Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
04ZQ5etz9i.exe

Overview

General Information

Sample Name:04ZQ5etz9i.exe
Analysis ID:678602
MD5:785d9d53c4b721385e9e5f51a4846791
SHA1:751b17ab9fae896ed414f42dacd885bd75a83f46
SHA256:6716b20272e1b5ec3a6d86f9144af69e1615efdab035e130b654757b36e8b84f
Tags:ArkeiStealerexe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 04ZQ5etz9i.exe (PID: 1888 cmdline: "C:\Users\user\Desktop\04ZQ5etz9i.exe" MD5: 785D9D53C4B721385E9E5F51A4846791)
    • 04ZQ5etz9i.exe (PID: 3908 cmdline: "C:\Users\user\Desktop\04ZQ5etz9i.exe" MD5: 785D9D53C4B721385E9E5F51A4846791)
      • explorer.exe (PID: 3616 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • jtdteff (PID: 5348 cmdline: C:\Users\user\AppData\Roaming\jtdteff MD5: 785D9D53C4B721385E9E5F51A4846791)
    • jtdteff (PID: 388 cmdline: C:\Users\user\AppData\Roaming\jtdteff MD5: 785D9D53C4B721385E9E5F51A4846791)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000014.00000002.357473381.0000000000766000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x506e:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      0.2.04ZQ5etz9i.exe.4815a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        1.0.04ZQ5etz9i.exe.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          1.0.04ZQ5etz9i.exe.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            1.0.04ZQ5etz9i.exe.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              1.2.04ZQ5etz9i.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: 04ZQ5etz9i.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\jtdteffJoe Sandbox ML: detected
                Source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: 04ZQ5etz9i.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: C:\venuruloje\jojax60 kip.pdb source: 04ZQ5etz9i.exe, jtdteff.5.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                Source: Joe Sandbox ViewIP Address: 34.118.39.10 34.118.39.10
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwvsnnm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: host-file-host6.com
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwvsnnm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 0.2.04ZQ5etz9i.exe.4815a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.04ZQ5etz9i.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.jtdteff.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.jtdteff.6f15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: 04ZQ5etz9i.exe, 00000000.00000002.235923306.00000000006AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000014.00000002.357473381.0000000000766000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.235932667.00000000006B6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 04ZQ5etz9i.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000014.00000002.357473381.0000000000766000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.235932667.00000000006B6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004180C0
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00426100
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00418EA0
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: String function: 0040E240 appears 171 times
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: String function: 0040F550 appears 127 times
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00480110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_006F0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_00401834 Sleep,NtTerminateProcess,
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 04ZQ5etz9i.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: jtdteff.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: 04ZQ5etz9i.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\04ZQ5etz9i.exe "C:\Users\user\Desktop\04ZQ5etz9i.exe"
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeProcess created: C:\Users\user\Desktop\04ZQ5etz9i.exe "C:\Users\user\Desktop\04ZQ5etz9i.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\jtdteff C:\Users\user\AppData\Roaming\jtdteff
                Source: C:\Users\user\AppData\Roaming\jtdteffProcess created: C:\Users\user\AppData\Roaming\jtdteff C:\Users\user\AppData\Roaming\jtdteff
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeProcess created: C:\Users\user\Desktop\04ZQ5etz9i.exe "C:\Users\user\Desktop\04ZQ5etz9i.exe"
                Source: C:\Users\user\AppData\Roaming\jtdteffProcess created: C:\Users\user\AppData\Roaming\jtdteff C:\Users\user\AppData\Roaming\jtdteff
