Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CraHZCrkGP.exe

Overview

General Information

Sample Name:CraHZCrkGP.exe
Analysis ID:678052
MD5:a8ef2558341a5ca8ac58ee543e260ee4
SHA1:5585cc5f17f424639dae06d6feba403c78232f6a
SHA256:19e29cc8b874c3dd5fa4b724fb6d5d51db0b7c2fd4e954bb7b1dda228b2225fb
Tags:ArkeiStealerexe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Maps a DLL or memory area into another process
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Contains functionality to call native functions
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • CraHZCrkGP.exe (PID: 980 cmdline: "C:\Users\user\Desktop\CraHZCrkGP.exe" MD5: A8EF2558341A5CA8AC58EE543E260EE4)
    • CraHZCrkGP.exe (PID: 5728 cmdline: "C:\Users\user\Desktop\CraHZCrkGP.exe" MD5: A8EF2558341A5CA8AC58EE543E260EE4)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • drsdbad (PID: 1252 cmdline: C:\Users\user\AppData\Roaming\drsdbad MD5: A8EF2558341A5CA8AC58EE543E260EE4)
    • drsdbad (PID: 4412 cmdline: C:\Users\user\AppData\Roaming\drsdbad MD5: A8EF2558341A5CA8AC58EE543E260EE4)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000005.00000000.292819935.0000000002631000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000015.00000002.374142486.00000000005A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.314917602.00000000004A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000015.00000002.374095976.0000000000580000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000001.00000002.315051537.00000000004D1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            21.2.drsdbad.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              20.2.drsdbad.25a15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                1.2.CraHZCrkGP.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  0.2.CraHZCrkGP.exe.26115a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://host-host-file8.com/URL Reputation: Label: malware
                    Source: host-file-host6.comVirustotal: Detection: 25%Perma Link
                    Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                    Source: CraHZCrkGP.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\drsdbadJoe Sandbox ML: detected
                    Source: 00000001.00000002.314917602.00000000004A0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                    Source: CraHZCrkGP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Binary string: D#c'C:\cigawazelaxij\62-tuyibuw\vajuvami\cadafitibeges79-payipu.pdb`ZBP7@ source: CraHZCrkGP.exe, drsdbad.5.dr
                    Source: Binary string: C:\cigawazelaxij\62-tuyibuw\vajuvami\cadafitibeges79-payipu.pdb source: CraHZCrkGP.exe, drsdbad.5.dr

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: Malware configuration extractorURLs: http://host-file-host6.com/
                    Source: Malware configuration extractorURLs: http://host-host-file8.com/
                    Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qxhuehga.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 360Host: host-file-host6.com
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qxhuehga.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 360Host: host-file-host6.com
                    Source: unknownDNS traffic detected: queries for: host-file-host6.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 21.2.drsdbad.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.drsdbad.25a15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.CraHZCrkGP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.CraHZCrkGP.exe.26115a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000000.292819935.0000000002631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.374142486.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.314917602.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.374095976.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.315051537.00000000004D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: CraHZCrkGP.exe, 00000000.00000002.247210114.000000000279A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                    Source: CraHZCrkGP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_00401834 Sleep,NtTerminateProcess,
                    Source: CraHZCrkGP.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: CraHZCrkGP.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: drsdbad.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: drsdbad.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                    Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\explorer.exeSection loaded: webio.dll
                    Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                    Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: CraHZCrkGP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: drsdbad.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: CraHZCrkGP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\CraHZCrkGP.exe "C:\Users\user\Desktop\CraHZCrkGP.exe"
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeProcess created: C:\Users\user\Desktop\CraHZCrkGP.exe "C:\Users\user\Desktop\CraHZCrkGP.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\drsdbad C:\Users\user\AppData\Roaming\drsdbad
                    Source: C:\Users\user\AppData\Roaming\drsdbadProcess created: C:\Users\user\AppData\Roaming\drsdbad C:\Users\user\AppData\Roaming\drsdbad
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeProcess created: C:\Users\user\Desktop\CraHZCrkGP.exe "C:\Users\user\Desktop\CraHZCrkGP.exe"
