Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ofAn3uUEPe.exe

Overview

General Information

Sample Name:ofAn3uUEPe.exe
Analysis ID:677968
MD5:db5723c9308cb986eae4262297a51fa0
SHA1:ee4130dcb4052dddcd66a5833b18661187a28f76
SHA256:2d2bdc891614f50e1574787d7728654c02c70eb829a04bd6411ef874f92aa1eb
Tags:ArkeiStealerexe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • ofAn3uUEPe.exe (PID: 4496 cmdline: "C:\Users\user\Desktop\ofAn3uUEPe.exe" MD5: DB5723C9308CB986EAE4262297A51FA0)
    • ofAn3uUEPe.exe (PID: 500 cmdline: "C:\Users\user\Desktop\ofAn3uUEPe.exe" MD5: DB5723C9308CB986EAE4262297A51FA0)
      • explorer.exe (PID: 3616 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • hbjebed (PID: 5008 cmdline: C:\Users\user\AppData\Roaming\hbjebed MD5: DB5723C9308CB986EAE4262297A51FA0)
    • hbjebed (PID: 4188 cmdline: C:\Users\user\AppData\Roaming\hbjebed MD5: DB5723C9308CB986EAE4262297A51FA0)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.349529334.0000000001F61000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.349396035.0000000000580000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000012.00000002.406226962.0000000000420000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000005.00000000.328538195.0000000002701000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000012.00000002.406410596.0000000001F51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            17.2.hbjebed.5515a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.ofAn3uUEPe.exe.6e15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                18.2.hbjebed.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  1.2.ofAn3uUEPe.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    No Sigma rule has matched
                    Timestamp:192.168.2.434.118.39.1049768802851815 08/03/22-10:18:21.517468
                    SID:2851815
                    Source Port:49768
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: ofAn3uUEPe.exeVirustotal: Detection: 34%Perma Link
                    Source: ofAn3uUEPe.exeReversingLabs: Detection: 47%
                    Source: http://host-host-file8.com/URL Reputation: Label: malware
                    Source: host-file-host6.comVirustotal: Detection: 25%Perma Link
                    Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                    Source: C:\Users\user\AppData\Roaming\hbjebedVirustotal: Detection: 34%Perma Link
                    Source: C:\Users\user\AppData\Roaming\hbjebedReversingLabs: Detection: 47%
                    Source: ofAn3uUEPe.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\hbjebedJoe Sandbox ML: detected
                    Source: 00000001.00000002.349396035.0000000000580000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                    Source: ofAn3uUEPe.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Binary string: +C:\xefuzucikeki\kujidurupij\pahikuy\venut_hipe.pdb0?D source: ofAn3uUEPe.exe, hbjebed.5.dr
                    Source: Binary string: C:\xefuzucikeki\kujidurupij\pahikuy\venut_hipe.pdb source: ofAn3uUEPe.exe, hbjebed.5.dr

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.4:49768 -> 34.118.39.10:80
                    Source: Malware configuration extractorURLs: http://host-file-host6.com/
                    Source: Malware configuration extractorURLs: http://host-host-file8.com/
                    Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://akycjr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: host-file-host6.com
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://akycjr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: host-file-host6.com
                    Source: unknownDNS traffic detected: queries for: host-file-host6.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 17.2.hbjebed.5515a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ofAn3uUEPe.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.hbjebed.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ofAn3uUEPe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.349529334.0000000001F61000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.349396035.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.406226962.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.328538195.0000000002701000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.406410596.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: ofAn3uUEPe.exe, 00000000.00000002.248826027.00000000007DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                    Source: ofAn3uUEPe.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00418170
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_004261B0
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00418F50
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: String function: 0040E300 appears 171 times
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: String function: 0040F610 appears 127 times
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 17_2_00550110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_00401834 Sleep,NtTerminateProcess,
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: ofAn3uUEPe.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: hbjebed.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                    Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\explorer.exeSection loaded: webio.dll
                    Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                    Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: ofAn3uUEPe.exeVirustotal: Detection: 34%