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jtdteffJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004099AA GetCursorInfo,CharUpperA,GetConsoleAliasesLengthW,GetDefaultCommConfigW,GetProfileSectionW,_puts,GetFileInformationByHandle,_realloc,_realloc,_realloc,_fseek,SetCalendarInfoA,SetCurrentDirectoryA,BuildCommDCBAndTimeoutsW,CreateFileW,OpenJobObjectA,WriteConsoleOutputCharacterA,MapUserPhysicalPages,AddAtomA,GetThreadPriority,GetFullPathNameW,FindNextVolumeMountPointW,FillConsoleOutputCharacterA,EnumResourceNamesW,OpenWaitableTimerA,LocalSize,_hwrite,GetPrivateProfileStructW,GetComputerNameW,EnumDateFormatsExW,GetConsoleAliasesW,GetComputerNameW,GetConsoleTitleA,GetSystemWindowsDirectoryW,SetCalendarInfoW,GetFileAttributesA,HeapLock,lstrcpyW,LocalAlloc,GetConsoleFontSize,EnumDateFormatsW,ConvertThreadToFiber,InterlockedCompareExchange,VerifyVersionInfoA,FormatMessageW,SetCommState,FindResourceW,CreateMutexA,MoveFileA,LockFileEx,ResetEvent,FindNextFileW,GetComputerNameExW,CopyFileW,FileTimeToSystemTime,EnumSystemLocalesA,GetComputerNameW,WriteConsoleA,GlobalGetAtomNameW,LoadLibraryA,SetConsoleWindowInfo,GetCPInfoExW,EnumResourceLanguagesA,TerminateProcess,TerminateProcess,GetDiskFreeSpaceExW,GetPrivateProfileStructW,GetConsoleAliasW,lstrcpyA,GetOEMCP,TerminateProcess,VirtualAlloc,GetComputerNameA,GetModuleHandleW,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004096C0 GetComputerNameW,LoadLibraryA,LoadLibraryW,GetProcAddress,VerifyVersionInfoW,SetLastError,DebugBreak,GetConsoleAliasExesLengthW,GetPrivateProfileIntA,GetLastError,GetSystemWow64DirectoryW,IsDBCSLeadByte,CreateMailslotA,GetStartupInfoW,InterlockedExchangeAdd,_hwrite,HeapSize,VerifyVersionInfoW,InterlockedIncrement,InterlockedIncrement,AddAtomA,WriteProfileSectionW,GetConsoleAliasesLengthW,GetSystemDefaultLangID,CreateNamedPipeW,LoadLibraryA,GetOverlappedResult,FindNextVolumeW,LeaveCriticalSection,GetModuleHandleW,FormatMessageW,CreateActCtxA,CopyFileW,GetConsoleTitleW,VerifyVersionInfoW,InterlockedIncrement,InterlockedExchange,InterlockedIncrement,GetCommandLineW,SetLastError,MoveFileWithProgressW,VerifyVersionInfoA,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_006BB07C CreateToolhelp32Snapshot,Module32First,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0040943E BuildCommDCBAndTimeoutsA,SetCurrentDirectoryA,GetSystemDirectoryA,GetModuleHandleW,CallNamedPipeW,OpenEventA,GetComputerNameExW,GetConsoleTitleA,WriteConsoleInputA,WriteConsoleInputW,SizeofResource,TlsGetValue,FindNextVolumeMountPointW,lstrlenA,GlobalGetAtomNameA,GetDriveTypeW,GetProcessPriorityBoost,IsSystemResumeAutomatic,QueryDosDeviceW,VerifyVersionInfoA,GetProfileSectionW,LockFile,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCommand line argument: Risejigav
                Source: 04ZQ5etz9i.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\venuruloje\jojax60 kip.pdb source: 04ZQ5etz9i.exe, jtdteff.5.dr
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0040ACB8 push eax; ret
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00481970 push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00481977 push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0048198B push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_006C0E1B pushad ; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_006BBF7A push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_006BBF8F push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_004011D0 push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_004011D7 push ebx; iretd
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 1_2_004011EB push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_006F1977 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_006F1970 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_006F198B push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_00770E3B pushad ; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_0076BFAF push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_0076BF9A push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_004011D0 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_004011D7 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 21_2_004011EB push ebx; iretd
                Source: 04ZQ5etz9i.exeStatic PE information: section name: .cuheb
                Source: 04ZQ5etz9i.exeStatic PE information: section name: .rilez
                Source: 04ZQ5etz9i.exeStatic PE information: section name: .kibu
                Source: 04ZQ5etz9i.exeStatic PE information: section name: .vitid
                Source: jtdteff.5.drStatic PE information: section name: .cuheb
                Source: jtdteff.5.drStatic PE information: section name: .rilez
                Source: jtdteff.5.drStatic PE information: section name: .kibu
                Source: jtdteff.5.drStatic PE information: section name: .vitid
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004095C3 LoadLibraryA,GetProcAddress,VirtualProtect,
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jtdteffJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jtdteffJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\04zq5etz9i.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jtdteff:Zone.Identifier read attributes | delete

                Malware Analysis System Evasion

                barindex
                Source: jtdteff, 00000015.00000002.369805669.0000000002180000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jtdteffKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jtdteffKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jtdteffKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jtdteffKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jtdteffKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jtdteffKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 5180Thread sleep count: 579 > 30