                    Source: C:\Users\user\AppData\Roaming\drsdbadProcess created: C:\Users\user\AppData\Roaming\drsdbad C:\Users\user\AppData\Roaming\drsdbad
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\drsdbadJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027AB26D CreateToolhelp32Snapshot,Module32First,
                    Source: CraHZCrkGP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: D#c'C:\cigawazelaxij\62-tuyibuw\vajuvami\cadafitibeges79-payipu.pdb`ZBP7@ source: CraHZCrkGP.exe, drsdbad.5.dr
                    Source: Binary string: C:\cigawazelaxij\62-tuyibuw\vajuvami\cadafitibeges79-payipu.pdb source: CraHZCrkGP.exe, drsdbad.5.dr
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027A607B push edx; retf 0073h
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027AC16B push ebx; iretd
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027A6035 push edi; retf 0073h
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027A601C push ecx; retf 0073h
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027A6514 push 000073CAh; retf 0073h
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027B100C pushad ; iretd
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027A60DC push edx; retf 0073h
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027A60DC pushad ; retf 0073h
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027AC180 push ebx; iretd
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 1_2_004011EB push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\drsdbadCode function: 21_2_004011EB push ebx; iretd
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.43093136075961
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.43093136075961
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\drsdbadJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\drsdbadJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\crahzcrkgp.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\drsdbad:Zone.Identifier read attributes | delete

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\drsdbadKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\drsdbadKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\drsdbadKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\drsdbadKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\drsdbadKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\drsdbadKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Windows\explorer.exe TID: 1912Thread sleep count: 586 > 30
                    Source: C:\Windows\explorer.exe TID: 4860Thread sleep count: 393 > 30
                    Source: C:\Windows\explorer.exe TID: 4860Thread sleep time: -39300s >= -30000s
                    Source: C:\Windows\explorer.exe TID: 1220Thread sleep count: 411 > 30
                    Source: C:\Windows\explorer.exe TID: 1220Thread sleep time: -41100s >= -30000s
                    Source: C:\Windows\explorer.exe TID: 2168Thread sleep count: 399 > 30
                    Source: C:\Windows\explorer.exe TID: 2536Thread sleep count: 284 > 30
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 586
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 393
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 411
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 399
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeSystem information queried: ModuleInformation
                    Source: explorer.exe, 00000005.00000000.271658717.0000000008142000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                    Source: explorer.exe, 00000005.00000000.271658717.0000000008142000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Prod_VMware_SATA
                    Source: explorer.exe, 00000005.00000000.303278194.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n
                    Source: explorer.exe, 00000005.00000000.258357036.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
                    Source: explorer.exe, 00000005.00000000.291787671.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000005.00000000.280302190.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
                    Source: explorer.exe, 00000005.00000000.303278194.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                    Source: explorer.exe, 00000005.00000000.272179570.0000000008290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
                    Source: explorer.exe, 00000005.00000000.282454352.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000005.00000000.303278194.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
                    Source: explorer.exe, 00000005.00000000.280302190.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
                    Source: explorer.exe, 00000005.00000000.303278194.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}^
                    Source: explorer.exe, 00000005.00000000.271968277.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: explorer.exe, 00000005.00000000.272560042.000000000832B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: #{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f$:s
                    Source: explorer.exe, 00000005.00000000.271658717.0000000008142000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                    Source: explorer.exe, 00000005.00000000.303278194.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\AppData\Roaming\drsdbadSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_027AAB4A push dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\drsdbadProcess queried: DebugPort