                    Source: ofAn3uUEPe.exeReversingLabs: Detection: 47%
                    Source: ofAn3uUEPe.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\ofAn3uUEPe.exe "C:\Users\user\Desktop\ofAn3uUEPe.exe"
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeProcess created: C:\Users\user\Desktop\ofAn3uUEPe.exe "C:\Users\user\Desktop\ofAn3uUEPe.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\hbjebed C:\Users\user\AppData\Roaming\hbjebed
                    Source: C:\Users\user\AppData\Roaming\hbjebedProcess created: C:\Users\user\AppData\Roaming\hbjebed C:\Users\user\AppData\Roaming\hbjebed
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeProcess created: C:\Users\user\Desktop\ofAn3uUEPe.exe "C:\Users\user\Desktop\ofAn3uUEPe.exe"
                    Source: C:\Users\user\AppData\Roaming\hbjebedProcess created: C:\Users\user\AppData\Roaming\hbjebed C:\Users\user\AppData\Roaming\hbjebed
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hbjebedJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00409A08 GetCursorInfo,CharUpperA,GetConsoleAliasesLengthW,GetDefaultCommConfigW,GetProfileSectionW,_puts,GetFileInformationByHandle,_realloc,_realloc,_realloc,_fseek,SetCalendarInfoA,GetBinaryTypeW,SetCurrentDirectoryA,BuildCommDCBAndTimeoutsW,CreateFileW,OpenJobObjectW,WriteConsoleOutputCharacterA,MapUserPhysicalPages,AddAtomA,GetThreadPriority,GetFullPathNameW,FindNextVolumeMountPointW,FillConsoleOutputCharacterA,EnumResourceNamesW,OpenWaitableTimerA,LocalSize,_hread,GetPrivateProfileStructW,GetComputerNameW,EnumDateFormatsExW,GetConsoleAliasesW,GetComputerNameW,GetConsoleTitleA,GetSystemWindowsDirectoryW,SetCalendarInfoW,GetFileAttributesA,HeapLock,lstrcpyW,LocalAlloc,GetConsoleFontSize,EnumDateFormatsW,ConvertThreadToFiber,InterlockedCompareExchange,VerifyVersionInfoA,FormatMessageA,GetCommState,FindResourceW,CreateMutexA,MoveFileA,LockFileEx,ResetEvent,FindNextFileW,lstrcmpW,GetTapeParameters,GlobalWire,GetComputerNameExW,CopyFileW,FileTimeToSystemTime,GetFileAttributesW,OpenMutexW,GetPrivateProfileSectionNamesW,EnumSystemLocalesA,GetComputerNameW,WriteConsoleA,GlobalGetAtomNameW,LoadLibraryA,SetConsoleWindowInfo,GetCPInfoExA,EnumResourceLanguagesA,TerminateProcess,TerminateProcess,GetDiskFreeSpaceExA,GetPrivateProfileStructW,GetConsoleAliasA,lstrcpyA,GetOEMCP,TerminateProcess,VirtualAlloc,GetComputerNameA,GetModuleHandleW,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00409717 GetComputerNameW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,VerifyVersionInfoW,SetLastError,DebugBreak,GetConsoleAliasExesLengthW,GetPrivateProfileIntA,GetLastError,GetSystemWow64DirectoryW,GetCPInfoExW,CreateMailslotA,GetStartupInfoW,InterlockedExchangeAdd,_hwrite,HeapFree,VerifyVersionInfoW,InterlockedIncrement,InterlockedIncrement,AddAtomA,WriteProfileSectionW,GetConsoleAliasesLengthW,GetSystemDefaultLangID,CreateNamedPipeW,LoadLibraryA,GetOverlappedResult,FindNextVolumeW,EnterCriticalSection,GetModuleHandleW,FormatMessageW,CreateActCtxA,CopyFileW,GetConsoleTitleW,VerifyVersionInfoW,InterlockedIncrement,InterlockedExchange,InterlockedIncrement,GetCommandLineW,SetLastError,MoveFileWithProgressW,VerifyVersionInfoA,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_007EB32B CreateToolhelp32Snapshot,Module32First,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00409495 BuildCommDCBAndTimeoutsA,SetCurrentDirectoryA,GetSystemDirectoryA,GetModuleHandleW,CallNamedPipeW,OpenEventA,GetComputerNameExW,GetConsoleTitleA,WriteConsoleInputA,WriteConsoleInputW,SizeofResource,TlsGetValue,FindNextVolumeMountPointW,lstrlenA,GlobalGetAtomNameA,GetDriveTypeW,GetProcessPriorityBoost,IsSystemResumeAutomatic,QueryDosDeviceW,VerifyVersionInfoA,GetProfileSectionW,LockFile,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCommand line argument: Risejigav
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCommand line argument: Bot
                    Source: ofAn3uUEPe.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: +C:\xefuzucikeki\kujidurupij\pahikuy\venut_hipe.pdb0?D source: ofAn3uUEPe.exe, hbjebed.5.dr
                    Source: Binary string: C:\xefuzucikeki\kujidurupij\pahikuy\venut_hipe.pdb source: ofAn3uUEPe.exe, hbjebed.5.dr
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0040AD78 push eax; ret
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_007F10CA pushad ; iretd
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_007EC23E push ebx; iretd
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_007EC229 push ebx; iretd
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 1_2_004011EB push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 17_2_00551977 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 17_2_00551970 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 17_2_0055198B push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 18_2_004011EB push ebx; iretd
                    Source: ofAn3uUEPe.exeStatic PE information: section name: .zuja
                    Source: ofAn3uUEPe.exeStatic PE information: section name: .miw
                    Source: ofAn3uUEPe.exeStatic PE information: section name: .kagivu
                    Source: hbjebed.5.drStatic PE information: section name: .zuja
                    Source: hbjebed.5.drStatic PE information: section name: .miw
                    Source: hbjebed.5.drStatic PE information: section name: .kagivu
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0040961A LoadLibraryA,GetProcAddress,VirtualProtect,
