Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ySJ1HwLs9k

Overview

General Information

Sample Name:ySJ1HwLs9k (renamed file extension from none to exe)
Analysis ID:682138
MD5:cd76badf66246e0424954805222e4f58
SHA1:e8c6d68e67d853180d36116e3ba27e4f12346dc2
SHA256:8cfefc291d9088ef0b3ab7dd59d8ff672e73d333c8d18bd1dff4c7695ae8af83
Tags:32exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
May check the online IP address of the machine
.NET source code contains potential unpacker
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Checks if the current process is being debugged
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • ySJ1HwLs9k.exe (PID: 4624 cmdline: "C:\Users\user\Desktop\ySJ1HwLs9k.exe" MD5: CD76BADF66246E0424954805222E4F58)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ySJ1HwLs9k.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.ySJ1HwLs9k.exe.440000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ySJ1HwLs9k.exeAvira: detected
      Source: ySJ1HwLs9k.exeVirustotal: Detection: 53%Perma Link
      Source: ySJ1HwLs9k.exeReversingLabs: Detection: 80%
      Source: ySJ1HwLs9k.exeJoe Sandbox ML: detected
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpackAvira: Label: LNK/Runner.VPGD
      Source: ySJ1HwLs9k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ySJ1HwLs9k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Yara matchFile source: ySJ1HwLs9k.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, type: UNPACKEDPE
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeDNS query: name: ip-api.com
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
      Source: ySJ1HwLs9k.exeString found in binary or memory: http://exmple.com/Uploader.php
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmp, ySJ1HwLs9k.exe, 00000000.00000002.246418693.000000000276F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
      Source: ySJ1HwLs9k.exeString found in binary or memory: http://ip-api.com/line/?fields=hosting
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.comx
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: unknownDNS traffic detected: queries for: ip-api.com
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: ySJ1HwLs9k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ySJ1HwLs9k.exe, 00000000.00000002.245886288.00000000008B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ySJ1HwLs9k.exe
      Source: ySJ1HwLs9k.exe, 00000000.00000000.237922513.000000000044E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXWorm.exe4 vs ySJ1HwLs9k.exe
      Source: ySJ1HwLs9k.exeBinary or memory string: OriginalFilenameXWorm.exe4 vs ySJ1HwLs9k.exe
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C5412
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C4666
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C0DCB
      Source: ySJ1HwLs9k.exeVirustotal: Detection: 53%
      Source: ySJ1HwLs9k.exeReversingLabs: Detection: 80%
      Source: ySJ1HwLs9k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: ySJ1HwLs9k.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeMutant created: \Sessions\1\BaseNamedObjects\DfPMuDiGLmV7f2GT
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ySJ1HwLs9k.exe.logJump to behavior
      Source: classification engineClassification label: mal80.troj.evad.winEXE@1/1@1/1
      Source: ySJ1HwLs9k.exe, Stub/Helper.csCryptographic APIs: 'TransformFinalBlock'
      Source: ySJ1HwLs9k.exe, Stub/Helper.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, Stub/Helper.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, Stub/Helper.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: ySJ1HwLs9k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: ySJ1HwLs9k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: ySJ1HwLs9k.exe, Stub/Helper.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, Stub/Helper.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: ySJ1HwLs9k.exeBinary or memory string: SBIEDLL.DLLMHTTP://IP-API.COM/LINE/?FIELDS=HOSTING
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246279336.00000000026DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exe TID: 5440Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exe TID: 4012Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeThread delayed: delay time: 922337203685477
      Source: ySJ1HwLs9k.exeBinary or memory string: vmware
      Source: ySJ1HwLs9k.exeBinary or memory string: DetectVirtualMachine
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246553755.000000001B4E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C649D CheckRemoteDebuggerPresent,
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeQueries volume information: C:\Users\user\Desktop\ySJ1HwLs9k.exe VolumeInformation
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      Path InterceptionPath Interception1
      Masquerading
      OS Credential Dumping221
      Security Software Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Disable or Modify Tools
      LSASS Memory41
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)41
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Remote System Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
      Deobfuscate/Decode Files or Information
      NTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer2
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
      Software Packing
      LSA Secrets22
      System Information Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      ySJ1HwLs9k.exe54%VirustotalBrowse
      ySJ1HwLs9k.exe81%ReversingLabsByteCode-MSIL.Hacktool.AntiVm
      ySJ1HwLs9k.exe100%AviraLNK/Runner.VPGD
      ySJ1HwLs9k.exe100%Joe Sandbox ML
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      0.0.ySJ1HwLs9k.exe.440000.0.unpack100%AviraLNK/Runner.VPGDDownload File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://exmple.com/Uploader.php0%VirustotalBrowse
      http://exmple.com/Uploader.php0%Avira URL Cloudsafe