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: drsdbad.5.drJump to dropped file
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Roaming\drsdbadSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\AppData\Roaming\drsdbadSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeThread created: C:\Windows\explorer.exe EIP: 2631930
                    Source: C:\Users\user\AppData\Roaming\drsdbadThread created: unknown EIP: 4A01930
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeProcess created: C:\Users\user\Desktop\CraHZCrkGP.exe "C:\Users\user\Desktop\CraHZCrkGP.exe"
                    Source: C:\Users\user\AppData\Roaming\drsdbadProcess created: C:\Users\user\AppData\Roaming\drsdbad C:\Users\user\AppData\Roaming\drsdbad
                    Source: explorer.exe, 00000005.00000000.278658295.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.291768185.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.258363464.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
                    Source: explorer.exe, 00000005.00000000.292399231.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.302629679.0000000008142000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.262213793.0000000005920000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000005.00000000.292399231.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.258555866.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.279081042.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000005.00000000.292399231.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.258555866.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.279081042.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000005.00000000.278681639.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.258377155.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.291787671.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
                    Source: explorer.exe, 00000005.00000000.292399231.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.258555866.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.279081042.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\CraHZCrkGP.exeCode function: 0_2_0041CC60 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 21.2.drsdbad.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.drsdbad.25a15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.CraHZCrkGP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.CraHZCrkGP.exe.26115a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000000.292819935.0000000002631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.374142486.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.314917602.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.374095976.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.315051537.00000000004D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 21.2.drsdbad.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.drsdbad.25a15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.CraHZCrkGP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.CraHZCrkGP.exe.26115a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000000.292819935.0000000002631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.374142486.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.314917602.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.374095976.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.315051537.00000000004D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    312
                    Process Injection
                    11
                    Masquerading
                    1
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium2
                    Non-Application Layer Protocol
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Virtualization/Sandbox Evasion
                    LSASS Memory211
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                    Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)312
                    Process Injection
                    Security Account Manager12
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Hidden Files and Directories
                    NTDS3
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Software Packing
                    Cached Domain Credentials4
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 678052 Sample: CraHZCrkGP.exe Startdate: 03/08/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Yara detected SmokeLoader 2->34 36 2 other signatures 2->36 7 CraHZCrkGP.exe 2->7         started        9 drsdbad 2->9         started        process3 signatures4 12 CraHZCrkGP.exe 7->12         started        46 Machine Learning detection for dropped file 9->46 15 drsdbad 9->15         started        process5 signatures6 48 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->48 50 Maps a DLL or memory area into another process 12->50 52 Checks if the current machine is a virtual machine (disk enumeration) 12->52 17 explorer.exe 2 12->17 injected 54 Creates a thread in another existing process (thread injection) 15->54 process7 dnsIp8 26 host-file-host6.com 34.118.39.10, 49755, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\drsdbad, PE32 17->22 dropped 24 C:\Users\user\...\drsdbad:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    CraHZCrkGP.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\drsdbad100%Joe Sandbox ML
                    SourceDetectionScannerLabelLinkDownload