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hbjebedJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hbjebedJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\ofan3uuepe.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\hbjebed:Zone.Identifier read attributes | delete

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hbjebedKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hbjebedKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hbjebedKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hbjebedKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hbjebedKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\hbjebedKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Windows\explorer.exe TID: 1448Thread sleep count: 568 > 30
                    Source: C:\Windows\explorer.exe TID: 4640Thread sleep count: 286 > 30
                    Source: C:\Windows\explorer.exe TID: 1584Thread sleep count: 268 > 30
                    Source: C:\Windows\explorer.exe TID: 1992Thread sleep count: 402 > 30
                    Source: C:\Windows\explorer.exe TID: 4196Thread sleep count: 167 > 30
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 568
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 402
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeSystem information queried: ModuleInformation
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeAPI call chain: ExitProcess graph end node
                    Source: explorer.exe, 00000005.00000000.266115692.00000000051AC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                    Source: explorer.exe, 00000005.00000000.266275737.00000000051F7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}71USER
                    Source: explorer.exe, 00000005.00000000.273416392.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000005.00000000.273416392.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                    Source: explorer.exe, 00000005.00000000.302639231.0000000005EAB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000005.00000000.273416392.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000005.00000000.266275737.00000000051F7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: explorer.exe, 00000005.00000000.273416392.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                    Source: explorer.exe, 00000005.00000000.265903387.0000000005148000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                    Source: explorer.exe, 00000005.00000000.273416392.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00dRom0cY

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\AppData\Roaming\hbjebedSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00427880 IsDebuggerPresent,DebuggerProbe,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0041CE42 InterlockedIncrement,__itow_s,__invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,__strftime_l,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,__snwprintf_s,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,GetFileType,_wcslen,WriteConsoleW,GetLastError,__invoke_watson_if_oneof,_wcslen,WriteFile,WriteFile,OutputDebugStringW,__itow_s,__invoke_watson_if_error,___crtMessageWindowW,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0040961A LoadLibraryA,GetProcAddress,VirtualProtect,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_007EAC08 push dword ptr fs:[00000030h]
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 17_2_00550042 push dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\hbjebedProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0040DC00 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00415A50 SetUnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0040F680 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_0040E7A0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: hbjebed.5.drJump to dropped file
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Roaming\hbjebedSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\AppData\Roaming\hbjebedSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Roaming\hbjebedMemory written: C:\Users\user\AppData\Roaming\hbjebed base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\hbjebedCode function: 17_2_00550110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeThread created: C:\Windows\explorer.exe EIP: 2701930
                    Source: C:\Users\user\AppData\Roaming\hbjebedThread created: unknown EIP: 4771930
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeProcess created: C:\Users\user\Desktop\ofAn3uUEPe.exe "C:\Users\user\Desktop\ofAn3uUEPe.exe"
                    Source: C:\Users\user\AppData\Roaming\hbjebedProcess created: C:\Users\user\AppData\Roaming\hbjebed C:\Users\user\AppData\Roaming\hbjebed
                    Source: explorer.exe, 00000005.00000000.338134805.0000000005E60000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.268055732.0000000005610000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.302399610.0000000005E60000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000005.00000000.292131314.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.260747834.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.327282053.0000000000B50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000005.00000000.260747834.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.327282053.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.292696453.0000000000B50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager,
