Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HDPh51eN5s

Overview

General Information

Sample Name:HDPh51eN5s (renamed file extension from none to exe)
Analysis ID:679249
MD5:1fb5d967f92174e0bbb15262f8cd209f
SHA1:76fbd5b88154976887b5099c21666ca3be2cd76e
SHA256:740634ecedd318ac8f84c360f5d253ff836c5e60da6542c65a140b17b4ba8024
Tags:exe
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Sigma detected: Schedule system process
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Yara detected Quasar RAT
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Drops executables to the windows directory (C:\Windows) and starts them
Uses schtasks.exe or at.exe to add and modify task schedules
PE file contains section with special chars
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)
Contains functionality to detect virtual machines (SGDT)

Classification

  • System is w10x64
  • HDPh51eN5s.exe (PID: 4684 cmdline: "C:\Users\user\Desktop\HDPh51eN5s.exe" MD5: 1FB5D967F92174E0BBB15262F8CD209F)
    • schtasks.exe (PID: 2916 cmdline: "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Users\user\Desktop\HDPh51eN5s.exe" /rl HIGHEST /f MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
      • conhost.exe (PID: 5672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • MpCmdRun.exe (PID: 4276 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
          • conhost.exe (PID: 1320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RuntimeBroker.exe (PID: 5824 cmdline: C:\Windows\system32\Windows\RuntimeBroker.exe MD5: 1FB5D967F92174E0BBB15262F8CD209F)
      • schtasks.exe (PID: 6276 cmdline: "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
        • conhost.exe (PID: 6328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • HDPh51eN5s.exe (PID: 6020 cmdline: C:\Users\user\Desktop\HDPh51eN5s.exe MD5: 1FB5D967F92174E0BBB15262F8CD209F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.401638486.0000000012E41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000000.00000002.277374012.00000000134FA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000000.00000003.251870111.000000001584C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000006.00000003.289424719.0000000015501000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmpMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x41b939:$x1: Quasar.Common.Messages
          • 0x41d00b:$x1: Quasar.Common.Messages
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x41b939:$x1: Quasar.Common.Messages
          • 0x41d00b:$x1: Quasar.Common.Messages
          0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
            0.2.HDPh51eN5s.exe.1c3e0000.3.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
            • 0x419d39:$x1: Quasar.Common.Messages
            • 0x41b40b:$x1: Quasar.Common.Messages
            0.2.HDPh51eN5s.exe.1c3e0000.3.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: C:\Windows\system32\Windows\RuntimeBroker.exe, ParentImage: C:\Windows\System32\Windows\RuntimeBroker.exe, ParentProcessId: 5824, ParentProcessName: RuntimeBroker.exe, ProcessCommandLine: "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f, ProcessId: 6276, ProcessName: schtasks.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: HDPh51eN5s.exeVirustotal: Detection: 35%Perma Link
              Source: HDPh51eN5s.exeMetadefender: Detection: 31%Perma Link
              Source: HDPh51eN5s.exeReversingLabs: Detection: 76%
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeVirustotal: Detection: 35%Perma Link
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeMetadefender: Detection: 31%Perma Link
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeReversingLabs: Detection: 76%
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.401638486.0000000012E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.277374012.00000000134FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.251870111.000000001584C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000003.289424719.0000000015501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 4684, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 5824, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 6020, type: MEMORYSTR
              Source: HDPh51eN5s.exeJoe Sandbox ML: detected
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeJoe Sandbox ML: detected

