Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DCwTjs2dTP.exe

Overview

General Information

Sample Name:DCwTjs2dTP.exe
Analysis ID:679101
MD5:2ed2a1d6604afeaa681f4c66dcd84194
SHA1:6134d837220afe9377cd78950c8aca43dde08d8c
SHA256:2a48fa5118bf1c97de6a6b7b0a45bcc95bd678d54f31e2f2d003e5f3ea49c780
Tags:DCRatexeRAT
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected DcRat
Yara detected AsyncRAT
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for sample
Yara detected Generic Downloader
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores large binary data to the registry
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • DCwTjs2dTP.exe (PID: 5664 cmdline: "C:\Users\user\Desktop\DCwTjs2dTP.exe" MD5: 2ED2A1D6604AFEAA681F4C66DCD84194)
    • cmd.exe (PID: 2612 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5128 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 6128 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat"" MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 5344 cmdline: timeout 3 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
      • sihost.exe (PID: 5352 cmdline: "C:\Users\user\AppData\Roaming\sihost.exe" MD5: 2ED2A1D6604AFEAA681F4C66DCD84194)
  • cleanup
{"Server": "techandro.giize.com,hsolic.duckdns.org", "Ports": "6906,6907", "Version": " 1.0.7", "Autorun": "true", "Install_Folder": "%AppData%", "Install_File": "sihost.exe", "AES_key": "w28XgttPSPRfTrqDPtKQKIftMUNaIi1O", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "ZbnE26z/kUoafAYsNOaYAdifPsyY0NUimw56hYN83bmpUDLwVLP2BeWbnk3Mb+RyC7+/9H+auM6ptQK6ib0j+DbOdeQNsf+okOIez8zETDI0UKu51c+FUimCHgyZK+I5Z5tXrRFLS4JhVTH6rhdkluo83hNFkwm6R8TV62hDMtE=", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "1", "Group": "Default", "AntiProcess": "false", "AntiVM": "false"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x115fbc:$b2: DcRat By qwqdanchun1
SourceRuleDescriptionAuthorStrings
0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x111f7:$b2: DcRat By qwqdanchun1
  • 0x20733:$b2: DcRat By qwqdanchun1
  • 0x20977:$b2: DcRat By qwqdanchun1
  • 0x24e4b:$b2: DcRat By qwqdanchun1
0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
  • 0x3175d:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
  • 0x316ac:$s2: L2Mgc2NodGFza3MgL2
0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
    0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x28bb:$b2: DcRat By qwqdanchun1
    • 0x8cf3:$b2: DcRat By qwqdanchun1
    • 0x8f2f:$b2: DcRat By qwqdanchun1
    00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      Click to see the 19 entries
      SourceRuleDescriptionAuthorStrings
      0.2.DCwTjs2dTP.exe.abb0000.4.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        0.2.DCwTjs2dTP.exe.abb0000.4.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
        • 0xb33e:$q1: Select * from Win32_CacheMemory
        • 0xb37e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
        • 0xb3cc:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
        • 0xb41a:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
        0.2.DCwTjs2dTP.exe.abb0000.4.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
        • 0xb97a:$s1: DcRatBy
        0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 6 entries
            No Sigma rule has matched
            Timestamp:182.186.88.126192.168.2.36906497402848152 08/05/22-09:16:42.961653
            SID:2848152
            Source Port:6906
            Destination Port:49740
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: DCwTjs2dTP.exeReversingLabs: Detection: 50%
            Source: DCwTjs2dTP.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\sihost.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
            Source: C:\Users\user\AppData\Roaming\sihost.exeReversingLabs: Detection: 50%
            Source: DCwTjs2dTP.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\sihost.exeJoe Sandbox ML: detected
            Source: 0.0.DCwTjs2dTP.exe.b10000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "techandro.giize.com,hsolic.duckdns.org", "Ports": "6906,6907", "Version": " 1.0.7", "Autorun": "true", "Install_Folder": "%AppData%", "Install_File": "sihost.exe", "AES_key": "w28XgttPSPRfTrqDPtKQKIftMUNaIi1O", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "ZbnE26z/kUoafAYsNOaYAdifPsyY0NUimw56hYN83bmpUDLwVLP2BeWbnk3Mb+RyC7+/9H+auM6ptQK6ib0j+DbOdeQNsf+okOIez8zETDI0UKu51c+FUimCHgyZK+I5Z5tXrRFLS4JhVTH6rhdkluo83hNFkwm6R8TV62hDMtE=", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "1", "Group": "Default", "AntiProcess": "false", "AntiVM": "false"}
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABC4E4C CryptFindOIDInfo,
            Source: DCwTjs2dTP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2848152 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant) 182.186.88.126:6906 -> 192.168.2.3:49740
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Malware configuration extractorURLs: techandro.giize.com
            Source: Malware configuration extractorURLs: hsolic.duckdns.org
            Source: Joe Sandbox ViewASN Name: PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK
            Source: global trafficTCP traffic: 192.168.2.3:49740 -> 182.186.88.126:6906
            Source: sihost.exe, 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: sihost.exe, 0000000A.00000002.521463363.0000000000E80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.10.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: sihost.exe, 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabw
            Source: DCwTjs2dTP.exe, 00000000.00000002.533258191.0000000003196000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.531132514.0000000002CEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: unknownDNS traffic detected: queries for: techandro.giize.com