                    21.0.drsdbad.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    21.0.drsdbad.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    21.2.drsdbad.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.CraHZCrkGP.exe.26115a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.2.CraHZCrkGP.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    20.2.drsdbad.25a15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.CraHZCrkGP.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.CraHZCrkGP.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                    1.0.CraHZCrkGP.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.CraHZCrkGP.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    20.2.drsdbad.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                    21.0.drsdbad.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    host-file-host6.com25%VirustotalBrowse
                    host-host-file8.com22%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://host-file-host6.com/0%URL Reputationsafe
                    http://host-host-file8.com/100%URL Reputationmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    host-file-host6.com
                    34.118.39.10
                    truetrueunknown
                    host-host-file8.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    34.118.39.10
                    host-file-host6.comUnited States
                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:678052
                    Start date and time: 03/08/202213:56:052022-08-03 13:56:05 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 5m 47s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:CraHZCrkGP.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:29
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@4/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 55.2% (good quality ratio 46.8%)
                    • Quality average: 45.5%
                    • Quality standard deviation: 27.2%
                    HCA Information:
                    • Successful, ratio: 70%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded IPs from analysis (whitelisted): 23.211.6.115
                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    13:57:53Task SchedulerRun new task: Firefox Default Browser Agent B0A448B5506B203E path: C:\Users\user\AppData\Roaming\drsdbad
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):186368
                    Entropy (8bit):7.065209688203469
                    Encrypted:false
                    SSDEEP:3072:8xxxgL2AzyQ6w1x7O7SDpJspsrqdzd99r/wKPWKfJUY:8hMbzyY1x7O7SDp+iW399TPWKfJ
                    MD5:A8EF2558341A5CA8AC58EE543E260EE4
                    SHA1:5585CC5F17F424639DAE06D6FEBA403C78232F6A
                    SHA-256:19E29CC8B874C3DD5FA4B724FB6D5D51DB0B7C2FD4E954BB7B1DDA228B2225FB
                    SHA-512:BE08F6166668CF30BD6817DDA34A9184C36DCC446AD0B60DA4C6426157071AF97A57C99A233CF27DF4627135916F082637671E36CA6381A4CF99C5CB12374D6A
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...................PE..L....T.a.................,...B.......g.......@....@..................................q.......................................0..<........v.......................... ................................6..@............................................text....+.......,.................. ..`.data....:...@...0...0..............@....rsrc....v.......x...`..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.065209688203469
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:CraHZCrkGP.exe
                    File size:186368
                    MD5:a8ef2558341a5ca8ac58ee543e260ee4
                    SHA1:5585cc5f17f424639dae06d6feba403c78232f6a
                    SHA256:19e29cc8b874c3dd5fa4b724fb6d5d51db0b7c2fd4e954bb7b1dda228b2225fb
                    SHA512:be08f6166668cf30bd6817dda34a9184c36dcc446ad0b60da4c6426157071af97a57c99a233cf27df4627135916f082637671e36ca6381a4cf99c5cb12374d6a
                    SSDEEP:3072:8xxxgL2AzyQ6w1x7O7SDpJspsrqdzd99r/wKPWKfJUY:8hMbzyY1x7O7SDp+iW399TPWKfJ
                    TLSH:DF04BEE137E0C072D1B32A3058B787612A7FB9226BB415BFE364172E0E6D6C09A35757
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...................PE..L....T.a.................,.
                    Icon Hash:8a9099a9ca8ed2f2
                    Entrypoint:0x416797
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x61D5541F [Wed Jan 5 08:17:35 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:4cfbd807e4155075766f9f516fa9a7f3
                    Instruction
                    call 00007F699C97AAA9h
                    jmp 00007F699C97446Eh
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    call 00007F699C97461Ch
                    xchg cl, ch
                    jmp 00007F699C974604h
                    call 00007F699C974613h
                    fxch st(0), st(1)
                    jmp 00007F699C9745FBh
                    fabs
                    fld1
                    mov ch, cl
                    xor cl, cl
                    jmp 00007F699C9745F1h
                    mov byte ptr [ebp-00000090h], FFFFFFFEh
                    fabs
                    fxch st(0), st(1)
                    fabs
                    fxch st(0), st(1)
                    fpatan
                    or cl, cl
                    je 00007F699C9745E6h
                    fldpi
                    fsubrp st(1), st(0)
                    or ch, ch
                    je 00007F699C9745E4h
                    fchs