                Source: C:\Windows\explorer.exe TID: 5996Thread sleep count: 365 > 30
                Source: C:\Windows\explorer.exe TID: 5996Thread sleep time: -36500s >= -30000s
                Source: C:\Windows\explorer.exe TID: 5252Thread sleep count: 365 > 30
                Source: C:\Windows\explorer.exe TID: 5252Thread sleep time: -36500s >= -30000s
                Source: C:\Windows\explorer.exe TID: 5812Thread sleep count: 433 > 30
                Source: C:\Windows\explorer.exe TID: 2208Thread sleep count: 255 > 30
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 579
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 365
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 365
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 433
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeSystem information queried: ModuleInformation
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeAPI call chain: ExitProcess graph end node
                Source: explorer.exe, 00000005.00000000.253398298.00000000051AC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000005.00000000.253465306.00000000051F7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}71USER
                Source: explorer.exe, 00000005.00000000.296712799.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                Source: explorer.exe, 00000005.00000000.277668898.0000000005EAB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000005.00000000.296712799.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000005.00000000.296712799.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 4f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA;
                Source: explorer.exe, 00000005.00000000.253465306.00000000051F7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000005.00000000.296712799.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                Source: explorer.exe, 00000005.00000000.293716661.000000000510C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                Source: explorer.exe, 00000005.00000000.296712799.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}on:Mondz?S
                Source: explorer.exe, 00000005.00000000.296712799.0000000006005000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00dRom0cY
                Source: explorer.exe, 00000005.00000000.253552589.0000000005240000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: e\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\jtdteffSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0040F5C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0041CD92 InterlockedIncrement,__itow_s,__invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,__strftime_l,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,__snwprintf_s,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,GetFileType,_wcslen,WriteConsoleW,GetLastError,__invoke_watson_if_oneof,_wcslen,WriteFile,WriteFile,OutputDebugStringW,__itow_s,__invoke_watson_if_error,___crtMessageWindowW,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004095C3 LoadLibraryA,GetProcAddress,VirtualProtect,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00480042 push dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_006BA959 push dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_006F0042 push dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\jtdteffCode function: 20_2_0076A979 push dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\jtdteffProcess queried: DebugPort
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0040F5C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00415990 SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0040E6E0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_0040DB40 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: jtdteff.5.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\jtdteffSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\jtdteffSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeMemory written: C:\Users\user\Desktop\04ZQ5etz9i.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Roaming\jtdteffMemory written: C:\Users\user\AppData\Roaming\jtdteff base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_00480110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeThread created: C:\Windows\explorer.exe EIP: 24D1930
                Source: C:\Users\user\AppData\Roaming\jtdteffThread created: unknown EIP: 4B11930
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeProcess created: C:\Users\user\Desktop\04ZQ5etz9i.exe "C:\Users\user\Desktop\04ZQ5etz9i.exe"
                Source: C:\Users\user\AppData\Roaming\jtdteffProcess created: C:\Users\user\AppData\Roaming\jtdteff C:\Users\user\AppData\Roaming\jtdteff
                Source: explorer.exe, 00000005.00000000.287973979.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.296126582.0000000005E60000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.277602100.0000000005610000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000005.00000000.287973979.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.287297332.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.247715846.00000000005C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000005.00000000.287973979.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.248011519.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.272014080.0000000000B50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager,