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: sihost.exe, 0000000A.00000002.520705153.0000000000E4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 10.2.sihost.exe.54d0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 10.2.sihost.exe.3b4cbb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 10.2.sihost.exe.3b4cbb0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 10.2.sihost.exe.54d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.546757964.000000000A90A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.527734779.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000003.516805151.000000000A8F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.540094195.000000000478F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.526006194.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000003.516841569.000000000A90B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.521245478.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 10.2.sihost.exe.54d0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 10.2.sihost.exe.3b4cbb0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 10.2.sihost.exe.3b4cbb0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 10.2.sihost.exe.54d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.546757964.000000000A90A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.527734779.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000003.516805151.000000000A8F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.540094195.000000000478F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.526006194.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000003.516841569.000000000A90B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.521245478.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01364138
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01361F10
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01362D10
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01363230
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367C38
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01362840
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0136804F
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01360448
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013622B0
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01365BA8
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01360390
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01365B99
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013641F9
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013641D1
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01366231
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01366638
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01364227
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01366428
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01366628
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367C28
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01366419
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0136420C
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367464
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01365068
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367468
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01361268
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01361E58
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01365058
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01366240
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01364040
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013642F3
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF1BDD
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF1F98
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF0E88
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF0E78
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293322B
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937A50
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02932840
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02930448
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293804F
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02931F10
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02932D10
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02934138
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_029342F3
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02936419
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293420C
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02936231
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02931237
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937A3A
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02936638
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02934227
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02936428
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02936628
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02931E58
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02935058
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937442
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02936240
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02934040
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02935068
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937468
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02935B99
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02935BA8
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_029341D1
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_029341F9
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B39458
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B3DDF0
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B38330
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B38320
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B32BD0
            Source: DCwTjs2dTP.exeBinary or memory string: OriginalFilename vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.540773912.00000000047DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe" vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.541024622.000000000482A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000000.250219025.0000000000B36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.540124638.0000000004791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exeBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: sihost.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: DCwTjs2dTP.exeReversingLabs: Detection: 50%