                    Source: explorer.exe, 00000005.00000000.260747834.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.327282053.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.292696453.0000000000B50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: GetCursorInfo,CharUpperA,GetConsoleAliasesLengthW,GetDefaultCommConfigW,GetProfileSectionW,_puts,GetFileInformationByHandle,_realloc,_realloc,_realloc,_fseek,SetCalendarInfoA,GetBinaryTypeW,SetCurrentDirectoryA,BuildCommDCBAndTimeoutsW,CreateFileW,OpenJobObjectW,WriteConsoleOutputCharacterA,MapUserPhysicalPages,AddAtomA,GetThreadPriority,GetFullPathNameW,FindNextVolumeMountPointW,FillConsoleOutputCharacterA,EnumResourceNamesW,OpenWaitableTimerA,LocalSize,_hread,GetPrivateProfileStructW,GetComputerNameW,EnumDateFormatsExW,GetConsoleAliasesW,GetComputerNameW,GetConsoleTitleA,GetSystemWindowsDirectoryW,SetCalendarInfoW,GetFileAttributesA,HeapLock,lstrcpyW,LocalAlloc,GetConsoleFontSize,EnumDateFormatsW,ConvertThreadToFiber,InterlockedCompareExchange,VerifyVersionInfoA,FormatMessageA,GetCommState,FindResourceW,CreateMutexA,MoveFileA,LockFileEx,ResetEvent,FindNextFileW,lstrcmpW,GetTapeParameters,GlobalWire,GetComputerNameExW,CopyFileW,FileTimeToSystemTime,GetFileAttributesW,OpenMutexW,GetPrivateProfileSectionNamesW,EnumSystemLocalesA,GetComputerNameW,WriteConsoleA,GlobalGetAtomNameW,LoadLibraryA,SetConsoleWindowInfo,GetCPInfoExA,EnumResourceLanguagesA,TerminateProcess,TerminateProcess,GetDiskFreeSpaceExA,GetPrivateProfileStructW,GetConsoleAliasA,lstrcpyA,GetOEMCP,TerminateProcess,VirtualAlloc,GetComputerNameA,GetModuleHandleW,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: GetLocaleInfoA,
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00409717 GetComputerNameW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,VerifyVersionInfoW,SetLastError,DebugBreak,GetConsoleAliasExesLengthW,GetPrivateProfileIntA,GetLastError,GetSystemWow64DirectoryW,GetCPInfoExW,CreateMailslotA,GetStartupInfoW,InterlockedExchangeAdd,_hwrite,HeapFree,VerifyVersionInfoW,InterlockedIncrement,InterlockedIncrement,AddAtomA,WriteProfileSectionW,GetConsoleAliasesLengthW,GetSystemDefaultLangID,CreateNamedPipeW,LoadLibraryA,GetOverlappedResult,FindNextVolumeW,EnterCriticalSection,GetModuleHandleW,FormatMessageW,CreateActCtxA,CopyFileW,GetConsoleTitleW,VerifyVersionInfoW,InterlockedIncrement,InterlockedExchange,InterlockedIncrement,GetCommandLineW,SetLastError,MoveFileWithProgressW,VerifyVersionInfoA,
                    Source: C:\Users\user\Desktop\ofAn3uUEPe.exeCode function: 0_2_00415A70 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 17.2.hbjebed.5515a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ofAn3uUEPe.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.hbjebed.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ofAn3uUEPe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.349529334.0000000001F61000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.349396035.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.406226962.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.328538195.0000000002701000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.406410596.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 17.2.hbjebed.5515a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ofAn3uUEPe.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.hbjebed.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ofAn3uUEPe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.349529334.0000000001F61000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.349396035.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.406226962.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.328538195.0000000002701000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.406410596.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts2
                    Command and Scripting Interpreter
                    1
                    DLL Side-Loading
                    513
                    Process Injection
                    11
                    Masquerading
                    1
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts2
                    Native API
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Virtualization/Sandbox Evasion
                    LSASS Memory331
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    Exfiltration Over Bluetooth2
                    Non-Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts1
                    Exploitation for Client Execution
                    Logon Script (Windows)Logon Script (Windows)513
                    Process Injection
                    Security Account Manager12
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                    Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Deobfuscate/Decode Files or Information
                    NTDS3
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Hidden Files and Directories
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Obfuscated Files or Information
                    Cached Domain Credentials15
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 677968 Sample: ofAn3uUEPe.exe Startdate: 03/08/2022 Architecture: WINDOWS Score: 100 30 Snort IDS alert for network traffic 2->30 32 Multi AV Scanner detection for domain / URL 2->32 34 Antivirus detection for URL or domain 2->34 36 4 other signatures 2->36 7 ofAn3uUEPe.exe 2->7         started        9 hbjebed 2->9         started        process3 signatures4 12 ofAn3uUEPe.exe 7->12         started        46 Multi AV Scanner detection for dropped file 9->46 48 Machine Learning detection for dropped file 9->48 50 Contains functionality to inject code into remote processes 9->50 52 Injects a PE file into a foreign processes 9->52 15 hbjebed 9->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 34.118.39.10, 49768, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\hbjebed, PE32 17->22 dropped 24 C:\Users\user\...\hbjebed:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ofAn3uUEPe.exe34%VirustotalBrowse