                Source: explorer.exe, 00000005.00000000.287973979.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.248011519.0000000000B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.272014080.0000000000B50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: GetCursorInfo,CharUpperA,GetConsoleAliasesLengthW,GetDefaultCommConfigW,GetProfileSectionW,_puts,GetFileInformationByHandle,_realloc,_realloc,_realloc,_fseek,SetCalendarInfoA,SetCurrentDirectoryA,BuildCommDCBAndTimeoutsW,CreateFileW,OpenJobObjectA,WriteConsoleOutputCharacterA,MapUserPhysicalPages,AddAtomA,GetThreadPriority,GetFullPathNameW,FindNextVolumeMountPointW,FillConsoleOutputCharacterA,EnumResourceNamesW,OpenWaitableTimerA,LocalSize,_hwrite,GetPrivateProfileStructW,GetComputerNameW,EnumDateFormatsExW,GetConsoleAliasesW,GetComputerNameW,GetConsoleTitleA,GetSystemWindowsDirectoryW,SetCalendarInfoW,GetFileAttributesA,HeapLock,lstrcpyW,LocalAlloc,GetConsoleFontSize,EnumDateFormatsW,ConvertThreadToFiber,InterlockedCompareExchange,VerifyVersionInfoA,FormatMessageW,SetCommState,FindResourceW,CreateMutexA,MoveFileA,LockFileEx,ResetEvent,FindNextFileW,GetComputerNameExW,CopyFileW,FileTimeToSystemTime,EnumSystemLocalesA,GetComputerNameW,WriteConsoleA,GlobalGetAtomNameW,LoadLibraryA,SetConsoleWindowInfo,GetCPInfoExW,EnumResourceLanguagesA,TerminateProcess,TerminateProcess,GetDiskFreeSpaceExW,GetPrivateProfileStructW,GetConsoleAliasW,lstrcpyA,GetOEMCP,TerminateProcess,VirtualAlloc,GetComputerNameA,GetModuleHandleW,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: GetLocaleInfoA,
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004096C0 GetComputerNameW,LoadLibraryA,LoadLibraryW,GetProcAddress,VerifyVersionInfoW,SetLastError,DebugBreak,GetConsoleAliasExesLengthW,GetPrivateProfileIntA,GetLastError,GetSystemWow64DirectoryW,IsDBCSLeadByte,CreateMailslotA,GetStartupInfoW,InterlockedExchangeAdd,_hwrite,HeapSize,VerifyVersionInfoW,InterlockedIncrement,InterlockedIncrement,AddAtomA,WriteProfileSectionW,GetConsoleAliasesLengthW,GetSystemDefaultLangID,CreateNamedPipeW,LoadLibraryA,GetOverlappedResult,FindNextVolumeW,LeaveCriticalSection,GetModuleHandleW,FormatMessageW,CreateActCtxA,CopyFileW,GetConsoleTitleW,VerifyVersionInfoW,InterlockedIncrement,InterlockedExchange,InterlockedIncrement,GetCommandLineW,SetLastError,MoveFileWithProgressW,VerifyVersionInfoA,
                Source: C:\Users\user\Desktop\04ZQ5etz9i.exeCode function: 0_2_004159B0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.04ZQ5etz9i.exe.4815a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.04ZQ5etz9i.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.jtdteff.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.jtdteff.6f15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.04ZQ5etz9i.exe.4815a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.04ZQ5etz9i.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.04ZQ5etz9i.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.jtdteff.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.jtdteff.6f15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                513
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory331
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)513
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Deobfuscate/Decode Files or Information
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials15
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 678602 Sample: 04ZQ5etz9i.exe Startdate: 04/08/2022 Architecture: WINDOWS Score: 100 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus detection for URL or domain 2->32 34 Yara detected SmokeLoader 2->34 36 3 other signatures 2->36 7 04ZQ5etz9i.exe 2->7         started        10 jtdteff 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 04ZQ5etz9i.exe 7->12         started        50 Machine Learning detection for dropped file 10->50 15 jtdteff 10->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 34.118.39.10, 49768, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\jtdteff, PE32 17->22 dropped 24 C:\Users\user\...\jtdteff:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                04ZQ5etz9i.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\jtdteff100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                1.0.04ZQ5etz9i.exe.400000.0.unpack100%AviraHEUR/AGEN.1228923Download File
                1.0.04ZQ5etz9i.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.04ZQ5etz9i.exe.400000.2.unpack100%AviraHEUR/AGEN.1228923Download File
                21.0.jtdteff.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                21.0.jtdteff.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.04ZQ5etz9i.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.04ZQ5etz9i.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.2.04ZQ5etz9i.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.04ZQ5etz9i.exe.400000.1.unpack100%AviraHEUR/AGEN.1228923Download File
                1.0.04ZQ5etz9i.exe.400000.3.unpack100%AviraHEUR/AGEN.1228923Download File