                    ret
                    fabs
                    fld st(0), st(0)
                    fld st(0), st(0)
                    fld1
                    fsubrp st(1), st(0)
                    fxch st(0), st(1)
                    fld1
                    faddp st(1), st(0)
                    fmulp st(1), st(0)
                    ftst
                    wait
                    fstsw word ptr [ebp-000000A0h]
                    wait
                    test byte ptr [ebp-0000009Fh], 00000001h
                    jne 00007F699C9745E7h
                    xor ch, ch
                    fsqrt
                    ret
                    pop eax
                    jmp 00007F699C97AC6Fh
                    fstp st(0)
                    fld tbyte ptr [004024CAh]
                    ret
                    fstp st(0)
                    or cl, cl
                    je 00007F699C9745EDh
                    fstp st(0)
                    fldpi
                    or ch, ch
                    je 00007F699C9745E4h
                    fchs
                    ret
                    fstp st(0)
                    fldz
                    or ch, ch
                    je 00007F699C9745D9h
                    fchs
                    ret
                    fstp st(0)
                    jmp 00007F699C97AC45h
                    fstp st(0)
                    mov cl, ch
                    jmp 00007F699C9745E2h
                    call 00007F699C9745AEh
                    jmp 00007F699C97AC50h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    Programming Language:
                    • [ASM] VS2010 build 30319
                    • [ C ] VS2010 build 30319
                    • [IMP] VS2008 SP1 build 30729
                    • [C++] VS2010 build 30319
                    • [RES] VS2010 build 30319
                    • [LNK] VS2010 build 30319
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2309c0x3c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x20a80000x76d8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x36800x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1dc.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x22ba80x22c00False0.7598920863309353data7.43093136075961IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x240000x2083ad00x3000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x20a80000x76d80x7800False0.6808268229166666data6.283303010391939IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    AFX_DIALOG_LAYOUT0x20ae4e00xedata
                    RT_ICON0x20a83700xea8dataKannadaKanada
                    RT_ICON0x20a92180x8a8dataKannadaKanada
                    RT_ICON0x20a9ac00x568GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x20aa0280x25a8dataKannadaKanada
                    RT_ICON0x20ac5d00x10a8dataKannadaKanada
                    RT_ICON0x20ad6780x988dataKannadaKanada
                    RT_ICON0x20ae0000x468GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_STRING0x20ae6880x67adataFrenchSwitzerland
                    RT_STRING0x20aed080x566dataFrenchSwitzerland
                    RT_STRING0x20af2700x468dataFrenchSwitzerland
                    RT_GROUP_ICON0x20ae4680x68dataKannadaKanada
                    RT_VERSION0x20ae4f00x194data
                    None0x20ae4d00xadata
                    DLLImport
                    KERNEL32.dllFoldStringA, GetSystemTime, GetLocalTime, InterlockedDecrement, GetLocaleInfoW, InterlockedCompareExchange, _hwrite, CancelWaitableTimer, GetSystemDirectoryA, CreateEventW, ReadConsoleA, VerifyVersionInfoA, BuildCommDCBA, GetConsoleAliasExesLengthA, SetSystemTimeAdjustment, PeekConsoleInputA, EnumDateFormatsA, CreateFileW, RegisterWaitForSingleObjectEx, LoadLibraryA, WaitNamedPipeA, GetEnvironmentStrings, FindResourceExA, VirtualProtect, GetFirmwareEnvironmentVariableW, GetModuleFileNameW, BeginUpdateResourceW, EnumCalendarInfoExW, WriteConsoleOutputCharacterA, WriteConsoleA, LoadLibraryW, DeleteFileW, LocalAlloc, GetProcAddress, GetUserDefaultLCID, FindFirstChangeNotificationW, HeapUnlock, GetCalendarInfoW, SetConsoleTitleA, GetBinaryTypeW, GetComputerNameExA, FindNextFileA, OpenJobObjectA, HeapValidate, _lclose, GetComputerNameW, SetFileShortNameW, WriteConsoleOutputCharacterW, TlsSetValue, SetCalendarInfoW, SetComputerNameW, CreateDirectoryExA, DeleteCriticalSection, FindFirstChangeNotificationA, GetVolumePathNameW, GetProcessHandleCount, GetCurrentProcess, GetThreadLocale, GetSystemDefaultLangID, ReadFile, GetStringTypeW, HeapSize, GetDiskFreeSpaceA, RaiseException, RtlUnwind, MultiByteToWideChar, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, HeapAlloc, GetLastError, HeapFree, IsProcessorFeaturePresent, SetFilePointer, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, TerminateProcess, TlsAlloc, TlsGetValue, TlsFree, InterlockedIncrement, GetModuleHandleW, SetLastError, GetCurrentThreadId, ExitProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, WriteFile, GetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetStdHandle, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, Sleep, LCMapStringW, WriteConsoleW, HeapReAlloc
                    USER32.dllClientToScreen
                    Language of compilation systemCountry where language is spokenMap
                    KannadaKanada
                    FrenchSwitzerland
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2022 13:57:52.268593073 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:57:52.305408001 CEST804975534.118.39.10192.168.2.3