                    ofAn3uUEPe.exe48%ReversingLabsWin32.Ransomware.StopCrypt
                    ofAn3uUEPe.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\hbjebed100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\hbjebed34%VirustotalBrowse
                    C:\Users\user\AppData\Roaming\hbjebed48%ReversingLabsWin32.Ransomware.StopCrypt
                    SourceDetectionScannerLabelLinkDownload
                    1.0.ofAn3uUEPe.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    17.2.hbjebed.5515a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.ofAn3uUEPe.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    18.0.hbjebed.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    18.2.hbjebed.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.2.ofAn3uUEPe.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    18.0.hbjebed.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.ofAn3uUEPe.exe.6e15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.ofAn3uUEPe.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    18.0.hbjebed.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    dual-a-0001.dc-msedge.net0%VirustotalBrowse
                    host-file-host6.com25%VirustotalBrowse
                    host-host-file8.com22%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://host-file-host6.com/0%URL Reputationsafe
                    http://host-host-file8.com/100%URL Reputationmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    dual-a-0001.dc-msedge.net
                    131.253.33.200
                    truefalseunknown
                    host-file-host6.com
                    34.118.39.10
                    truetrueunknown
                    host-host-file8.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    34.118.39.10
                    host-file-host6.comUnited States
                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:677968
                    Start date and time: 03/08/202210:16:102022-08-03 10:16:10 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 33s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:ofAn3uUEPe.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:26
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@4/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 89.4% (good quality ratio 83.6%)
                    • Quality average: 74.9%
                    • Quality standard deviation: 30.7%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.242.101.226, 40.125.122.176, 20.54.89.106, 20.223.24.244
                    • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, www-www.bing.com.trafficmanager.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    10:18:21Task SchedulerRun new task: Firefox Default Browser Agent B473D81467D5CBC4 path: C:\Users\user\AppData\Roaming\hbjebed
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):347648
                    Entropy (8bit):6.380725935353117
                    Encrypted:false
                    SSDEEP:6144:ewzhZWcL1leWA6JDYyHVV7Vc7JW5VtSZJYnAGiL:dhB1oWjJD7HVV76Y57AT
                    MD5:DB5723C9308CB986EAE4262297A51FA0
                    SHA1:EE4130DCB4052DDDCD66A5833B18661187A28F76
                    SHA-256:2D2BDC891614F50E1574787D7728654C02C70EB829A04BD6411EF874F92AA1EB
                    SHA-512:8FF382910DF70309BB96A95A84FABB62AC1A6ADB1D66731DEC8BCC2992A528157A3D95DDC34A44C3A94FEDF7E00D4F39BED1BCC0492FD756F4D1546CE8486E7E
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Virustotal, Detection: 34%, Browse
                    • Antivirus: ReversingLabs, Detection: 48%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1..,1..,1..,/.R,&..,/.D,...,...,4..,1..,...,/.C,...,/.S,0..,/.V,0..,Rich1..,........PE..L...j..a................."..........`........@....@..........................0............................................... ..<.... ..............................0...............................h...@............................................text....!.......".................. ..`.data.......@.......&..............@....zuja................:..............@....miw.................>..............@....kagivu..............B..............@....rsrc........ .......D..............@..@........................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.380725935353117
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:ofAn3uUEPe.exe
                    File size:347648
                    MD5:db5723c9308cb986eae4262297a51fa0
                    SHA1:ee4130dcb4052dddcd66a5833b18661187a28f76
                    SHA256:2d2bdc891614f50e1574787d7728654c02c70eb829a04bd6411ef874f92aa1eb
                    SHA512:8ff382910df70309bb96a95a84fabb62ac1a6adb1d66731dec8bcc2992a528157a3d95ddc34a44c3a94fedf7e00d4f39bed1bcc0492fd756f4d1546ce8486e7e
                    SSDEEP:6144:ewzhZWcL1leWA6JDYyHVV7Vc7JW5VtSZJYnAGiL:dhB1oWjJD7HVV76Y57AT
                    TLSH:AA749D00B7A0D03DE5B311F4BA7A83A8B92D3DA1672544CF22D62AEE57346E0ED75317
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1..,1..,1..,/.R,&..,/.D,...,...,4..,1..,...,/.C,...,/.S,0..,/.V,0..,Rich1..,........PE..L...j..a.................".........