                0.2.04ZQ5etz9i.exe.4815a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                20.2.jtdteff.6f15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                21.2.jtdteff.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                21.0.jtdteff.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                34.118.39.10
                truetrue
                  unknown
                  host-host-file8.com
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    34.118.39.10
                    host-file-host6.comUnited States
                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:678602
                    Start date and time: 04/08/202209:36:112022-08-04 09:36:11 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 22s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:04ZQ5etz9i.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:30
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@4/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 83.7% (good quality ratio 78.1%)
                    • Quality average: 74.7%
                    • Quality standard deviation: 30.8%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    09:38:08Task SchedulerRun new task: Firefox Default Browser Agent 14075C06E1FEED28 path: C:\Users\user\AppData\Roaming\jtdteff
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):346624
                    Entropy (8bit):6.355322829319774
                    Encrypted:false
                    SSDEEP:6144:kbielRAT0GZkAMOHG/HBCssiXE8du+9W0U:kmehKkZOHGfBCsG29W
                    MD5:785D9D53C4B721385E9E5F51A4846791
                    SHA1:751B17AB9FAE896ED414F42DACD885BD75A83F46
                    SHA-256:6716B20272E1B5EC3A6D86F9144AF69E1615EFDAB035E130B654757B36E8B84F
                    SHA-512:C96CF6B70332FBFB0F0E55674843082A1AF5F88447D0E8FAA7351CF59B54080139F91745DAE07558C168802690628D86D0CEFEC97B50F3F0A05F6792BE923581
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1.,1.,1.,/.2,&.,/.$,..,.%.,4.,1.,..,/.#,..,/.3,0.,/.6,0.,Rich1.,................PE..L....r#`................."...................@....@..........................0.......T....................................... ..<.... ..................................................................@............................................text...Z .......".................. ..`.data........@.......&..............@....cuheb...............4..............@....rilez...............6..............@....kibu................:..............@....vitid...............>..............@....rsrc........ .......@..............@..@........................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.355322829319774
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.83%
                    • Windows Screen Saver (13104/52) 0.13%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:04ZQ5etz9i.exe
                    File size:346624
                    MD5:785d9d53c4b721385e9e5f51a4846791
                    SHA1:751b17ab9fae896ed414f42dacd885bd75a83f46
                    SHA256:6716b20272e1b5ec3a6d86f9144af69e1615efdab035e130b654757b36e8b84f
                    SHA512:c96cf6b70332fbfb0f0e55674843082a1af5f88447d0e8faa7351cf59b54080139f91745dae07558c168802690628d86d0cefec97b50f3f0a05f6792be923581
                    SSDEEP:6144:kbielRAT0GZkAMOHG/HBCssiXE8du+9W0U:kmehKkZOHGfBCsG29W
                    TLSH:0574AE40BBA0D43DE1F312F4B97A83A8B52D7EA15B7410CB52D62AEE56346E0EC75307
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1..,1..,1..,/.2,&..,/.$,...,.%.,4..,1..,...,/.#,...,/.3,0..,/.6,0..,Rich1..,................PE..L....r#`.................".
                    Icon Hash:aedaae9ecea62aa2
                    Entrypoint:0x40b2a0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6023728D [Wed Feb 10 05:43:41 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:9da6af138aaaf087a1ce609a65e93d9a
                    Instruction
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    call 00007FE788C6911Bh
                    call 00007FE788C5EA26h
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    push FFFFFFFEh
                    push 004318A0h
                    push 0040EF30h
                    mov eax, dword ptr fs:[00000000h]
                    push eax
                    add esp, FFFFFF94h
                    push ebx
                    push esi
                    push edi
                    mov eax, dword ptr [00443BD4h]
                    xor dword ptr [ebp-08h], eax
                    xor eax, ebp
                    push eax
                    lea eax, dword ptr [ebp-10h]
                    mov dword ptr fs:[00000000h], eax
                    mov dword ptr [ebp-18h], esp
                    mov dword ptr [ebp-70h], 00000000h
                    mov dword ptr [ebp-04h], 00000000h
                    lea eax, dword ptr [ebp-60h]
                    push eax
                    call dword ptr [004011D0h]
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    jmp 00007FE788C5EA38h
                    mov eax, 00000001h
                    ret
                    mov esp, dword ptr [ebp-18h]
                    mov dword ptr [ebp-78h], 000000FFh