      http://ip-api.comx0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      ip-api.com
      208.95.112.1
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ip-api.com/line/?fields=hostingfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://exmple.com/Uploader.phpySJ1HwLs9k.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://ip-api.comxySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://ip-api.comySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmp, ySJ1HwLs9k.exe, 00000000.00000002.246418693.000000000276F000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              208.95.112.1
              ip-api.comUnited States
              53334TUT-ASUSfalse
              Joe Sandbox Version:35.0.0 Citrine
              Analysis ID:682138
              Start date and time:2022-08-11 05:07:06 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 3m 2s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:ySJ1HwLs9k (renamed file extension from none to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal80.troj.evad.winEXE@1/1@1/1
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.82.210.154
              • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com, arc.trafficmanager.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              05:08:08API Interceptor1x Sleep call for process: ySJ1HwLs9k.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\ySJ1HwLs9k.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1727
              Entropy (8bit):5.3694638062396685
              Encrypted:false
              SSDEEP:48:MxHKEYHKGD8Ao6+vxpNl1qHGiD0HKeGpH+jtHTG1hAHKKPz:iqEYqGgAo9ZPlwmI0qeoAtzG1eqKPz
              MD5:69067D181AEA162FFB2C656E1E49A6FC
              SHA1:7D5ADD0D2602B8C7E3F9133552DCE0978301A811
              SHA-256:2E3687BF17D5BA1FB36B488AE1BA517180B116D4B4B61D8C4EC7681293DE24A1
              SHA-512:B3BE69E73EBFD5ED933BCB161803D08E4B0E54AD0382178E967127DA82A5737B79AEFB96055509497ECC0805A3A4BD8297B5DDC7B2ADBB6B2B4FAEC7D5CCEDC5
              Malicious:true
              Reputation:low
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_6
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.579947716799985
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:ySJ1HwLs9k.exe
              File size:46592
              MD5:cd76badf66246e0424954805222e4f58
              SHA1:e8c6d68e67d853180d36116e3ba27e4f12346dc2
              SHA256:8cfefc291d9088ef0b3ab7dd59d8ff672e73d333c8d18bd1dff4c7695ae8af83
              SHA512:f0d55c19c5bcde275292031930276420cfc6bab0539172c468461b42fa627e793586663b1ffefe44dc3aa70fbf3cffee78ad024d43020dce0e1518ef0ba1a13f
              SSDEEP:768:QhHhHjpsflPuxMtKHkvD+77x+Bbq19qpRGMdHren3:QWlOHk7Ucm190Gys3
              TLSH:5323298A37944001CBFD67F16DB2BA2242B2957B092BDB8E1CC944D76B57BC54D80EE3
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....i.b................................. ........@.. ....................... ............@................................
              Icon Hash:00828e8e8686b000
              Entrypoint:0x40cabe
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x62F369AB [Wed Aug 10 08:17:47 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xca6c0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x4d0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xaac40xac00False0.42787063953488375data5.6803435183448645IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xe0000x4d00x600False0.3723958333333333data3.6891997992770373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x100000xc0x200False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_VERSION0xe0a00x23cdata
              RT_MANIFEST0xe2e00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSource PortDest PortSource IPDest IP
              Aug 11, 2022 05:08:08.867799044 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:08.897326946 CEST8049734208.95.112.1192.168.2.3
              Aug 11, 2022 05:08:08.897458076 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:08.912626028 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:08.944850922 CEST8049734208.95.112.1192.168.2.3
              Aug 11, 2022 05:08:09.003226042 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:09.147562027 CEST4973480192.168.2.3208.95.112.1
              TimestampSource PortDest PortSource IPDest IP
              Aug 11, 2022 05:08:08.829556942 CEST4931653192.168.2.38.8.8.8
              Aug 11, 2022 05:08:08.847392082 CEST53493168.8.8.8192.168.2.3
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Aug 11, 2022 05:08:08.829556942 CEST192.168.2.38.8.8.80x7bcdStandard query (0)ip-api.comA (IP address)IN (0x0001)
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Aug 11, 2022 05:08:08.847392082 CEST8.8.8.8192.168.2.30x7bcdNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
              • ip-api.com
              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.349734208.95.112.180C:\Users\user\Desktop\ySJ1HwLs9k.exe
              TimestampkBytes transferredDirectionData
              Aug 11, 2022 05:08:08.912626028 CEST750OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Connection: Keep-Alive
              Aug 11, 2022 05:08:08.944850922 CEST750INHTTP/1.1 200 OK
              Date: Thu, 11 Aug 2022 03:08:08 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 5
              Access-Control-Allow-Origin: *
              X-Ttl: 60
              X-Rl: 44
              Data Raw: 74 72 75 65 0a
              Data Ascii: true


              No statistics
              Target ID:0
              Start time:05:08:04
              Start date:11/08/2022
              Path:C:\Users\user\Desktop\ySJ1HwLs9k.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\ySJ1HwLs9k.exe"
              Imagebase:0x440000
              File size:46592 bytes
              MD5 hash:CD76BADF66246E0424954805222E4F58
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Reputation:low

              No disassembly