                    Icon Hash:aecaae9ecea62aa2
                    Entrypoint:0x40b360
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x61859A6A [Fri Nov 5 20:56:10 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:7e4b40ca154bd059f7d22ed12b0ce64d
                    Instruction
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    call 00007FD014D7011Bh
                    call 00007FD014D65A26h
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    push FFFFFFFEh
                    push 00431950h
                    push 0040EFF0h
                    mov eax, dword ptr fs:[00000000h]
                    push eax
                    add esp, FFFFFF94h
                    push ebx
                    push esi
                    push edi
                    mov eax, dword ptr [00444234h]
                    xor dword ptr [ebp-08h], eax
                    xor eax, ebp
                    push eax
                    lea eax, dword ptr [ebp-10h]
                    mov dword ptr fs:[00000000h], eax
                    mov dword ptr [ebp-18h], esp
                    mov dword ptr [ebp-70h], 00000000h
                    mov dword ptr [ebp-04h], 00000000h
                    lea eax, dword ptr [ebp-60h]
                    push eax
                    call dword ptr [004011F4h]
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    jmp 00007FD014D65A38h
                    mov eax, 00000001h
                    ret
                    mov esp, dword ptr [ebp-18h]
                    mov dword ptr [ebp-78h], 000000FFh
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    mov eax, dword ptr [ebp-78h]
                    jmp 00007FD014D65B68h
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    call 00007FD014D65BA4h
                    mov dword ptr [ebp-6Ch], eax
                    push 00000001h
                    call 00007FD014D713DAh
                    add esp, 04h
                    test eax, eax
                    jne 00007FD014D65A1Ch
                    push 0000001Ch
                    call 00007FD014D65B5Ch
                    add esp, 04h
                    call 00007FD014D6DEF4h
                    test eax, eax
                    jne 00007FD014D65A1Ch
                    push 00000010h
                    Programming Language:
                    • [ASM] VS2008 build 21022
                    • [ C ] VS2008 build 21022
                    • [IMP] VS2005 build 50727
                    • [C++] VS2008 build 21022
                    • [RES] VS2008 build 21022
                    • [LNK] VS2008 build 21022
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x320b40x3c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x108d0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x13300x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x8f680x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x2e0.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x321d20x32200False0.37546758104738154data5.761195119633815IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x340000x1a3e80x11400False0.9332540760869565data7.791068859484556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .zuja0x4f0000x4000x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .miw0x500000x4000x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .kagivu0x510000x960x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x520000x108d00x10a00False0.5499295112781954data5.488087902886926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x526300x6c8dataKoreanNorth Korea
                    RT_ICON0x526300x6c8dataKoreanSouth Korea
                    RT_ICON0x52cf80x568GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x52cf80x568GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x532600x10a8dataKoreanNorth Korea
                    RT_ICON0x532600x10a8dataKoreanSouth Korea
                    RT_ICON0x543080x988dBase III DBT, version number 0, next free block index 40KoreanNorth Korea
                    RT_ICON0x543080x988dBase III DBT, version number 0, next free block index 40KoreanSouth Korea
                    RT_ICON0x54c900x468GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x54c900x468GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x551480x8a8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanNorth Korea
                    RT_ICON0x551480x8a8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanSouth Korea
                    RT_ICON0x559f00x6c8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanNorth Korea
                    RT_ICON0x559f00x6c8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanSouth Korea
                    RT_ICON0x560b80x568GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x560b80x568GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x566200x10a8dataKoreanNorth Korea
                    RT_ICON0x566200x10a8dataKoreanSouth Korea
                    RT_ICON0x576c80x988dataKoreanNorth Korea
                    RT_ICON0x576c80x988dataKoreanSouth Korea
                    RT_ICON0x580500x468GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x580500x468GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x585180x25a8dataKoreanNorth Korea
                    RT_ICON0x585180x25a8dataKoreanSouth Korea
                    RT_ICON0x5aac00x10a8dataKoreanNorth Korea
                    RT_ICON0x5aac00x10a8dataKoreanSouth Korea
                    RT_ICON0x5bb900xea8dataKoreanNorth Korea
                    RT_ICON0x5bb900xea8dataKoreanSouth Korea
                    RT_ICON0x5ca380x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 8305227, next used block 8370799KoreanNorth Korea
                    RT_ICON0x5ca380x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 8305227, next used block 8370799KoreanSouth Korea
                    RT_ICON0x5d2e00x6c8dataKoreanNorth Korea