              Compliance

              barindex
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeUnpacked PE file: 0.2.HDPh51eN5s.exe.ac0000.0.unpack
              Source: HDPh51eN5s.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: HDPh51eN5s.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: global trafficTCP traffic: 82.211.246.53 ports 1,2,3,8,9,28391
              Source: Joe Sandbox ViewASN Name: DK-DANSKKABELTVDK DK-DANSKKABELTVDK
              Source: global trafficTCP traffic: 192.168.2.3:49775 -> 82.211.246.53:28391
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: unknownTCP traffic detected without corresponding DNS query: 82.211.246.53
              Source: HDPh51eN5s.exe, 00000007.00000002.388973873.0000000001084000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.michv
              Source: HDPh51eN5s.exe, 00000000.00000002.270816823.00000000033A1000.00000004.00000800.00020000.00000000.sdmp, RuntimeBroker.exe, 00000006.00000002.512755863.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.401638486.0000000012E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.277374012.00000000134FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.251870111.000000001584C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000003.289424719.0000000015501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 4684, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 5824, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 6020, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 0.2.HDPh51eN5s.exe.1c3e0000.3.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: HDPh51eN5s.exeStatic PE information: section name: 5+VE3vdj
              Source: RuntimeBroker.exe.0.drStatic PE information: section name: 5+VE3vdj
              Source: HDPh51eN5s.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 0.2.HDPh51eN5s.exe.1c3e0000.3.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile created: C:\Windows\system32\WindowsJump to behavior
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeCode function: 0_2_00007FFC014004E0
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeCode function: 0_2_00007FFC0140A4D0
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC013F04E0
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC013FA4D0
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC0166F374
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeCode function: 7_2_00007FFC013F04E0
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeCode function: 7_2_00007FFC013FA4D0
              Source: HDPh51eN5s.exe, 00000000.00000002.269916650.000000000158A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HDPh51eN5s.exe
              Source: HDPh51eN5s.exe, 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename> vs HDPh51eN5s.exe
              Source: HDPh51eN5s.exe, 00000000.00000000.236203752.000000000109A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename> vs HDPh51eN5s.exe
              Source: HDPh51eN5s.exe, 00000000.00000003.262680605.000000001CEBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename> vs HDPh51eN5s.exe
              Source: HDPh51eN5s.exe, 00000007.00000002.388656963.000000000102A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HDPh51eN5s.exe
              Source: HDPh51eN5s.exeBinary or memory string: OriginalFilename> vs HDPh51eN5s.exe
              Source: HDPh51eN5s.exeVirustotal: Detection: 35%
              Source: HDPh51eN5s.exeMetadefender: Detection: 31%
              Source: HDPh51eN5s.exeReversingLabs: Detection: 76%
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile read: C:\Users\user\Desktop\HDPh51eN5s.exeJump to behavior
              Source: HDPh51eN5s.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\HDPh51eN5s.exe "C:\Users\user\Desktop\HDPh51eN5s.exe"
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Users\user\Desktop\HDPh51eN5s.exe" /rl HIGHEST /f
              Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\Windows\RuntimeBroker.exe C:\Windows\system32\Windows\RuntimeBroker.exe
              Source: unknownProcess created: C:\Users\user\Desktop\HDPh51eN5s.exe C:\Users\user\Desktop\HDPh51eN5s.exe
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f
              Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\conhost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Users\user\Desktop\HDPh51eN5s.exe" /rl HIGHEST /f
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\Windows\RuntimeBroker.exe C:\Windows\system32\Windows\RuntimeBroker.exe
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HDPh51eN5s.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@12/3@0/1
              Source: HDPh51eN5s.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6328:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5672:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:1320:120:WilError_01
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeMutant created: \Sessions\1\BaseNamedObjects\Local\a65c20d9-cf82-4bb4-8f7e-e90aff87b9b5
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
              Source: HDPh51eN5s.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: HDPh51eN5s.exeStatic file information: File size 6171136 > 1048576
              Source: HDPh51eN5s.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: HDPh51eN5s.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x5d7000
              Source: HDPh51eN5s.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeUnpacked PE file: 0.2.HDPh51eN5s.exe.ac0000.0.unpack
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeUnpacked PE file: 0.2.HDPh51eN5s.exe.ac0000.0.unpack .text:ER;.rsrc:R;.reloc:R;5+VE3vdj:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;Unknown_Section3:R;
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeCode function: 0_2_00007FFC0140DA4C push E9D18B44h; iretd
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC013FDA4C push E9D18B44h; iretd
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC01670CF4 push edi; iretd
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC016672B8 push ebx; iretd
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC016676A3 push ebx; retf
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC0166AF68 push eax; ret
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC01667F17 push ebx; ret
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeCode function: 7_2_00007FFC013FDA4C push E9D18B44h; iretd
              Source: HDPh51eN5s.exeStatic PE information: section name: 5+VE3vdj
              Source: RuntimeBroker.exe.0.drStatic PE information: section name: 5+VE3vdj
              Source: RuntimeBroker.exe.0.drStatic PE information: real checksum: 0xd85ebfc0 should be: 0x5ed5e4
              Source: HDPh51eN5s.exeStatic PE information: real checksum: 0xd85ebfc0 should be: 0x5ed5e4