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile read: C:\Users\user\Desktop\DCwTjs2dTP.exe:Zone.IdentifierJump to behavior
            Source: DCwTjs2dTP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\DCwTjs2dTP.exe "C:\Users\user\Desktop\DCwTjs2dTP.exe"
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\sihost.exe "C:\Users\user\AppData\Roaming\sihost.exe"
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\sihost.exe "C:\Users\user\AppData\Roaming\sihost.exe"
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile created: C:\Users\user\AppData\Roaming\sihost.exeJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53F0.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.winEXE@14/6@1/1
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: DCwTjs2dTP.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\sihost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3404:120:WilError_01
            Source: C:\Users\user\AppData\Roaming\sihost.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5256:120:WilError_01
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: DCwTjs2dTP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: DCwTjs2dTP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABB0EAE push 0000003Eh; retn 0000h
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABB2FD4 push eax; ret
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABB13C9 push eax; ret
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367240 pushfd ; ret
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937240 pushfd ; ret
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0523C7F0 push eax; mov dword ptr [esp], edx
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0523E190 push eax; mov dword ptr [esp], edx
            Source: DCwTjs2dTP.exeStatic PE information: 0xF60FB06B [Tue Oct 26 08:42:19 2100 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.625943654905051
            Source: initial sampleStatic PE information: section name: .text entropy: 7.625943654905051
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile created: C:\Users\user\AppData\Roaming\sihost.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
            Source: C:\Users\user\AppData\Roaming\sihost.exeKey value created or modified: HKEY_CURRENT_USER\Software\C4D93783EC1A25CC28F9 94E168CABBEA0702E60265D1291BE8FE7C37724D89001E7AE9A73817F84114EFJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exe TID: 5180Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exe TID: 5660Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 5164Thread sleep time: -30000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 5192Thread sleep time: -1844674407370954s >= -30000s
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 5192Thread sleep count: 90 > 30
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 1892Thread sleep count: 9743 > 30
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\sihost.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\sihost.exeWindow / User API: threadDelayed 9743
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\sihost.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile Volume queried: C:\ FullSizeInformation
            Source: sihost.exe, 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}r\
            Source: sihost.exe, 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_02EC9028 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\sihost.exe "C:\Users\user\AppData\Roaming\sihost.exe"
            Source: sihost.exe, 0000000A.00000002.532020880.0000000002D67000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.531872890.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeQueries volume information: C:\Users\user\Desktop\DCwTjs2dTP.exe VolumeInformation
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformation
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformation
            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Users\user\AppData\Roaming\sihost.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\sihost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: DCwTjs2dTP.exe, DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: MSASCui.exe
            Source: DCwTjs2dTP.exe, DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: procexp.exe
            Source: DCwTjs2dTP.exe, DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Windows Management Instrumentation
            2
            Scheduled Task/Job
            12
            Process Injection
            1
            Masquerading
            1
            Input Capture
            1
            Query Registry
            Remote Services1
            Input Capture
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts2
            Scheduled Task/Job
            Boot or Logon Initialization Scripts2
            Scheduled Task/Job
            1
            Modify Registry
            LSASS Memory121
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain Accounts1
            Scripting
            Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)21
            Virtualization/Sandbox Evasion
            NTDS21
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureScheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Scripting
            Cached Domain Credentials1
            Remote System Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items12
            Obfuscated Files or Information
            DCSync1
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
            Software Packing
            Proc Filesystem13
            System Information Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            Timestomp
