Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4cqJ4Jjd5j.exe

Overview

General Information

Sample Name:4cqJ4Jjd5j.exe
Analysis ID:678224
MD5:c529659ad79b58eb83d1732b6cc88ff5
SHA1:aad399bd653192ec0ecdeac5c1a4cbf43afb19b6
SHA256:269200ba6acb859b712185ebdad2b0000333e42d194e05d12d86eb3590125aed
Tags:ArkeiStealerexe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Contains functionality to call native functions
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 4cqJ4Jjd5j.exe (PID: 1276 cmdline: "C:\Users\user\Desktop\4cqJ4Jjd5j.exe" MD5: C529659AD79B58EB83D1732B6CC88FF5)
    • 4cqJ4Jjd5j.exe (PID: 5848 cmdline: "C:\Users\user\Desktop\4cqJ4Jjd5j.exe" MD5: C529659AD79B58EB83D1732B6CC88FF5)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • brgfgda (PID: 5392 cmdline: C:\Users\user\AppData\Roaming\brgfgda MD5: C529659AD79B58EB83D1732B6CC88FF5)
    • brgfgda (PID: 4916 cmdline: C:\Users\user\AppData\Roaming\brgfgda MD5: C529659AD79B58EB83D1732B6CC88FF5)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            18.2.brgfgda.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              18.0.brgfgda.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  16.2.brgfgda.25d15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    18.0.brgfgda.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                      Click to see the 2 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 4cqJ4Jjd5j.exeVirustotal: Detection: 39%Perma Link
                      Source: 4cqJ4Jjd5j.exeReversingLabs: Detection: 43%
                      Source: http://host-host-file8.com/URL Reputation: Label: malware
                      Source: host-file-host6.comVirustotal: Detection: 25%Perma Link
                      Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                      Source: C:\Users\user\AppData\Roaming\brgfgdaVirustotal: Detection: 39%Perma Link
                      Source: C:\Users\user\AppData\Roaming\brgfgdaReversingLabs: Detection: 43%
                      Source: 4cqJ4Jjd5j.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\brgfgdaJoe Sandbox ML: detected
                      Source: 18.0.brgfgda.400000.2.unpackAvira: Label: TR/Patched.Gen
                      Source: 18.0.brgfgda.400000.1.unpackAvira: Label: TR/Patched.Gen
                      Source: 18.0.brgfgda.400000.3.unpackAvira: Label: TR/Patched.Gen
                      Source: 18.0.brgfgda.400000.0.unpackAvira: Label: TR/Patched.Gen
                      Source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                      Source: 4cqJ4Jjd5j.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Binary string: C:\tivupasozeyabu\dosuduf zevumaga\sit.pdb source: 4cqJ4Jjd5j.exe, brgfgda.5.dr
                      Source: Binary string: 'FC:\tivupasozeyabu\dosuduf zevumaga\sit.pdb`ZBT7@ source: 4cqJ4Jjd5j.exe, brgfgda.5.dr

                      Networking

                      barindex
                      Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                      Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                      Source: Malware configuration extractorURLs: http://host-file-host6.com/
                      Source: Malware configuration extractorURLs: http://host-host-file8.com/
                      Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                      Source: Joe Sandbox ViewIP Address: 34.118.39.10 34.118.39.10
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://armtrksuct.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: host-file-host6.com
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://armtrksuct.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: host-file-host6.com
                      Source: unknownDNS traffic detected: queries for: host-file-host6.com

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: Yara matchFile source: 18.2.brgfgda.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.brgfgda.25d15a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.4cqJ4Jjd5j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: 4cqJ4Jjd5j.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_0040180C Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401818 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401822 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401826 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401834 Sleep,NtTerminateProcess,
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: brgfgda.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: brgfgda.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                      Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\explorer.exeSection loaded: webio.dll
                      Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                      Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: brgfgda.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 4cqJ4Jjd5j.exeVirustotal: Detection: 39%
                      Source: 4cqJ4Jjd5j.exeReversingLabs: Detection: 43%
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgda
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgda
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgda
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\brgfgdaJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                      Source: 4cqJ4Jjd5j.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\tivupasozeyabu\dosuduf zevumaga\sit.pdb source: 4cqJ4Jjd5j.exe, brgfgda.5.dr
                      Source: Binary string: 'FC:\tivupasozeyabu\dosuduf zevumaga\sit.pdb`ZBT7@ source: 4cqJ4Jjd5j.exe, brgfgda.5.dr
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_004011D0 push ebx; iretd
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_004011D7 push ebx; iretd
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_004011EB push ebx; iretd
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D1977 push ebx; iretd
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D1970 push ebx; iretd
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D198B push ebx; iretd
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_004011D0 push ebx; iretd
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_004011D7 push ebx; iretd
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_004011EB push ebx; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.423882781109827
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.423882781109827
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\brgfgdaJump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\brgfgdaJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\4cqj4jjd5j.exeJump to behavior
                      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\brgfgda:Zone.Identifier read attributes | delete