                    Aug 3, 2022 13:57:52.305846930 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:57:52.306128979 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:57:52.306200981 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:57:52.342859983 CEST804975534.118.39.10192.168.2.3
                    Aug 3, 2022 13:57:52.342914104 CEST804975534.118.39.10192.168.2.3
                    Aug 3, 2022 13:57:52.432102919 CEST804975534.118.39.10192.168.2.3
                    Aug 3, 2022 13:57:52.486897945 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:58:22.433693886 CEST804975534.118.39.10192.168.2.3
                    Aug 3, 2022 13:58:22.433825970 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:58:22.433887959 CEST4975580192.168.2.334.118.39.10
                    Aug 3, 2022 13:58:22.470546007 CEST804975534.118.39.10192.168.2.3
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2022 13:57:52.245481968 CEST5811653192.168.2.38.8.8.8
                    Aug 3, 2022 13:57:52.265495062 CEST53581168.8.8.8192.168.2.3
                    Aug 3, 2022 13:57:52.468521118 CEST5742153192.168.2.38.8.8.8
                    Aug 3, 2022 13:57:53.495250940 CEST5742153192.168.2.38.8.8.8
                    Aug 3, 2022 13:57:54.545146942 CEST5742153192.168.2.38.8.8.8
                    Aug 3, 2022 13:57:56.501238108 CEST53574218.8.8.8192.168.2.3
                    Aug 3, 2022 13:57:57.543694019 CEST53574218.8.8.8192.168.2.3
                    Aug 3, 2022 13:57:58.582483053 CEST53574218.8.8.8192.168.2.3
                    TimestampSource IPDest IPChecksumCodeType
                    Aug 3, 2022 13:57:57.543801069 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                    Aug 3, 2022 13:57:58.582587004 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Aug 3, 2022 13:57:52.245481968 CEST192.168.2.38.8.8.80x8ad3Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Aug 3, 2022 13:57:52.468521118 CEST192.168.2.38.8.8.80xb532Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 3, 2022 13:57:53.495250940 CEST192.168.2.38.8.8.80xb532Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 3, 2022 13:57:54.545146942 CEST192.168.2.38.8.8.80xb532Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 3, 2022 13:57:52.265495062 CEST8.8.8.8192.168.2.30x8ad3No error (0)host-file-host6.com34.118.39.10A (IP address)IN (0x0001)
                    Aug 3, 2022 13:57:56.501238108 CEST8.8.8.8192.168.2.30xb532Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 3, 2022 13:57:57.543694019 CEST8.8.8.8192.168.2.30xb532Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 3, 2022 13:57:58.582483053 CEST8.8.8.8192.168.2.30xb532Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • qxhuehga.com
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.34975534.118.39.1080C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Aug 3, 2022 13:57:52.306128979 CEST1205OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://qxhuehga.com/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 360
                    Host: host-file-host6.com
                    Aug 3, 2022 13:57:52.432102919 CEST1206INHTTP/1.1 200 OK
                    server: nginx/1.20.1
                    date: Wed, 03 Aug 2022 11:57:52 GMT
                    content-type: text/html; charset=UTF-8
                    transfer-encoding: chunked
                    Data Raw: 46 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: FYour IP blocked0


                    Click to jump to process

                    Target ID:0
                    Start time:13:57:02
                    Start date:03/08/2022
                    Path:C:\Users\user\Desktop\CraHZCrkGP.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\CraHZCrkGP.exe"
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:A8EF2558341A5CA8AC58EE543E260EE4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:13:57:05
                    Start date:03/08/2022
                    Path:C:\Users\user\Desktop\CraHZCrkGP.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\CraHZCrkGP.exe"
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:A8EF2558341A5CA8AC58EE543E260EE4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.314917602.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.315051537.00000000004D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:5
                    Start time:13:57:13
                    Start date:03/08/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff6b8cf0000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.292819935.0000000002631000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:20
                    Start time:13:57:53
                    Start date:03/08/2022
                    Path:C:\Users\user\AppData\Roaming\drsdbad
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\drsdbad
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:A8EF2558341A5CA8AC58EE543E260EE4
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low

                    Target ID:21
                    Start time:13:57:59
                    Start date:03/08/2022
                    Path:C:\Users\user\AppData\Roaming\drsdbad
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\drsdbad
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:A8EF2558341A5CA8AC58EE543E260EE4
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000015.00000002.374142486.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000015.00000002.374095976.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    No disassembly