
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_010167AE
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_007F0A2C
        Source: #U00d6DEME FORMU.exeVirustotal: Detection: 52%
        Source: #U00d6DEME FORMU.exeReversingLabs: Detection: 36%
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeFile read: C:\Users\user\Desktop\#U00d6DEME FORMU.exeJump to behavior
        Source: #U00d6DEME FORMU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\#U00d6DEME FORMU.exe "C:\Users\user\Desktop\#U00d6DEME FORMU.exe"
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeProcess created: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeProcess created: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeProcess created: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeProcess created: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeFile created: C:\Users\user\AppData\Local\Temp\nsz96AD.tmpJump to behavior
        Source: classification engineClassification label: mal96.troj.evad.winEXE@5/4@0/0
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00402078 CoCreateInstance,MultiByteToWideChar,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00404333 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
        Source: Binary string: C:\ffsoc\ohboce\qvij\0902cf37fdf1425d9289d1e37d1cf733\cdrrer\lqscatwa\Release\lqscatwa.pdb source: #U00d6DEME FORMU.exe, 00000000.00000002.314547108.00000000026B3000.00000004.00000800.00020000.00000000.sdmp, #U00d6DEME FORMU.exe, 00000000.00000002.314271950.000000000040B000.00000004.00000001.01000000.00000003.sdmp, erltu.exe, 00000001.00000000.276075436.000000000102B000.00000002.00000001.01000000.00000004.sdmp, erltu.exe, 00000001.00000002.280816354.000000000102B000.00000002.00000001.01000000.00000004.sdmp, erltu.exe, 00000002.00000002.542844457.000000000102B000.00000002.00000001.01000000.00000004.sdmp, erltu.exe.0.dr, nsz96AE.tmp.0.dr
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0101F035 push ecx; ret
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00405DDA GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeFile created: C:\Users\user\AppData\Local\Temp\erltu.exeJump to dropped file
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00405426 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00405D9C SetErrorMode,SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_004026A1 FindFirstFileA,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0102457B IsDebuggerPresent,
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_007F061D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_007F06F7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_007F0772 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_007F0736 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_007F03F8 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01024395 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
        Source: C:\Users\user\Desktop\#U00d6DEME FORMU.exeCode function: 0_2_00405DDA GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0102538A GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,SetEndOfFile,GetLastError,
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_010214BB SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_010214EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeProcess created: C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_0101FE73 cpuid
        Source: C:\Users\user\AppData\Local\Temp\erltu.exeCode function: 1_2_01020FE8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.erltu.exe.b40000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts12
        Native API
        Path Interception11
        Process Injection
        11
        Process Injection
        1
        Input Capture
        1
        System Time Discovery
        Remote Services1
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Obfuscated Files or Information
        LSASS Memory13
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares1
        Clipboard Data
        Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS13
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        #U00d6DEME FORMU.exe52%VirustotalBrowse
        #U00d6DEME FORMU.exe37%ReversingLabsWin32.Trojan.FormBook