                      Malware Analysis System Evasion

                      barindex
                      Source: 4cqJ4Jjd5j.exe, 00000001.00000002.350510765.000000000052B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                      Source: brgfgda, 00000012.00000002.416874461.000000000070B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKG
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Windows\explorer.exe TID: 1248Thread sleep count: 575 > 30
                      Source: C:\Windows\explorer.exe TID: 576Thread sleep count: 295 > 30
                      Source: C:\Windows\explorer.exe TID: 3320Thread sleep count: 299 > 30
                      Source: C:\Windows\explorer.exe TID: 1104Thread sleep count: 447 > 30
                      Source: C:\Windows\explorer.exe TID: 3652Thread sleep count: 170 > 30
                      Source: C:\Windows\explorer.exe TID: 4784Thread sleep count: 188 > 30
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 575
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 447
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSystem information queried: ModuleInformation
                      Source: explorer.exe, 00000005.00000000.289564983.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                      Source: explorer.exe, 00000005.00000000.310948604.0000000008290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n
                      Source: explorer.exe, 00000005.00000000.300893716.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
                      Source: explorer.exe, 00000005.00000000.300994707.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.289564983.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000005.00000000.290434815.0000000008290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 0ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}t]
                      Source: explorer.exe, 00000005.00000000.336870905.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
                      Source: explorer.exe, 00000005.00000000.272613348.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
                      Source: explorer.exe, 00000005.00000000.310469334.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                      Source: explorer.exe, 00000005.00000000.289564983.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSystem information queried: CodeIntegrityInformation
                      Source: C:\Users\user\AppData\Roaming\brgfgdaSystem information queried: CodeIntegrityInformation
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D0042 push dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess queried: DebugPort