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 679101 Sample: DCwTjs2dTP.exe Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 6 other signatures 2->45 7 DCwTjs2dTP.exe 9 2->7         started        process3 file4 27 C:\Users\user\AppData\Roaming\sihost.exe, PE32 7->27 dropped 29 C:\Users\user\AppData\...\DCwTjs2dTP.exe.log, ASCII 7->29 dropped 10 cmd.exe 1 7->10         started        12 cmd.exe 1 7->12         started        process5 signatures6 15 sihost.exe 2 4 10->15         started        19 conhost.exe 10->19         started        21 timeout.exe 1 10->21         started        47 Uses schtasks.exe or at.exe to add and modify task schedules 12->47 23 conhost.exe 12->23         started        25 schtasks.exe 1 12->25         started        process7 dnsIp8 31 techandro.giize.com 182.186.88.126, 49740, 49799, 6906 PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK Pakistan 15->31 33 Antivirus detection for dropped file 15->33 35 Multi AV Scanner detection for dropped file 15->35 37 Machine Learning detection for dropped file 15->37 signatures9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            DCwTjs2dTP.exe50%ReversingLabsByteCode-MSIL.Backdoor.Crysan
            DCwTjs2dTP.exe100%AviraTR/Dropper.MSIL.Gen
            DCwTjs2dTP.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\sihost.exe100%AviraTR/Dropper.MSIL.Gen
            C:\Users\user\AppData\Roaming\sihost.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\sihost.exe50%ReversingLabsByteCode-MSIL.Backdoor.Crysan
            SourceDetectionScannerLabelLinkDownload
            0.0.DCwTjs2dTP.exe.b10000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            hsolic.duckdns.org0%Avira URL Cloudsafe
            techandro.giize.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            techandro.giize.com
            182.186.88.126
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              hsolic.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              techandro.giize.comtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDCwTjs2dTP.exe, 00000000.00000002.533258191.0000000003196000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.531132514.0000000002CEE000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                182.186.88.126
                techandro.giize.comPakistan
                45595PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPKtrue
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679101
                Start date and time: 05/08/202209:15:112022-08-05 09:15:11 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 20s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:DCwTjs2dTP.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:35
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.winEXE@14/6@1/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 5.7% (good quality ratio 4.1%)
                • Quality average: 53.9%
                • Quality standard deviation: 40%
                HCA Information:
                • Successful, ratio: 94%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                • TCP Packets have been reduced to 100
                • Excluded IPs from analysis (whitelisted): 23.211.6.115, 173.222.108.226, 20.189.173.21
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                09:16:25Task SchedulerRun new task: sihost path: "C:\Users\user\AppData\Roaming\sihost.exe"
                09:16:44API Interceptor1x Sleep call for process: sihost.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\AppData\Roaming\sihost.exe
                File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                Category:dropped
                Size (bytes):61712
                Entropy (8bit):7.995044632446497
                Encrypted:true
                SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                MD5:589C442FC7A0C70DCA927115A700D41E
                SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                Process:C:\Users\user\AppData\Roaming\sihost.exe
                File Type:data
                Category:modified
                Size (bytes):326
                Entropy (8bit):3.1358915940078615
                Encrypted:false
                SSDEEP:6:kKku+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:rNkPlE99SNxAhUeE1
                MD5:CCCAC476B9113FEE393FAAE046C51F0B
                SHA1:C234350AFAE80DA95858F154CF4839421C1C2C62
                SHA-256:EE0601D893B6A6978040DCA0C315C7855E278DD1264DE7AF85B91CB2B4C33882
                SHA-512:81A9355BE6696ECBEAFD7ADA021F83E105AA42B61F981BCB597B6874C67847456CC7FD975348BC15E58DDDBAB64091E3DF0FE620FDCCB870FCC28C758E1CAB78
                Malicious:false
                Reputation:low
                Preview:p...... ...............(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                Process:C:\Users\user\Desktop\DCwTjs2dTP.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):425
                Entropy (8bit):5.340009400190196
                Encrypted:false
                SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                MD5:CC144808DBAF00E03294347EADC8E779
                SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                Malicious:true
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                Process:C:\Users\user\Desktop\DCwTjs2dTP.exe
                File Type:DOS batch file, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):150
                Entropy (8bit):5.092134229634079
                Encrypted:false
                SSDEEP:3:mKDDCMNqTtvL5oWXp5cViEaKC5UWvSmqRDWXp5cViE2J5xAInTRI6WcZPy:hWKqTtT6WXp+NaZ5UWKmq1WXp+N23fTg
                MD5:F02730A3503455275DA10EFB33B82C09
                SHA1:76322B42303DBB065740A423FB414CEF653671E5
                SHA-256:09BE09339F9A333B4BA5580D3F6F6E9E928A5A13A1C6448631FAFB1AB0332D6D
                SHA-512:FE402C93721D335BFD90E8D1C2760D0BE95BA95F32FF7675F3B3A465192B5F766ECE30E472D91DAB5F262A4BDB2892854CB1C01E2BC84C6E20CB34EBBFEC96F4
                Malicious:false
                Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\sihost.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp53F0.tmp.bat" /f /q..