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeExecutable created and started: C:\Windows\system32\Windows\RuntimeBroker.exe
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile created: C:\Windows\System32\Windows\RuntimeBroker.exeJump to dropped file
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile created: C:\Windows\System32\Windows\RuntimeBroker.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Users\user\Desktop\HDPh51eN5s.exe" /rl HIGHEST /f

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile opened: C:\Users\user\Desktop\HDPh51eN5s.exe:Zone.Identifier read attributes | delete
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeFile opened: C:\Windows\system32\Windows\RuntimeBroker.exe:Zone.Identifier read attributes | delete
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeFile opened: C:\Windows\system32\Windows\RuntimeBroker.exe:Zone.Identifier read attributes | delete
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\HDPh51eN5s.exe TID: 5276Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\Windows\RuntimeBroker.exe TID: 1104Thread sleep time: -126000s >= -30000s
              Source: C:\Windows\System32\Windows\RuntimeBroker.exe TID: 5300Thread sleep time: -108000s >= -30000s
              Source: C:\Users\user\Desktop\HDPh51eN5s.exe TID: 3516Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeCode function: 6_2_00007FFC01472259 sgdt fword ptr [eax]
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeThread delayed: delay time: 922337203685477
              Source: RuntimeBroker.exe, 00000006.00000002.542101257.000000001DE04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeMemory allocated: page read and write | page guard
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Users\user\Desktop\HDPh51eN5s.exe" /rl HIGHEST /f
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeProcess created: C:\Windows\System32\Windows\RuntimeBroker.exe C:\Windows\system32\Windows\RuntimeBroker.exe
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeQueries volume information: C:\Users\user\Desktop\HDPh51eN5s.exe VolumeInformation
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeQueries volume information: C:\Windows\System32\Windows\RuntimeBroker.exe VolumeInformation
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Windows\System32\Windows\RuntimeBroker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeQueries volume information: C:\Users\user\Desktop\HDPh51eN5s.exe VolumeInformation
              Source: C:\Users\user\Desktop\HDPh51eN5s.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.401638486.0000000012E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.277374012.00000000134FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.251870111.000000001584C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000003.289424719.0000000015501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 4684, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 5824, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 6020, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HDPh51eN5s.exe.1c3e0000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.401638486.0000000012E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.277374012.00000000134FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.251870111.000000001584C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000003.289424719.0000000015501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 4684, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 5824, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HDPh51eN5s.exe PID: 6020, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Windows Management Instrumentation
              1
              Scheduled Task/Job
              11
              Process Injection
              121
              Masquerading
              OS Credential Dumping111
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Scheduled Task/Job
              Boot or Logon Initialization Scripts1
              Scheduled Task/Job
              1
              Disable or Modify Tools
              LSASS Memory31
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
              Non-Standard Port
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
              Virtualization/Sandbox Evasion
              Security Account Manager12
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
              Process Injection
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              Obfuscated Files or Information
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items2
              Software Packing