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\explorer.exeFile created: brgfgda.5.drJump to dropped file
                      Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                      Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                      Source: C:\Users\user\AppData\Roaming\brgfgdaSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                      Source: C:\Users\user\AppData\Roaming\brgfgdaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                      Source: C:\Users\user\AppData\Roaming\brgfgdaMemory written: C:\Users\user\AppData\Roaming\brgfgda base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeThread created: C:\Windows\explorer.exe EIP: 2941930
                      Source: C:\Users\user\AppData\Roaming\brgfgdaThread created: unknown EIP: 4A01930
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgda
                      Source: explorer.exe, 00000005.00000000.270738430.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.328655879.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.300917824.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
                      Source: explorer.exe, 00000005.00000000.305717432.0000000005920000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.340946998.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.301477974.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.329726697.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.301477974.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.329726697.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: explorer.exe, 00000005.00000000.328785751.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.270752696.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.300994707.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
                      Source: explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.301477974.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.329726697.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 0_2_0041CC30 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 18.2.brgfgda.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.brgfgda.25d15a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.4cqJ4Jjd5j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 18.2.brgfgda.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.brgfgda.25d15a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.4cqJ4Jjd5j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      512
                      Process Injection
                      11
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
                      Non-Application Layer Protocol
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      12
                      Virtualization/Sandbox Evasion
                      LSASS Memory411
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                      Application Layer Protocol
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                      Process Injection
                      Security Account Manager12
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Hidden Files and Directories
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common3
                      Software Packing
                      Cached Domain Credentials4
                      System Information Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      File Deletion
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 678224 Sample: 4cqJ4Jjd5j.exe Startdate: 03/08/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 4 other signatures 2->36 7 4cqJ4Jjd5j.exe 2->7         started        9 brgfgda 2->9         started        process3 signatures4 12 4cqJ4Jjd5j.exe 7->12         started        46 Multi AV Scanner detection for dropped file 9->46 48 Machine Learning detection for dropped file 9->48 50 Contains functionality to inject code into remote processes 9->50 52 Injects a PE file into a foreign processes 9->52 15 brgfgda 9->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 34.118.39.10, 49755, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\brgfgda, PE32 17->22 dropped 24 C:\Users\user\...\brgfgda:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      4cqJ4Jjd5j.exe39%VirustotalBrowse
                      4cqJ4Jjd5j.exe44%ReversingLabsWin32.Trojan.Vigorf
                      4cqJ4Jjd5j.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\brgfgda100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\brgfgda39%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\brgfgda44%ReversingLabsWin32.Trojan.Vigorf
                      SourceDetectionScannerLabelLinkDownload
                      18.0.brgfgda.400000.2.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.1.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.3.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.0.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.4cqJ4Jjd5j.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                      18.2.brgfgda.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.4cqJ4Jjd5j.exe.25015a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.4cqJ4Jjd5j.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.0.brgfgda.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.4cqJ4Jjd5j.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.2.4cqJ4Jjd5j.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.0.brgfgda.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      16.2.brgfgda.25d15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      16.2.brgfgda.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                      1.0.4cqJ4Jjd5j.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      SourceDetectionScannerLabelLink
                      host-file-host6.com25%VirustotalBrowse
                      host-host-file8.com22%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://host-file-host6.com/0%URL Reputationsafe
                      http://host-host-file8.com/100%URL Reputationmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      host-file-host6.com
                      34.118.39.10
                      truetrueunknown
                      host-host-file8.com
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://host-file-host6.com/true
                      • URL Reputation: safe
                      unknown
                      http://host-host-file8.com/true
                      • URL Reputation: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      34.118.39.10
                      host-file-host6.comUnited States
                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                      Joe Sandbox Version:35.0.0 Citrine
                      Analysis ID:678224
                      Start date and time: 03/08/202217:50:292022-08-03 17:50:29 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 41s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:4cqJ4Jjd5j.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:26
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@6/2@4/1
                      EGA Information:
                      • Successful, ratio: 75%
                      HDC Information:
                      • Successful, ratio: 98.8% (good quality ratio 83.7%)