                Process:C:\Users\user\Desktop\DCwTjs2dTP.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):144384
                Entropy (8bit):7.592025541663874
                Encrypted:false
                SSDEEP:1536:kbe1mZ5AK6G/WV+22ihLk3jb6B4LGt/XzNNu0oTj7A64MWy/ASOlvL4h59MfoZ+G:ZiLe+22iUXlGlXRN+zA6cQAp+ofoZ+G
                MD5:2ED2A1D6604AFEAA681F4C66DCD84194
                SHA1:6134D837220AFE9377CD78950C8ACA43DDE08D8C
                SHA-256:2A48FA5118BF1C97DE6A6B7B0A45BCC95BD678D54F31E2F2D003E5F3EA49C780
                SHA-512:B6DC02F1974D0D90B171432156B85044AB67B51C00C9A6F2CE98562342DD2AFB64AC36AE57E291D37DA0DB564C7191567183917971455969D9EB930C920E8979
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 50%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k............."...0..*...........I... ...`....@.. ....................................`..................................H..W....`............................................................................... ............... ..H............text....)... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B.................H......H...........$l......;....................................................i,.7.=.v.":.....`.t.......>D.5./dos..D+..w..5...<Dp..=?.{....3eKn...f.Q....y......,.>\..8..R:+^H..6..l..H.W"..Y...TVf./..,.w..p.!........S.....x&.1...f.V...u..3O.....X.6xmb.....x.T..IwEY.t.%5..5....1Ca....|1.Z1.gW..sa..E..+.w..x7=..N...8QY5.y.H....L..OJ...2.......<=..=cx.M....s..F...^....S...5........O.....?S.AU.s......:..........@..(=.Nt...q.4!..I......j.R|..t.b...GA.{.7..i(.I.G2..z.u..y.6
                Process:C:\Windows\SysWOW64\timeout.exe
                File Type:ASCII text, with CRLF line terminators, with overstriking
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.41440934524794
                Encrypted:false
                SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                MD5:3DD7DD37C304E70A7316FE43B69F421F
                SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                Malicious:false
                Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.592025541663874
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:DCwTjs2dTP.exe
                File size:144384
                MD5:2ed2a1d6604afeaa681f4c66dcd84194
                SHA1:6134d837220afe9377cd78950c8aca43dde08d8c
                SHA256:2a48fa5118bf1c97de6a6b7b0a45bcc95bd678d54f31e2f2d003e5f3ea49c780
                SHA512:b6dc02f1974d0d90b171432156b85044ab67b51c00c9a6f2ce98562342dd2afb64ac36ae57e291d37da0db564c7191567183917971455969d9eb930c920e8979
                SSDEEP:1536:kbe1mZ5AK6G/WV+22ihLk3jb6B4LGt/XzNNu0oTj7A64MWy/ASOlvL4h59MfoZ+G:ZiLe+22iUXlGlXRN+zA6cQAp+ofoZ+G
                TLSH:D4E36B9D366036DFC867C872CAA82CA8AA50747B471BD203A45715EEDE4D99BCF050F3
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k............."...0..*...........I... ...`....@.. ....................................`................................