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 679249 Sample: HDPh51eN5s Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 Yara detected Quasar RAT 2->47 49 4 other signatures 2->49 9 HDPh51eN5s.exe 5 2->9         started        13 HDPh51eN5s.exe 2 2->13         started        process3 file4 31 C:\Windows\System32\...\RuntimeBroker.exe, PE32 9->31 dropped 33 C:\Users\user\AppData\...\HDPh51eN5s.exe.log, ASCII 9->33 dropped 51 Detected unpacking (changes PE section rights) 9->51 53 Detected unpacking (overwrites its own PE header) 9->53 55 Drops executables to the windows directory (C:\Windows) and starts them 9->55 57 2 other signatures 9->57 15 RuntimeBroker.exe 2 9->15         started        19 schtasks.exe 1 9->19         started        signatures5 process6 dnsIp7 35 82.211.246.53, 28391 DK-DANSKKABELTVDK Denmark 15->35 37 Multi AV Scanner detection for dropped file 15->37 39 Machine Learning detection for dropped file 15->39 41 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->41 21 schtasks.exe 1 15->21         started        23 conhost.exe 19->23         started        signatures8 process9 process10 25 conhost.exe 21->25         started        27 MpCmdRun.exe 1 23->27         started        process11 29 conhost.exe 27->29         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              HDPh51eN5s.exe36%VirustotalBrowse
              HDPh51eN5s.exe31%MetadefenderBrowse
              HDPh51eN5s.exe77%ReversingLabsByteCode-MSIL.Trojan.Perseus
              HDPh51eN5s.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\System32\Windows\RuntimeBroker.exe100%Joe Sandbox ML
              C:\Windows\System32\Windows\RuntimeBroker.exe36%VirustotalBrowse
              C:\Windows\System32\Windows\RuntimeBroker.exe31%MetadefenderBrowse
              C:\Windows\System32\Windows\RuntimeBroker.exe77%ReversingLabsByteCode-MSIL.Trojan.Perseus
              SourceDetectionScannerLabelLinkDownload
              0.2.HDPh51eN5s.exe.ac0000.0.unpack100%AviraHEUR/AGEN.1230577Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://go.michv0%Avira URL Cloudsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://go.michvHDPh51eN5s.exe, 00000007.00000002.388973873.0000000001084000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHDPh51eN5s.exe, 00000000.00000002.270816823.00000000033A1000.00000004.00000800.00020000.00000000.sdmp, RuntimeBroker.exe, 00000006.00000002.512755863.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                82.211.246.53
                unknownDenmark
                15516DK-DANSKKABELTVDKtrue
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679249
                Start date and time: 05/08/202213:13:102022-08-05 13:13:10 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 6m 25s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:HDPh51eN5s (renamed file extension from none to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:30
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@12/3@0/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 63%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                TimeTypeDescription
                13:14:22Task SchedulerRun new task: Google Update path: C:\Users\user\Desktop\HDPh51eN5s.exe
                13:15:43API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\HDPh51eN5s.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1281
                Entropy (8bit):5.367899416177239
                Encrypted:false
                SSDEEP:24:ML9E4KrL1qE4GiD0E4KeGiKDE4KGKN08AKhPKIE4TKD1KoZAE4KKPz:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1Q
                MD5:7115A3215A4C22EF20AB9AF4160EE8F5
                SHA1:A4CAB34355971C1FBAABECEFA91458C4936F2C24
                SHA-256:A4A689E8149166591F94A8C84E99BE744992B9E80BDB7A0713453EB6C59BBBB2
                SHA-512:2CEF2BCD284265B147ABF300A4D26AD1AAC743EFE0B47A394FB614B6843A60B9F918E56261A56334078D0D9681132F3403FB734EE66E1915CF76F29411D5CE20
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                Category:modified
                Size (bytes):9062
                Entropy (8bit):3.1654798503046924
                Encrypted:false
                SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zw+b:j+s+v+b+P+m+0+Q+q+3+b
                MD5:2633F0F310DC0DDE5E42973AFEAF7F89
                SHA1:53FDDBA449DF28F68130EB11AF56BB3EE7300FF4
                SHA-256:8DE4072D371AD5704889A0539F005D9587226DB4686EF0C774266BB1754A1E85
                SHA-512:62B3F96C6C3308AA0232DC1F53BD8415934E0EB525223DBC8AAC86FAEB6953DF65E59501A274FA3169914E56855C7C90016D26CEDE2AAE90E50567A271EA5807
                Malicious:false
                Reputation:low
                Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                Process:C:\Users\user\Desktop\HDPh51eN5s.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):6171136
                Entropy (8bit):6.610162822007531