                    RT_ICON0x5d2e00x6c8dataKoreanSouth Korea
                    RT_ICON0x5d9a80x568GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x5d9a80x568GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x5df100x25a8dataKoreanNorth Korea
                    RT_ICON0x5df100x25a8dataKoreanSouth Korea
                    RT_ICON0x604b80x10a8dataKoreanNorth Korea
                    RT_ICON0x604b80x10a8dataKoreanSouth Korea
                    RT_ICON0x615600x988dataKoreanNorth Korea
                    RT_ICON0x615600x988dataKoreanSouth Korea
                    RT_ICON0x61ee80x468GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x61ee80x468GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_STRING0x625d80xacdataKoreanNorth Korea
                    RT_STRING0x625d80xacdataKoreanSouth Korea
                    RT_STRING0x626880x246dataKoreanNorth Korea
                    RT_STRING0x626880x246dataKoreanSouth Korea
                    RT_ACCELERATOR0x624380x60dataKoreanNorth Korea
                    RT_ACCELERATOR0x624380x60dataKoreanSouth Korea
                    RT_ACCELERATOR0x623c80x70dataKoreanNorth Korea
                    RT_ACCELERATOR0x623c80x70dataKoreanSouth Korea
                    RT_GROUP_ICON0x5bb680x22dataKoreanNorth Korea
                    RT_GROUP_ICON0x5bb680x22dataKoreanSouth Korea
                    RT_GROUP_ICON0x584b80x5adataKoreanNorth Korea
                    RT_GROUP_ICON0x584b80x5adataKoreanSouth Korea
                    RT_GROUP_ICON0x623500x76dataKoreanNorth Korea
                    RT_GROUP_ICON0x623500x76dataKoreanSouth Korea
                    RT_GROUP_ICON0x550f80x4cdataKoreanNorth Korea
                    RT_GROUP_ICON0x550f80x4cdataKoreanSouth Korea
                    RT_VERSION0x624980x13cdataKoreanNorth Korea
                    RT_VERSION0x624980x13cdataKoreanSouth Korea
                    DLLImport
                    KERNEL32.dllLocalSize, FindNextFileA, VerifyVersionInfoA, VerifyVersionInfoW, WriteConsoleInputW, EnumDateFormatsW, FindNextFileW, CopyFileExA, DnsHostnameToComputerNameW, ReadConsoleOutputCharacterW, SetConsoleActiveScreenBuffer, LockFile, GetProfileSectionW, QueryDosDeviceW, IsSystemResumeAutomatic, GetProcessPriorityBoost, GetDriveTypeW, GlobalGetAtomNameA, lstrlenA, FindNextVolumeMountPointW, TlsGetValue, SizeofResource, WriteConsoleInputA, GetConsoleTitleA, GetComputerNameExW, OpenEventA, CallNamedPipeW, GetModuleHandleW, GetSystemDirectoryA, SetCurrentDirectoryA, BuildCommDCBAndTimeoutsA, GetProcAddress, LoadLibraryA, MoveFileWithProgressW, GetCommandLineW, InterlockedExchange, GetConsoleTitleW, CopyFileW, CreateActCtxA, FormatMessageW, EnterCriticalSection, FindNextVolumeW, GetOverlappedResult, CreateNamedPipeW, GetSystemDefaultLangID, GetConsoleAliasesLengthW, WriteProfileSectionW, AddAtomA, InterlockedIncrement, HeapFree, _hwrite, InterlockedExchangeAdd, GetStartupInfoW, CreateMailslotA, GetCPInfoExW, GetSystemWow64DirectoryW, GetLastError, GetPrivateProfileIntA, GetConsoleAliasExesLengthW, DebugBreak, SetLastError, LoadLibraryW, GetComputerNameA, VirtualAlloc, GetOEMCP, lstrcpyA, GetConsoleAliasA, GetDiskFreeSpaceExA, TerminateProcess, EnumResourceLanguagesA, GetCPInfoExA, SetConsoleWindowInfo, GlobalGetAtomNameW, WriteConsoleA, EnumSystemLocalesA, GetPrivateProfileSectionNamesW, OpenMutexW, GetFileAttributesW, FileTimeToSystemTime, GlobalWire, GetTapeParameters, lstrcmpW, ResetEvent, LockFileEx, MoveFileA, CreateMutexA, FindResourceW, GetCommState, FormatMessageA, InterlockedCompareExchange, ConvertThreadToFiber, GetConsoleFontSize, LocalAlloc, lstrcpyW, HeapLock, GetFileAttributesA, SetCalendarInfoW, GetSystemWindowsDirectoryW, GetConsoleAliasesW, EnumDateFormatsExW, GetComputerNameW, GetPrivateProfileStructW, _hread, OpenWaitableTimerA, EnumResourceNamesW, FillConsoleOutputCharacterA, GetFullPathNameW, GetThreadPriority, MapUserPhysicalPages, WriteConsoleOutputCharacterA, OpenJobObjectW, CreateFileW, BuildCommDCBAndTimeoutsW, GetBinaryTypeW, SetCalendarInfoA, GetFileInformationByHandle, GetDefaultCommConfigW, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwind, GetCommandLineA, GetStartupInfoA, HeapValidate, IsBadReadPtr, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameW, GetCurrentProcess, IsDebuggerPresent, GetModuleHandleA, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, SetFilePointer, SetHandleCount, GetStdHandle, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, ExitProcess, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapDestroy, HeapCreate, VirtualFree, WriteFile, HeapAlloc, HeapSize, HeapReAlloc, GetACP, GetCPInfo, IsValidCodePage, FlushFileBuffers, GetConsoleCP, GetConsoleMode, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, InitializeCriticalSectionAndSpinCount, SetStdHandle, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleOutputCP, CloseHandle, CreateFileA
                    USER32.dllCharUpperA, GetCursorInfo
                    Language of compilation systemCountry where language is spokenMap
                    KoreanNorth Korea
                    KoreanSouth Korea
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.434.118.39.1049768802851815 08/03/22-10:18:21.517468TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184976880192.168.2.434.118.39.10
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2022 10:18:21.476331949 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:21.513225079 CEST804976834.118.39.10192.168.2.4
                    Aug 3, 2022 10:18:21.514849901 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:21.517467976 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:21.517509937 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:21.554637909 CEST804976834.118.39.10192.168.2.4
                    Aug 3, 2022 10:18:21.649977922 CEST804976834.118.39.10192.168.2.4