                Icon Hash:00828e8e8686b000
                Entrypoint:0x42490e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0xF60FB06B [Tue Oct 26 08:42:19 2100 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x248b40x57.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x596.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x280000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x229140x22a00False0.8304095216606499SysEx File - Victor7.625943654905051IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x260000x5960x600False0.412109375data4.024186334587364IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x280000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_VERSION0x260a00x30cdata
                RT_MANIFEST0x263ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                DLLImport
                mscoree.dll_CorExeMain
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                182.186.88.126192.168.2.36906497402848152 08/05/22-09:16:42.961653TCP2848152ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant)690649740182.186.88.126192.168.2.3
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 09:16:42.343604088 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:42.507725000 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:42.507963896 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:42.793518066 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:42.961652994 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:42.980221033 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:43.147313118 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:43.202167988 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:46.467544079 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:46.836049080 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:46.836447001 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:47.193211079 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.082192898 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:58.449898958 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.450030088 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:58.612859011 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.734793901 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:58.906966925 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.953510046 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:59.070375919 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:59.440320969 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:59.441751003 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:59.811695099 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:05.920444012 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:05.969835997 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:06.131196976 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:06.173055887 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.167838097 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.545608044 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:10.545766115 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.730561972 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:10.782721996 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.952214003 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:11.004468918 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:11.991069078 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:12.361207008 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:12.361320972 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:12.723164082 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:21.618616104 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:21.978775024 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:21.979440928 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:22.142467022 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:22.189888000 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:22.352082014 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:22.379858017 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:22.742747068 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:22.743539095 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:23.120084047 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:33.216279030 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:33.586165905 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:33.586325884 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:33.750921965 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:33.878433943 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:34.040781975 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:34.080080032 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:34.441732883 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:34.442347050 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:34.888081074 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:35.953671932 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:36.003654957 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:36.184784889 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:36.237941027 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:44.886441946 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:45.245990038 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:45.247559071 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:45.411969900 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:45.504420042 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:45.665941000 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:45.682383060 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:46.049994946 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:46.050144911 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:46.436414957 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:56.406936884 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:56.767236948 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:56.767338991 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:56.949023008 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:57.146131992 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:57.307141066 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:57.372817039 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:57.735706091 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:57.735805988 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:58.094325066 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:05.973809958 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:06.146740913 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:06.311863899 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:06.443659067 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.011923075 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.389894009 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:08.390151978 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.563564062 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:08.740721941 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.901375055 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:08.914977074 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:09.280356884 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:09.280605078 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:09.526557922 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:09.647113085 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:09.808506966 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:09.869719028 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.230223894 CEST690649740182.186.88.126192.168.2.3
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 09:16:42.094877958 CEST4931653192.168.2.38.8.8.8
                Aug 5, 2022 09:16:42.273111105 CEST53493168.8.8.8192.168.2.3
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 5, 2022 09:16:42.094877958 CEST192.168.2.38.8.8.80xf053Standard query (0)techandro.giize.comA (IP address)IN (0x0001)
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 5, 2022 09:16:42.273111105 CEST8.8.8.8192.168.2.30xf053No error (0)techandro.giize.com182.186.88.126A (IP address)IN (0x0001)

                Click to jump to process

                Target ID:0
                Start time:09:16:16
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\DCwTjs2dTP.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\DCwTjs2dTP.exe"
                Imagebase:0xb10000
                File size:144384 bytes
                MD5 hash:2ED2A1D6604AFEAA681F4C66DCD84194
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy, Description: Detects executables containing the string DcRatBy, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.540094195.000000000478F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.526006194.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.521245478.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:2
                Start time:09:16:24
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit
                Imagebase:0xc20000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:09:16:24
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:4
                Start time:09:16:24
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
                Imagebase:0xc20000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:09:16:25
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\schtasks.exe
                Wow64 process (32bit):true
                Commandline:schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
                Imagebase:0x920000
                File size:185856 bytes
                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:7
                Start time:09:16:25
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:8
                Start time:09:16:26
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\timeout.exe
                Wow64 process (32bit):true
                Commandline:timeout 3
                Imagebase:0x1360000
                File size:26112 bytes
                MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:10
                Start time:09:16:29
                Start date:05/08/2022
                Path:C:\Users\user\AppData\Roaming\sihost.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\sihost.exe"
                Imagebase:0x7a0000
                File size:144384 bytes
                MD5 hash:2ED2A1D6604AFEAA681F4C66DCD84194
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts, Description: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc., Source: 0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.546757964.000000000A90A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.527734779.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000003.516805151.000000000A8F3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000003.516841569.000000000A90B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 50%, ReversingLabs
                Reputation:low

                No disassembly