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\erltu.exe48%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\erltu.exe44%ReversingLabsWin32.Trojan.FormBook
        SourceDetectionScannerLabelLinkDownload
        1.2.erltu.exe.b40000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        www.liuchenggang.com/b0y1/1%VirustotalBrowse
        www.liuchenggang.com/b0y1/100%Avira URL Cloudmalware
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        www.liuchenggang.com/b0y1/true
        • 1%, Virustotal, Browse
        • Avira URL Cloud: malware
        low
        No contacted IP infos
        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:635282
        Start date and time: 27/05/202218:22:582022-05-27 18:22:58 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 34s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:#U00d6DEME FORMU.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:26
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal96.troj.evad.winEXE@5/4@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 95.1% (good quality ratio 88.7%)
        • Quality average: 77.8%
        • Quality standard deviation: 29.6%
        HCA Information:
        • Successful, ratio: 95%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Adjust boot time
        • Enable AMSI
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\#U00d6DEME FORMU.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):134144
        Entropy (8bit):6.41218091663839
        Encrypted:false
        SSDEEP:1536:dYTOG+x8+YaGDARvmJVBqNvnlajcCOO0LdXU8JiA1Oyrx9WTqIDEJ+ksaSIJnXSU:JfbnR6BqNvncvhw9WTfEcLa4iG5skW
        MD5:2603B527A791BAA25AC589C33B254470
        SHA1:65EBDA93314517E098138BD9670ECCB345C7F662
        SHA-256:1AD07E46E78EB5A2AFC723FC2A8DF86D7B731A3CA853E4225622226EFC786F8F
        SHA-512:E5B3A208581A1B46382CC9D91D5C4FD3EE36DE741E57A1DB407F3A0B0602CC6678C7DBDCEB8DEE02614E1340FC7876DCD5088AB65DC74910A429CF21DAC6B579
        Malicious:true
        Antivirus:
        • Antivirus: Virustotal, Detection: 48%, Browse
        • Antivirus: ReversingLabs, Detection: 44%
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........(.}c{.}c{.}c{./.{.}c{./.{.}c{./.{.}c{(.bz.}c{.}b{.}c{y.gz.}c{y..{.}c{y.az.}c{Rich.}c{........................PE..L......b..........................................@..........................`............@..........................................@.......................P..........T...............................@............................................text...5........................... ..`.rdata..>N.......P..................@..@.data....1..........................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\#U00d6DEME FORMU.exe
        File Type:data
        Category:dropped
        Size (bytes):5310
        Entropy (8bit):6.093682530663886
        Encrypted:false
        SSDEEP:96:Wr9SaelkbOMBZUKzrCJEjZUFdPTzZoXeIPyHbODrnV/G8XhiOOAT/jOsu1p4w/k/:K9Sa3OEsoUXTzqbPRJSB1BRV0BDnR
        MD5:4E6A59FE3DCD5B83B64609193D85528E
        SHA1:1E0F857CD72F2984A09E821DCEA318CD2863B217
        SHA-256:7C5E9EC5245DE0AF358577C4E78B2F24B3810E626E2F29B178B638B04FB86860
        SHA-512:DFDE155F973F2B13174B6FB9A2238677D79F49BBE9BACFF6A0046BA79B8BE23A861E56C8F14F4587FA52DCC81CA38FAC142C287D19E3AB4B4FD46155D14C3AB2
        Malicious:false
        Reputation:low
        Preview:.....O..}.HMNA}_...A.^..?..A.^..?.}_...?.....}_...o..oX.?......s?.sO..o..oX.?.......s?.sO..o..oX.?.......s?.sO..o..oX.?...t...s?.sO.}7X.n"R.@e...?..s?.sO.?X}..-.s?.sG.?.G....-.RXC.?..O....s?.ANs_.}.R-.....}....%_..o.C.o.B.o.K@.o.KC.o.I.o...lXQ0...Q0sD.(}..o..o.KB.?...s?.._.......<......}...._.I.?.I......O...A.^..?..?....?.m(.?....GX...<..sO.s?..?...H.G.s..?..O.....P..i.:....P......P^..i.h....N......P...i.F....<......O..}...A.^..?.?.X....?.s?.}7..l..?.....?.Hs?..?.0s?....0.....l>.?..R.Ce..s<..sL...?.R.C...s<..sL..R.R.@e...<...P^..i...........s?....?..o..2...s?.}7..l.}_....?......?.....O..}.H.A.^..?.?......?.s?.}7..l..?.....?.Hs?..?.0s?..........|r....?..R.Ce..s<..sL...?..R.C...s<..sL...?X.R.C..s<..sL...?.-.R.Be..s<..sD...?.R.C...s<..sL..R.R.@e...<..P..i..........s?.}7..l..?.G.s....o..o..oX.o..o..#...s?.}7..l.}_....?......?.....O..}.T.?.X....?.s?.}7..l..?.....?.Hs?..?.0s?.........l>.?..R.Ce..s<..sL..?..R.C...s<..sL..R.R.@e...<..P...i.......$...s?....o..o....