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    mov eax, dword ptr [ebp-78h]
                    jmp 00007FE788C5EB68h
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    call 00007FE788C5EBA4h
                    mov dword ptr [ebp-6Ch], eax
                    push 00000001h
                    call 00007FE788C6A3EAh
                    add esp, 04h
                    test eax, eax
                    jne 00007FE788C5EA1Ch
                    push 0000001Ch
                    call 00007FE788C5EB5Ch
                    add esp, 04h
                    call 00007FE788C66EF4h
                    test eax, eax
                    jne 00007FE788C5EA1Ch
                    push 00000010h
                    Programming Language:
                    • [ASM] VS2008 build 21022
                    • [ C ] VS2008 build 21022
                    • [IMP] VS2005 build 50727
                    • [C++] VS2008 build 21022
                    • [RES] VS2008 build 21022
                    • [LNK] VS2008 build 21022
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x320040x3c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x108d0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x13100x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x8f180x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x2bc.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x3205a0x32200False0.3747418562967581data5.747276658789658IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x340000x19d880x10e00False0.9295717592592593data7.777144287546035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .cuheb0x4e0000x50x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rilez0x4f0000x4000x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .kibu0x500000x4000x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .vitid0x510000x960x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x520000x108d00x10a00False0.5496211231203008data5.486118535451178IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x526300x6c8dataKoreanNorth Korea
                    RT_ICON0x526300x6c8dataKoreanSouth Korea
                    RT_ICON0x52cf80x568GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x52cf80x568GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x532600x10a8dataKoreanNorth Korea
                    RT_ICON0x532600x10a8dataKoreanSouth Korea
                    RT_ICON0x543080x988dBase III DBT, version number 0, next free block index 40KoreanNorth Korea
                    RT_ICON0x543080x988dBase III DBT, version number 0, next free block index 40KoreanSouth Korea
                    RT_ICON0x54c900x468GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x54c900x468GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x551480x8a8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanNorth Korea
                    RT_ICON0x551480x8a8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanSouth Korea
                    RT_ICON0x559f00x6c8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanNorth Korea
                    RT_ICON0x559f00x6c8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"KoreanSouth Korea
                    RT_ICON0x560b80x568GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x560b80x568GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x566200x10a8dataKoreanNorth Korea
                    RT_ICON0x566200x10a8dataKoreanSouth Korea
                    RT_ICON0x576c80x988dataKoreanNorth Korea
                    RT_ICON0x576c80x988dataKoreanSouth Korea
                    RT_ICON0x580500x468GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x580500x468GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x585180x25a8dataKoreanNorth Korea
                    RT_ICON0x585180x25a8dataKoreanSouth Korea
                    RT_ICON0x5aac00x10a8dataKoreanNorth Korea
                    RT_ICON0x5aac00x10a8dataKoreanSouth Korea
                    RT_ICON0x5bb900xea8dataKoreanNorth Korea
                    RT_ICON0x5bb900xea8dataKoreanSouth Korea
                    RT_ICON0x5ca380x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 8305227, next used block 8370799KoreanNorth Korea
                    RT_ICON0x5ca380x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 8305227, next used block 8370799KoreanSouth Korea
                    RT_ICON0x5d2e00x6c8dataKoreanNorth Korea
                    RT_ICON0x5d2e00x6c8dataKoreanSouth Korea
                    RT_ICON0x5d9a80x568GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x5d9a80x568GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_ICON0x5df100x25a8dataKoreanNorth Korea
                    RT_ICON0x5df100x25a8dataKoreanSouth Korea
                    RT_ICON0x604b80x10a8dataKoreanNorth Korea
                    RT_ICON0x604b80x10a8dataKoreanSouth Korea
                    RT_ICON0x615600x988dataKoreanNorth Korea
                    RT_ICON0x615600x988dataKoreanSouth Korea
                    RT_ICON0x61ee80x468GLS_BINARY_LSB_FIRSTKoreanNorth Korea
                    RT_ICON0x61ee80x468GLS_BINARY_LSB_FIRSTKoreanSouth Korea
                    RT_STRING0x625d80xacdataKoreanNorth Korea
                    RT_STRING0x625d80xacdataKoreanSouth Korea