                Encrypted:false
                SSDEEP:98304:5Po4eyejblyJFeBLgYcNBUsBtzOevoMlda05+8pbVTnVp8DW1db7LAm0xVHzd6Wy:640sHwwakZpX1aYGHMaBq9DR5y03HQiB
                MD5:1FB5D967F92174E0BBB15262F8CD209F
                SHA1:76FBD5B88154976887B5099C21666CA3BE2CD76E
                SHA-256:740634ECEDD318AC8F84C360F5D253FF836C5E60DA6542C65A140B17B4BA8024
                SHA-512:A0FF48D7E219C71828D0CBDE56F59AF7326DFF4DA021789CEFC68D1EA90EA467EB98B7418070A3007A63F58AD5987DC9EFFE79BC143A33C5ECBE1A963A708EA9
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: Virustotal, Detection: 36%, Browse
                • Antivirus: Metadefender, Detection: 31%, Browse
                • Antivirus: ReversingLabs, Detection: 77%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z..b.................p].........n.].. ........@.. ........................^.......^...@...................................].S.....].......................]...................................................... ............... ..H............text...tn].. ...p]................. ..`.rsrc.........]......t].............@..@.reloc........].......].............@..B5+VE3vdj(.....].......].............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):6.610162822007531
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.96%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:HDPh51eN5s.exe
                File size:6171136
                MD5:1fb5d967f92174e0bbb15262f8cd209f
                SHA1:76fbd5b88154976887b5099c21666ca3be2cd76e
                SHA256:740634ecedd318ac8f84c360f5d253ff836c5e60da6542c65a140b17b4ba8024
                SHA512:a0ff48d7e219c71828d0cbde56f59af7326dff4da021789cefc68d1ea90ea467eb98b7418070a3007a63f58ad5987dc9effe79bc143a33c5ecbe1a963a708ea9
                SSDEEP:98304:5Po4eyejblyJFeBLgYcNBUsBtzOevoMlda05+8pbVTnVp8DW1db7LAm0xVHzd6Wy:640sHwwakZpX1aYGHMaBq9DR5y03HQiB
                TLSH:F15612A2A5449898FEFA0230F0E57B2CC3F53783B5ED686E0ECD194511A5A88FD3558F
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z..b.................p].........n.].. ........@.. ........................^.......^...@................................
                Icon Hash:00828e8e8686b000
                Entrypoint:0x9d8e6e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x62E1125A [Wed Jul 27 10:24:26 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x5d8e180x53.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5da0000xc00.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5dc0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x5d6e740x5d7000unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x5da0000xc000xc00False0.3567708333333333data5.263389654594389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x5dc0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                5+VE3vdj0x5de0000xa7280xa800False0.8907412574404762data7.584538152941798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_VERSION0x5da0a00x2e4data
                RT_MANIFEST0x5da3840x6d7XML 1.0 document, UTF-8 Unicode (with BOM) text
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 13:15:12.682216883 CEST4977528391192.168.2.382.211.246.53
                Aug 5, 2022 13:15:15.745399952 CEST4977528391192.168.2.382.211.246.53
                Aug 5, 2022 13:15:21.745737076 CEST4977528391192.168.2.382.211.246.53
                Aug 5, 2022 13:15:37.654670000 CEST4978028391192.168.2.382.211.246.53
                Aug 5, 2022 13:15:40.669297934 CEST4978028391192.168.2.382.211.246.53
                Aug 5, 2022 13:15:46.701088905 CEST4978028391192.168.2.382.211.246.53
                Aug 5, 2022 13:16:02.128798962 CEST4981228391192.168.2.382.211.246.53
                Aug 5, 2022 13:16:05.140202999 CEST4981228391192.168.2.382.211.246.53
                Aug 5, 2022 13:16:11.140929937 CEST4981228391192.168.2.382.211.246.53
                Aug 5, 2022 13:16:27.001981974 CEST4984028391192.168.2.382.211.246.53
                Aug 5, 2022 13:16:30.079967976 CEST4984028391192.168.2.382.211.246.53
                Aug 5, 2022 13:16:36.080517054 CEST4984028391192.168.2.382.211.246.53
                TimestampSource IPDest IPChecksumCodeType
                Aug 5, 2022 13:15:22.296092033 CEST82.211.246.53192.168.2.38da(Host unreachable)Destination Unreachable
                Aug 5, 2022 13:15:39.636266947 CEST82.211.246.53192.168.2.38da(Host unreachable)Destination Unreachable
                Aug 5, 2022 13:15:42.646208048 CEST82.211.246.53192.168.2.38da(Host unreachable)Destination Unreachable
                Aug 5, 2022 13:16:11.306586981 CEST82.211.246.53192.168.2.38da(Host unreachable)Destination Unreachable
                Aug 5, 2022 13:16:36.306998014 CEST82.211.246.53192.168.2.38da(Host unreachable)Destination Unreachable