                    Aug 3, 2022 10:18:21.701522112 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:51.651237011 CEST804976834.118.39.10192.168.2.4
                    Aug 3, 2022 10:18:51.651437998 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:51.840192080 CEST4976880192.168.2.434.118.39.10
                    Aug 3, 2022 10:18:51.876586914 CEST804976834.118.39.10192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2022 10:18:21.366434097 CEST5607653192.168.2.48.8.8.8
                    Aug 3, 2022 10:18:21.473633051 CEST53560768.8.8.8192.168.2.4
                    Aug 3, 2022 10:18:21.669536114 CEST6075853192.168.2.48.8.8.8
                    Aug 3, 2022 10:18:22.717921019 CEST6075853192.168.2.48.8.8.8
                    Aug 3, 2022 10:18:23.764383078 CEST6075853192.168.2.48.8.8.8
                    Aug 3, 2022 10:18:25.720189095 CEST53607588.8.8.8192.168.2.4
                    Aug 3, 2022 10:18:26.768790007 CEST53607588.8.8.8192.168.2.4
                    Aug 3, 2022 10:18:27.795301914 CEST53607588.8.8.8192.168.2.4
                    TimestampSource IPDest IPChecksumCodeType
                    Aug 3, 2022 10:18:26.768888950 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
                    Aug 3, 2022 10:18:27.796173096 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Aug 3, 2022 10:18:21.366434097 CEST192.168.2.48.8.8.80x1545Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:21.669536114 CEST192.168.2.48.8.8.80x72d2Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:22.717921019 CEST192.168.2.48.8.8.80x72d2Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:23.764383078 CEST192.168.2.48.8.8.80x72d2Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 3, 2022 10:17:07.954627037 CEST8.8.8.8192.168.2.40x8fc3No error (0)www-bing-com.dual-a-0001.a-msedge.netdual-a-0001.dc-msedge.netCNAME (Canonical name)IN (0x0001)
                    Aug 3, 2022 10:17:07.954627037 CEST8.8.8.8192.168.2.40x8fc3No error (0)dual-a-0001.dc-msedge.net131.253.33.200A (IP address)IN (0x0001)
                    Aug 3, 2022 10:17:07.954627037 CEST8.8.8.8192.168.2.40x8fc3No error (0)dual-a-0001.dc-msedge.net13.107.22.200A (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:21.473633051 CEST8.8.8.8192.168.2.40x1545No error (0)host-file-host6.com34.118.39.10A (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:25.720189095 CEST8.8.8.8192.168.2.40x72d2Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:26.768790007 CEST8.8.8.8192.168.2.40x72d2Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 3, 2022 10:18:27.795301914 CEST8.8.8.8192.168.2.40x72d2Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • akycjr.com
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.44976834.118.39.1080C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Aug 3, 2022 10:18:21.517467976 CEST1235OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://akycjr.com/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 253
                    Host: host-file-host6.com
                    Aug 3, 2022 10:18:21.649977922 CEST1236INHTTP/1.1 200 OK
                    server: nginx/1.20.1
                    date: Wed, 03 Aug 2022 08:18:21 GMT
                    content-type: text/html; charset=UTF-8
                    transfer-encoding: chunked
                    Data Raw: 46 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: FYour IP blocked0


                    Click to jump to process

                    Target ID:0
                    Start time:10:17:15
                    Start date:03/08/2022
                    Path:C:\Users\user\Desktop\ofAn3uUEPe.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\ofAn3uUEPe.exe"
                    Imagebase:0x400000
                    File size:347648 bytes
                    MD5 hash:DB5723C9308CB986EAE4262297A51FA0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:10:17:17
                    Start date:03/08/2022
                    Path:C:\Users\user\Desktop\ofAn3uUEPe.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\ofAn3uUEPe.exe"
                    Imagebase:0x400000
                    File size:347648 bytes
                    MD5 hash:DB5723C9308CB986EAE4262297A51FA0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.349529334.0000000001F61000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.349396035.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:5
                    Start time:10:17:25
                    Start date:03/08/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff6f3b00000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.328538195.0000000002701000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:17
                    Start time:10:18:21
                    Start date:03/08/2022
                    Path:C:\Users\user\AppData\Roaming\hbjebed
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\hbjebed
                    Imagebase:0x400000
                    File size:347648 bytes
                    MD5 hash:DB5723C9308CB986EAE4262297A51FA0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 34%, Virustotal, Browse
                    • Detection: 48%, ReversingLabs
                    Reputation:low

                    Target ID:18
                    Start time:10:18:24
                    Start date:03/08/2022
                    Path:C:\Users\user\AppData\Roaming\hbjebed
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\hbjebed
                    Imagebase:0x400000
                    File size:347648 bytes
                    MD5 hash:DB5723C9308CB986EAE4262297A51FA0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000012.00000002.406226962.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000012.00000002.406410596.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    No disassembly