                    RT_STRING0x626880x246dataKoreanNorth Korea
                    RT_STRING0x626880x246dataKoreanSouth Korea
                    RT_ACCELERATOR0x624380x60dataKoreanNorth Korea
                    RT_ACCELERATOR0x624380x60dataKoreanSouth Korea
                    RT_ACCELERATOR0x623c80x70dataKoreanNorth Korea
                    RT_ACCELERATOR0x623c80x70dataKoreanSouth Korea
                    RT_GROUP_ICON0x5bb680x22dataKoreanNorth Korea
                    RT_GROUP_ICON0x5bb680x22dataKoreanSouth Korea
                    RT_GROUP_ICON0x584b80x5adataKoreanNorth Korea
                    RT_GROUP_ICON0x584b80x5adataKoreanSouth Korea
                    RT_GROUP_ICON0x623500x76dataKoreanNorth Korea
                    RT_GROUP_ICON0x623500x76dataKoreanSouth Korea
                    RT_GROUP_ICON0x550f80x4cdataKoreanNorth Korea
                    RT_GROUP_ICON0x550f80x4cdataKoreanSouth Korea
                    RT_VERSION0x624980x13cdataKoreanNorth Korea
                    RT_VERSION0x624980x13cdataKoreanSouth Korea
                    DLLImport
                    KERNEL32.dlllstrcatA, LocalSize, VerifyVersionInfoA, VerifyVersionInfoW, WriteConsoleInputW, EnumDateFormatsW, FindNextFileW, CopyFileExA, DnsHostnameToComputerNameW, ReadConsoleOutputCharacterW, SetConsoleActiveScreenBuffer, LockFile, GetProfileSectionW, QueryDosDeviceW, IsSystemResumeAutomatic, GetProcessPriorityBoost, GetDriveTypeW, GlobalGetAtomNameA, lstrlenA, FindNextVolumeMountPointW, TlsGetValue, SizeofResource, WriteConsoleInputA, GetConsoleTitleA, GetComputerNameExW, OpenEventA, CallNamedPipeW, GetModuleHandleW, GetSystemDirectoryA, SetCurrentDirectoryA, BuildCommDCBAndTimeoutsA, GetProcAddress, LoadLibraryA, MoveFileWithProgressW, GetCommandLineW, InterlockedExchange, GetConsoleTitleW, CopyFileW, CreateActCtxA, FormatMessageW, LeaveCriticalSection, FindNextVolumeW, GetOverlappedResult, CreateNamedPipeW, GetSystemDefaultLangID, GetConsoleAliasesLengthW, WriteProfileSectionW, AddAtomA, InterlockedIncrement, HeapSize, _hwrite, InterlockedExchangeAdd, GetStartupInfoW, CreateMailslotA, IsDBCSLeadByte, GetSystemWow64DirectoryW, GetLastError, GetPrivateProfileIntA, GetConsoleAliasExesLengthW, DebugBreak, SetLastError, LoadLibraryW, GetComputerNameA, VirtualAlloc, GetOEMCP, lstrcpyA, GetConsoleAliasW, GetDiskFreeSpaceExW, TerminateProcess, EnumResourceLanguagesA, GetCPInfoExW, SetConsoleWindowInfo, GlobalGetAtomNameW, WriteConsoleA, EnumSystemLocalesA, FileTimeToSystemTime, ResetEvent, LockFileEx, MoveFileA, CreateMutexA, FindResourceW, SetCommState, InterlockedCompareExchange, ConvertThreadToFiber, GetConsoleFontSize, LocalAlloc, lstrcpyW, HeapLock, GetFileAttributesA, SetCalendarInfoW, GetSystemWindowsDirectoryW, GetConsoleAliasesW, EnumDateFormatsExW, GetComputerNameW, GetPrivateProfileStructW, OpenWaitableTimerA, EnumResourceNamesW, FillConsoleOutputCharacterA, GetFullPathNameW, GetThreadPriority, MapUserPhysicalPages, WriteConsoleOutputCharacterA, OpenJobObjectA, CreateFileW, BuildCommDCBAndTimeoutsW, SetCalendarInfoA, GetFileInformationByHandle, GetDefaultCommConfigW, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, RaiseException, RtlUnwind, GetCommandLineA, GetStartupInfoA, HeapValidate, IsBadReadPtr, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameW, GetCurrentProcess, IsDebuggerPresent, GetModuleHandleA, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, SetFilePointer, SetHandleCount, GetStdHandle, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, ExitProcess, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapDestroy, HeapCreate, HeapFree, VirtualFree, WriteFile, HeapAlloc, HeapReAlloc, GetACP, GetCPInfo, IsValidCodePage, FlushFileBuffers, GetConsoleCP, GetConsoleMode, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, InitializeCriticalSectionAndSpinCount, SetStdHandle, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleOutputCP, CloseHandle, CreateFileA
                    USER32.dllCharUpperA, GetCursorInfo
                    Language of compilation systemCountry where language is spokenMap
                    KoreanNorth Korea
                    KoreanSouth Korea
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 4, 2022 09:38:07.691579103 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:07.728035927 CEST804976834.118.39.10192.168.2.4
                    Aug 4, 2022 09:38:07.728180885 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:07.728344917 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:07.728353024 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:07.764966965 CEST804976834.118.39.10192.168.2.4
                    Aug 4, 2022 09:38:07.858201027 CEST804976834.118.39.10192.168.2.4
                    Aug 4, 2022 09:38:08.059257984 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:37.858741045 CEST804976834.118.39.10192.168.2.4
                    Aug 4, 2022 09:38:37.858876944 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:37.858978033 CEST4976880192.168.2.434.118.39.10
                    Aug 4, 2022 09:38:37.895512104 CEST804976834.118.39.10192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 4, 2022 09:38:07.363244057 CEST6427753192.168.2.48.8.8.8