                Click to jump to process

                Target ID:0
                Start time:13:14:05
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\HDPh51eN5s.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\HDPh51eN5s.exe"
                Imagebase:0xac0000
                File size:6171136 bytes
                MD5 hash:1FB5D967F92174E0BBB15262F8CD209F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.277374012.00000000134FA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000003.251870111.000000001584C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.303504388.000000001C3E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:4
                Start time:13:14:20
                Start date:05/08/2022
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:"schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Users\user\Desktop\HDPh51eN5s.exe" /rl HIGHEST /f
                Imagebase:0x7ff744f70000
                File size:226816 bytes
                MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:13:14:21
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:6
                Start time:13:14:21
                Start date:05/08/2022
                Path:C:\Windows\System32\Windows\RuntimeBroker.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\Windows\RuntimeBroker.exe
                Imagebase:0x620000
                File size:6171136 bytes
                MD5 hash:1FB5D967F92174E0BBB15262F8CD209F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000003.289424719.0000000015501000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 36%, Virustotal, Browse
                • Detection: 31%, Metadefender, Browse
                • Detection: 77%, ReversingLabs
                Reputation:low

                Target ID:7
                Start time:13:14:23
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\HDPh51eN5s.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\Desktop\HDPh51eN5s.exe
                Imagebase:0x510000
                File size:6171136 bytes
                MD5 hash:1FB5D967F92174E0BBB15262F8CD209F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.401638486.0000000012E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:18
                Start time:13:14:48
                Start date:05/08/2022
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:"schtasks" /create /tn "Google Update" /sc ONLOGON /tr "C:\Windows\system32\Windows\RuntimeBroker.exe" /rl HIGHEST /f
                Imagebase:0x7ff744f70000
                File size:226816 bytes
                MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:19
                Start time:13:14:48
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:24
                Start time:13:15:42
                Start date:05/08/2022
                Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                Imagebase:0x7ff7b0320000
                File size:455656 bytes
                MD5 hash:A267555174BFA53844371226F482B86B
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:26
                Start time:13:15:42
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                No disassembly