        Process:C:\Users\user\Desktop\#U00d6DEME FORMU.exe
        File Type:data
        Category:dropped
        Size (bytes):189951
        Entropy (8bit):7.990465363694904
        Encrypted:true
        SSDEEP:3072:idfJQ4gfu2P+FGvM99Z1MG/ZtaEwV74jIFaRVIm53ZvUs1tFbdKKabXj2:idRku2SG4vlZtaqI8RWm53RUivBYXK
        MD5:D922F036AA538A949728682FE98BF835
        SHA1:A850EDF8BFA9EC5694F512062DAFB58929215DEE
        SHA-256:5B6B55B1FA6DEC84C11C4127725ED66FB32394D8C09BE7C3771B43E12C6BFBC3
        SHA-512:14C2188E46699A4268A157E2B8D1C40EFFC8B915916E479CE5C04900A1DBBB8E995561E63A5AEF162F986165EBD1CA7CF5A975488046A524C2498282DECB0A6B
        Malicious:false
        Reputation:low
        Preview:..k&..c.w..=.`....Zt..~O\\.Cw.C.4A.$g..-.uo.2t...a.4.4/.tSA..T....'#).`...e.._.#....n..9..!(;H#.%...3...E".4.!..XF......0..1.g..R.0.@..'.#.E...p7=r.m..r..H;17...+N=..xM..r.....R...$..K...Uo...{.........s.b..l..XX`d.3.pk(Ar.(.....)..voX..|B.{&V0x3....O..c....g..>F.f.t..."......F4A..$j..-.*o..t...a..4/.tSA'.T....I'...svN..*Z...I...!.].@......\T...j.uv./a>..}.t.O.....0....b...{....a.h...K7.........n.;.99.$...0R.OV.r.....R.....RK...cRo.).{.........s.b...[<.o`.L^.pk(Ar.(.>...)..vo9S....B..&V0g3.i.gO..c.w.ug..>F..et.l.".....C.4A.$g..-.uo.2t...a.4.4/.tSA'.T....I'...svN..*Z...I...!.].@......\T...j.uv./a>..}.t.O.....0....b...{....a.h...K7.........n.;.99.$...0R.OV.r.....R...$..K..!.Uo.U.{.........s.b...[<.o`dL^.pk(Ar.(.>...)..vo9S....B..&V0g3.i.gO..c.w.ug..>F..et.l.".....C.4A.$g..-.uo.2t...a.4.4/.tSA'.T....I'...svN..*Z...I...!.].@......\T...j.uv./a>..}.t.O.....0....b...{....a.h...K7.........n.;.99.$...0R.OV.r.....R...$..K..!.Uo.U.{.........s.b...[<.o`dL^.pk(Ar.(.
        Process:C:\Users\user\Desktop\#U00d6DEME FORMU.exe
        File Type:data
        Category:dropped
        Size (bytes):335245
        Entropy (8bit):7.531798748691562
        Encrypted:false
        SSDEEP:6144:HJPdRku2SG4vlZtaqI8RWm53RUivBYXpZpvncWMElGC:8WNSqHRWm53RdZYXp/cWMEl
        MD5:9D1B5193868454C6C8B9F0FEA6AA7C8E
        SHA1:02818918499AF004548E0C1F641AE9965F27AD13
        SHA-256:BFFEBF62D8473D23F0BA2001738071F94D53532D97D8D3A9B35CA272A8FBDFA5
        SHA-512:562776614426BC11294FC7DD8599AEE68FE14ACCA1F8DE671F3A33299A2225EE2735AA2BE3C569BC3EAB3733F4C34FB80187FCD4361DE844E41FABED250A58B5
        Malicious:false
        Reputation:low
        Preview:........,...................?...............................................................................................................................................................................................................................................................B...............*...j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Entropy (8bit):7.940379937299889
        TrID:
        • Win32 Executable (generic) a (10002005/4) 92.16%
        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:#U00d6DEME FORMU.exe
        File size:278482
        MD5:0204546cc8568a60d97947c5fd6ccd49
        SHA1:ff7c492dd728279cd763af6fa525606431fc8db0
        SHA256:eddc1ee1fafda4fe7cf6d114276c992806f33d7527d346464bad7033875fbd66
        SHA512:24fb62695c5455d362fbc157446a2cb2a7ae248268c0786cbd91a79a40fa32baa4f984cbbb45a6dd9f678f26cde7b6a7eb31cf1146f0fbaf17f060b58fa5d077
        SSDEEP:6144:B0YuB3ZgxdaCVG/RF5JUVu0dXet0ojX1nQcznQ:eB3AdaC8/RFYTQ0QDQ
        TLSH:FB441247B7F054F7D1729E3215A3E699F232A34619A191C71FB0AEB9B03E9C1048B74B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........qJ...$...$...$./.{...$...%.;.$.".y...$..3....$.f."...$.Rich..$.........................PE..L.....iF.................Z.........