                      • Quality average: 45.5%
                      • Quality standard deviation: 27.2%
                      HCA Information:
                      • Successful, ratio: 79%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Adjust boot time
                      • Enable AMSI
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.152.110.14, 52.242.101.226, 20.223.24.244, 20.54.89.106, 40.125.122.176
                      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                      • Execution Graph export aborted for target 4cqJ4Jjd5j.exe, PID 1276 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      17:52:36Task SchedulerRun new task: Firefox Default Browser Agent 173C074F5A931F0F path: C:\Users\user\AppData\Roaming\brgfgda
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):186368
                      Entropy (8bit):7.056602649646931
                      Encrypted:false
                      SSDEEP:3072:C196SvSbCDBMY3ue3PFUt76X9JfIruFeKQvd4xkESjMWD/Y:CVcmhfW6X9OihQvDF
                      MD5:C529659AD79B58EB83D1732B6CC88FF5
                      SHA1:AAD399BD653192EC0ECDEAC5C1A4CBF43AFB19B6
                      SHA-256:269200BA6ACB859B712185EBDAD2B0000333E42D194E05D12D86EB3590125AED
                      SHA-512:6E81A8A8803746E0C10B8A18EC7A1061EFC8BD6EABBBBAB4E02B0A01B21C360B1A73FB93B0A8D40961F309AE915F214A03F0E6A49024E6A000DE24FB906CA3D6
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: Virustotal, Detection: 39%, Browse
                      • Antivirus: ReversingLabs, Detection: 44%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...........................PE..L...."`.................,...B......gg.......@....@..................................8......................................l0..<.......Pv.......................... ................................6..@............................................text...@+.......,.................. ..`.data....:...@...0...0..............@....rsrc...Pv.......x...`..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.056602649646931
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:4cqJ4Jjd5j.exe
                      File size:186368
                      MD5:c529659ad79b58eb83d1732b6cc88ff5
                      SHA1:aad399bd653192ec0ecdeac5c1a4cbf43afb19b6
                      SHA256:269200ba6acb859b712185ebdad2b0000333e42d194e05d12d86eb3590125aed
                      SHA512:6e81a8a8803746e0c10b8a18ec7a1061efc8bd6eabbbbab4e02b0a01b21c360b1a73fb93b0a8d40961f309ae915f214a03f0e6a49024e6a000de24fb906ca3d6
                      SSDEEP:3072:C196SvSbCDBMY3ue3PFUt76X9JfIruFeKQvd4xkESjMWD/Y:CVcmhfW6X9OihQvDF
                      TLSH:4A04AD2133E1C072D4B729309B75DAE15B3AB922E7B45B8B7760072A1F712C1BA38757
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...........................PE..L....."`...........
                      Icon Hash:8a9199c9ca8cd2f2
                      Entrypoint:0x416767
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x602286F3 [Tue Feb 9 12:58:27 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:19d26450af6fae284e6a28f691d90382
                      Instruction
                      call 00007F36C4BD02B9h
                      jmp 00007F36C4BC9C7Eh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      call 00007F36C4BC9E2Ch
                      xchg cl, ch
                      jmp 00007F36C4BC9E14h
                      call 00007F36C4BC9E23h
                      fxch st(0), st(1)
                      jmp 00007F36C4BC9E0Bh
                      fabs
                      fld1
                      mov ch, cl
                      xor cl, cl
                      jmp 00007F36C4BC9E01h
                      mov byte ptr [ebp-00000090h], FFFFFFFEh
                      fabs
                      fxch st(0), st(1)
                      fabs
                      fxch st(0), st(1)
                      fpatan
                      or cl, cl
                      je 00007F36C4BC9DF6h
                      fldpi
                      fsubrp st(1), st(0)
                      or ch, ch
                      je 00007F36C4BC9DF4h
                      fchs
                      ret
                      fabs
                      fld st(0), st(0)
                      fld st(0), st(0)
                      fld1
                      fsubrp st(1), st(0)
                      fxch st(0), st(1)
                      fld1
                      faddp st(1), st(0)
                      fmulp st(1), st(0)
                      ftst
                      wait
                      fstsw word ptr [ebp-000000A0h]
                      wait
                      test byte ptr [ebp-0000009Fh], 00000001h
                      jne 00007F36C4BC9DF7h
                      xor ch, ch
                      fsqrt
                      ret
                      pop eax
                      jmp 00007F36C4BD047Fh
                      fstp st(0)
                      fld tbyte ptr [004024CAh]
                      ret
                      fstp st(0)
                      or cl, cl
                      je 00007F36C4BC9DFDh
                      fstp st(0)
                      fldpi
                      or ch, ch
                      je 00007F36C4BC9DF4h
                      fchs
                      ret
                      fstp st(0)
                      fldz
                      or ch, ch
                      je 00007F36C4BC9DE9h
                      fchs
                      ret
                      fstp st(0)
                      jmp 00007F36C4BD0455h
                      fstp st(0)
                      mov cl, ch
                      jmp 00007F36C4BC9DF2h
                      call 00007F36C4BC9DBEh
                      jmp 00007F36C4BD0460h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      Programming Language:
                      • [ASM] VS2010 build 30319
                      • [ C ] VS2010 build 30319
                      • [IMP] VS2008 SP1 build 30729
                      • [C++] VS2010 build 30319
                      • [RES] VS2010 build 30319
                      • [LNK] VS2010 build 30319
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2306c0x3c.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x20a80000x7650.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x36800x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x22b400x22c00False0.7597726506294964data7.423882781109827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x240000x2083ad00x3000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x20a80000x76500x7800False0.6784505208333333data6.280404502514193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x20a83000xea8dataKannadaKanada
                      RT_ICON0x20a91a80x8a8dataKannadaKanada
                      RT_ICON0x20a9a500x568GLS_BINARY_LSB_FIRSTKannadaKanada
                      RT_ICON0x20a9fb80x25a8dataKannadaKanada
                      RT_ICON0x20ac5600x10a8dataKannadaKanada
                      RT_ICON0x20ad6080x988dataKannadaKanada
                      RT_ICON0x20adf900x468GLS_BINARY_LSB_FIRSTKannadaKanada
                      RT_STRING0x20ae6080x67adataFrenchSwitzerland
                      RT_STRING0x20aec880x566dataFrenchSwitzerland