                    Aug 4, 2022 09:38:07.655704975 CEST53642778.8.8.8192.168.2.4
                    Aug 4, 2022 09:38:07.868459940 CEST5607653192.168.2.48.8.8.8
                    Aug 4, 2022 09:38:08.871870041 CEST5607653192.168.2.48.8.8.8
                    Aug 4, 2022 09:38:09.872922897 CEST5607653192.168.2.48.8.8.8
                    Aug 4, 2022 09:38:11.895647049 CEST53560768.8.8.8192.168.2.4
                    Aug 4, 2022 09:38:12.898232937 CEST53560768.8.8.8192.168.2.4
                    Aug 4, 2022 09:38:14.069996119 CEST53560768.8.8.8192.168.2.4
                    TimestampSource IPDest IPChecksumCodeType
                    Aug 4, 2022 09:38:12.898369074 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
                    Aug 4, 2022 09:38:14.070182085 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Aug 4, 2022 09:38:07.363244057 CEST192.168.2.48.8.8.80xb1b8Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Aug 4, 2022 09:38:07.868459940 CEST192.168.2.48.8.8.80x8843Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 4, 2022 09:38:08.871870041 CEST192.168.2.48.8.8.80x8843Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 4, 2022 09:38:09.872922897 CEST192.168.2.48.8.8.80x8843Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 4, 2022 09:38:07.655704975 CEST8.8.8.8192.168.2.40xb1b8No error (0)host-file-host6.com34.118.39.10A (IP address)IN (0x0001)
                    Aug 4, 2022 09:38:11.895647049 CEST8.8.8.8192.168.2.40x8843Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 4, 2022 09:38:12.898232937 CEST8.8.8.8192.168.2.40x8843Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 4, 2022 09:38:14.069996119 CEST8.8.8.8192.168.2.40x8843Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • nwvsnnm.org
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.44976834.118.39.1080C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Aug 4, 2022 09:38:07.728344917 CEST1155OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://nwvsnnm.org/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 247
                    Host: host-file-host6.com
                    Aug 4, 2022 09:38:07.858201027 CEST1155INHTTP/1.1 200 OK
                    server: nginx/1.20.1
                    date: Thu, 04 Aug 2022 07:38:07 GMT
                    content-type: text/html; charset=UTF-8
                    transfer-encoding: chunked
                    Data Raw: 46 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: FYour IP blocked0


                    Click to jump to process

                    Target ID:0
                    Start time:09:37:12
                    Start date:04/08/2022
                    Path:C:\Users\user\Desktop\04ZQ5etz9i.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\04ZQ5etz9i.exe"
                    Imagebase:0x400000
                    File size:346624 bytes
                    MD5 hash:785D9D53C4B721385E9E5F51A4846791
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.235932667.00000000006B6000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    Reputation:low

                    Target ID:1
                    Start time:09:37:14
                    Start date:04/08/2022
                    Path:C:\Users\user\Desktop\04ZQ5etz9i.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\04ZQ5etz9i.exe"
                    Imagebase:0x400000
                    File size:346624 bytes
                    MD5 hash:785D9D53C4B721385E9E5F51A4846791
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.315316799.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.315100572.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:low

                    Target ID:5
                    Start time:09:37:21
                    Start date:04/08/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff6f3b00000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000000.288381644.00000000024D1000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                    Reputation:high

                    Target ID:20
                    Start time:09:38:08
                    Start date:04/08/2022
                    Path:C:\Users\user\AppData\Roaming\jtdteff
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\jtdteff
                    Imagebase:0x400000
                    File size:346624 bytes
                    MD5 hash:785D9D53C4B721385E9E5F51A4846791
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000014.00000002.357473381.0000000000766000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low

                    Target ID:21
                    Start time:09:38:11
                    Start date:04/08/2022
                    Path:C:\Users\user\AppData\Roaming\jtdteff
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\jtdteff
                    Imagebase:0x400000
                    File size:346624 bytes
                    MD5 hash:785D9D53C4B721385E9E5F51A4846791
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000015.00000002.369606256.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000015.00000002.369783218.0000000002091000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                    Reputation:low

                    No disassembly