        Icon Hash:b2a88c96b2ca6a72
        Entrypoint:0x4032fa
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x4669CEB6 [Fri Jun 8 21:48:38 2007 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:55f3dfd13c0557d3e32bcbc604441dd3
        Instruction
        sub esp, 00000180h
        push ebx
        push ebp
        push esi
        xor ebx, ebx
        push edi
        mov dword ptr [esp+18h], ebx
        mov dword ptr [esp+10h], 00409170h
        xor esi, esi
        mov byte ptr [esp+14h], 00000020h
        call dword ptr [00407030h]
        push ebx
        call dword ptr [00407278h]
        mov dword ptr [00423FD4h], eax
        push ebx
        lea eax, dword ptr [esp+34h]
        push 00000160h
        push eax
        push ebx
        push 0041F4E8h
        call dword ptr [00407154h]
        push 0040922Ch
        push 00423720h
        call 00007F2BD1003B38h
        call dword ptr [004070B4h]
        mov edi, 00429000h
        push eax
        push edi
        call 00007F2BD1003B26h
        push ebx
        call dword ptr [00407108h]
        cmp byte ptr [00429000h], 00000022h
        mov dword ptr [00423F20h], eax
        mov eax, edi
        jne 00007F2BD100139Ch
        mov byte ptr [esp+14h], 00000022h
        mov eax, 00429001h
        push dword ptr [esp+14h]
        push eax
        call 00007F2BD1003619h
        push eax
        call dword ptr [00407218h]
        mov dword ptr [esp+1Ch], eax
        jmp 00007F2BD10013F5h
        cmp cl, 00000020h
        jne 00007F2BD1001398h
        inc eax
        cmp byte ptr [eax], 00000020h
        je 00007F2BD100138Ch
        cmp byte ptr [eax], 00000022h
        mov byte ptr [esp+14h], 00000020h
        jne 00007F2BD1001398h
        inc eax
        mov byte ptr [esp+14h], 00000022h
        cmp byte ptr [eax], 0000002Fh
        jne 00007F2BD10013C5h
        inc eax
        cmp byte ptr [eax], 00000053h
        jne 00007F2BD10013A0h
        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a00xb4.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x900.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x70000x288.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x59ac0x5a00False0.668142361111data6.45807821776IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .rdata0x70000x117a0x1200False0.4453125data5.17513527374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x90000x1afd80x400False0.6015625data4.98110806401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x2c0000x9000xa00False0.409375data3.94448786242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x2c1900x2e8dataEnglishUnited States
        RT_DIALOG0x2c4780x100dataEnglishUnited States
        RT_DIALOG0x2c5780x11cdataEnglishUnited States
        RT_DIALOG0x2c6980x60dataEnglishUnited States
        RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
        RT_MANIFEST0x2c7100x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
        DLLImport
        KERNEL32.dllSetFileTime, CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, CreateFileA, GetFileSize, GetModuleFileNameA, GetTickCount, GetCurrentProcess, CloseHandle, ExitProcess, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, SetErrorMode, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, CopyFileA
        USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, CreateDialogParamA, DestroyWindow, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
        GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
        SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
        ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
        ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Target ID:0
        Start time:18:24:13
        Start date:27/05/2022
        Path:C:\Users\user\Desktop\#U00d6DEME FORMU.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\#U00d6DEME FORMU.exe"
        Imagebase:0x400000
        File size:278482 bytes
        MD5 hash:0204546CC8568A60D97947C5FD6CCD49
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Target ID:1
        Start time:18:24:15
        Start date:27/05/2022
        Path:C:\Users\user\AppData\Local\Temp\erltu.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Imagebase:0x1010000
        File size:134144 bytes
        MD5 hash:2603B527A791BAA25AC589C33B254470
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.280690320.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Antivirus matches:
        • Detection: 48%, Virustotal, Browse
        • Detection: 44%, ReversingLabs
        Reputation:low

        Target ID:2
        Start time:18:24:16
        Start date:27/05/2022
        Path:C:\Users\user\AppData\Local\Temp\erltu.exe
        Wow64 process (32bit):
        Commandline:C:\Users\user\AppData\Local\Temp\erltu.exe C:\Users\user\AppData\Local\Temp\fvcshciph
        Imagebase:
        File size:134144 bytes
        MD5 hash:2603B527A791BAA25AC589C33B254470
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        No disassembly