                      RT_STRING0x20af1f00x45edataFrenchSwitzerland
                      RT_GROUP_ICON0x20ae3f80x68dataKannadaKanada
                      RT_VERSION0x20ae4700x194data
                      None0x20ae4600xadata
                      DLLImport
                      KERNEL32.dllFoldStringA, GetLocalTime, InterlockedDecrement, GetLocaleInfoA, InterlockedCompareExchange, _hwrite, CancelWaitableTimer, GetSystemDirectoryA, CreateEventW, ReadConsoleA, VerifyVersionInfoA, BuildCommDCBA, GetConsoleAliasExesLengthA, SetSystemTimeAdjustment, PeekConsoleInputA, EnumDateFormatsA, CreateFileW, RegisterWaitForSingleObjectEx, LoadLibraryA, WaitNamedPipeA, GetEnvironmentStrings, FindResourceExA, VirtualProtect, GetFirmwareEnvironmentVariableW, GetModuleFileNameW, BeginUpdateResourceW, EnumCalendarInfoExW, WriteConsoleOutputCharacterW, WriteConsoleA, LoadLibraryW, DeleteFileW, LocalAlloc, GetProcAddress, GetModuleHandleW, GetUserDefaultLCID, FindFirstChangeNotificationW, HeapUnlock, GetCalendarInfoW, SetConsoleTitleA, GetBinaryTypeW, GetComputerNameExA, FindNextFileA, OpenJobObjectA, HeapValidate, _lclose, GetComputerNameW, SetFileShortNameW, TlsSetValue, SetCalendarInfoW, SetComputerNameW, CreateDirectoryExA, InitializeCriticalSectionAndSpinCount, FindFirstChangeNotificationA, GetVolumePathNameW, GetProcessHandleCount, GetThreadLocale, GetSystemDefaultLangID, GetCurrentProcess, ReadFile, GetStringTypeW, HeapSize, GetDiskFreeSpaceA, HeapReAlloc, RaiseException, RtlUnwind, MultiByteToWideChar, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, HeapAlloc, GetLastError, HeapFree, IsProcessorFeaturePresent, SetFilePointer, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, TerminateProcess, TlsAlloc, TlsGetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, ExitProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, WriteFile, GetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetStdHandle, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, Sleep, LCMapStringW, WriteConsoleW
                      USER32.dllClientToScreen
                      Language of compilation systemCountry where language is spokenMap
                      KannadaKanada
                      FrenchSwitzerland
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2022 17:52:36.203840017 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.240654945 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.242068052 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.242321968 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.243194103 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.279036045 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.279752016 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.375181913 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.429420948 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:53:06.376564026 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:53:06.376753092 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:53:06.418031931 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:53:06.454641104 CEST804975534.118.39.10192.168.2.3
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2022 17:52:35.903945923 CEST5811653192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:36.197936058 CEST53581168.8.8.8192.168.2.3
                      Aug 3, 2022 17:52:36.391638994 CEST5742153192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:37.441411972 CEST5742153192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:38.492662907 CEST5742153192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:40.417336941 CEST53574218.8.8.8192.168.2.3
                      Aug 3, 2022 17:52:41.465724945 CEST53574218.8.8.8192.168.2.3
                      Aug 3, 2022 17:52:42.518218040 CEST53574218.8.8.8192.168.2.3
                      TimestampSource IPDest IPChecksumCodeType
                      Aug 3, 2022 17:52:41.465881109 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                      Aug 3, 2022 17:52:42.518362045 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Aug 3, 2022 17:52:35.903945923 CEST192.168.2.38.8.8.80xe7f1Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:36.391638994 CEST192.168.2.38.8.8.80xad13Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:37.441411972 CEST192.168.2.38.8.8.80xad13Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:38.492662907 CEST192.168.2.38.8.8.80xad13Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Aug 3, 2022 17:52:36.197936058 CEST8.8.8.8192.168.2.30xe7f1No error (0)host-file-host6.com34.118.39.10A (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:40.417336941 CEST8.8.8.8192.168.2.30xad13Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:41.465724945 CEST8.8.8.8192.168.2.30xad13Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:42.518218040 CEST8.8.8.8192.168.2.30xad13Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                      • armtrksuct.net
                        • host-file-host6.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.34975534.118.39.1080C:\Windows\explorer.exe
                      TimestampkBytes transferredDirectionData
                      Aug 3, 2022 17:52:36.242321968 CEST1197OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://armtrksuct.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 343
                      Host: host-file-host6.com
                      Aug 3, 2022 17:52:36.375181913 CEST1198INHTTP/1.1 200 OK
                      server: nginx/1.20.1
                      date: Wed, 03 Aug 2022 15:52:36 GMT
                      content-type: text/html; charset=UTF-8
                      transfer-encoding: chunked
                      Data Raw: 46 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                      Data Ascii: FYour IP blocked0


                      Click to jump to process

                      Target ID:0
                      Start time:17:51:31
                      Start date:03/08/2022
                      Path:C:\Users\user\Desktop\4cqJ4Jjd5j.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      Target ID:1
                      Start time:17:51:34
                      Start date:03/08/2022
                      Path:C:\Users\user\Desktop\4cqJ4Jjd5j.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      Target ID:5
                      Start time:17:51:43
                      Start date:03/08/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff6b8cf0000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:16
                      Start time:17:52:36
                      Start date:03/08/2022
                      Path:C:\Users\user\AppData\Roaming\brgfgda
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\brgfgda
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 39%, Virustotal, Browse
                      • Detection: 44%, ReversingLabs
                      Reputation:low

                      Target ID:18
                      Start time:17:52:40
                      Start date:03/08/2022
                      Path:C:\Users\user\AppData\Roaming\brgfgda
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\brgfgda
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      No disassembly