Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OatAFVzm15.bin

Overview

General Information

Sample Name:OatAFVzm15.bin (renamed file extension from bin to exe)
Analysis ID:691234
MD5:b741daeca2edb8d539be2938e5f9490f
SHA1:4affabf1f09e55a1777fedbe83fc26905943045c
SHA256:c688c3da0b3fe263e2441f884d47966bb74875c94564e7694aa1c462e5c9435f
Tags:exezeus2
Infos:

Detection

Citadel
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Citadel
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
PE file contains an invalid checksum
Checks if the current process is being debugged
Entry point lies outside standard sections
May initialize a security null descriptor

Classification

  • System is w10x64
  • OatAFVzm15.exe (PID: 3988 cmdline: "C:\Users\user\Desktop\OatAFVzm15.exe" MD5: B741DAECA2EDB8D539BE2938E5F9490F)
    • WerFault.exe (PID: 2104 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 224 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
OatAFVzm15.exeJoeSecurity_CitadelYara detected CitadelJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.257430326.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
      00000000.00000000.256899254.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
        00000000.00000002.270314318.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
          00000000.00000000.254870638.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
            Process Memory Space: OatAFVzm15.exe PID: 3988JoeSecurity_CitadelYara detected CitadelJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.2.OatAFVzm15.exe.400000.0.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                0.0.OatAFVzm15.exe.400000.1.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                  0.0.OatAFVzm15.exe.400000.2.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                    0.0.OatAFVzm15.exe.400000.0.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: OatAFVzm15.exeAvira: detected
                      Source: OatAFVzm15.exeVirustotal: Detection: 80%Perma Link
                      Source: OatAFVzm15.exeMetadefender: Detection: 56%Perma Link
                      Source: OatAFVzm15.exeReversingLabs: Detection: 92%
                      Source: OatAFVzm15.exeJoe Sandbox ML: detected
                      Source: 0.0.OatAFVzm15.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
                      Source: 0.0.OatAFVzm15.exe.400000.2.unpackAvira: Label: TR/Spy.Gen
                      Source: 0.0.OatAFVzm15.exe.400000.1.unpackAvira: Label: TR/Spy.Gen
                      Source: 0.2.OatAFVzm15.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
                      Source: OatAFVzm15.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: OatAFVzm15.exeString found in binary or memory: http://www.google.com/webhp
                      Source: OatAFVzm15.exeString found in binary or memory: http://www.google.com/webhpbcU

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: Yara matchFile source: OatAFVzm15.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.OatAFVzm15.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.OatAFVzm15.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.257430326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.256899254.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.270314318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.254870638.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OatAFVzm15.exe PID: 3988, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: OatAFVzm15.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.OatAFVzm15.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.OatAFVzm15.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.257430326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.256899254.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.270314318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.254870638.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OatAFVzm15.exe PID: 3988, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: Process Memory Space: OatAFVzm15.exe PID: 3988, type: MEMORYSTRMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                      Source: OatAFVzm15.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: Process Memory Space: OatAFVzm15.exe PID: 3988, type: MEMORYSTRMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 224
                      Source: OatAFVzm15.exeVirustotal: Detection: 80%
                      Source: OatAFVzm15.exeMetadefender: Detection: 56%
                      Source: OatAFVzm15.exeReversingLabs: Detection: 92%
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER1103.tmpJump to behavior
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: classification engineClassification label: mal76.bank.winEXE@2/4@0/0
                      Source: unknownProcess created: C:\Users\user\Desktop\OatAFVzm15.exe "C:\Users\user\Desktop\OatAFVzm15.exe"
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 224
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3988
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: OatAFVzm15.exeStatic PE information: real checksum: 0x2ea1b should be: 0x5069c
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .data
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess queried: DebugPortJump to behavior
                      Source: OatAFVzm15.exe, 00000000.00000000.254870638.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: S:(ML;;NRNWNX;;;LW)SeSecurityPrivilegeS:(ML;CIOI;NRNWNX;;;LW)?O?I?Tcabcabinet.dllFCICreateFCIAddFileFCIFlushCabinetFCIDestroyunknownInstallDateSOFTWARE\Microsoft\Windows NT\CurrentVersionDigitalProductId%s_%08X%08Xfatal_errorbcdfghklmnpqrstvwxzaeiouyGlobal\Local\:d
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath Interception1
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping1
                      Security Software Discovery
                      Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Software Packing
                      LSASS Memory1
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                      Process Injection
                      Security Account Manager1
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
                      Remote System Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      OatAFVzm15.exe80%VirustotalBrowse
                      OatAFVzm15.exe57%MetadefenderBrowse
                      OatAFVzm15.exe92%ReversingLabsWin32.Trojan.Zeus
                      OatAFVzm15.exe100%AviraTR/Spy.Gen
                      OatAFVzm15.exe100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      0.0.OatAFVzm15.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
                      0.0.OatAFVzm15.exe.400000.2.unpack100%AviraTR/Spy.GenDownload File
                      0.0.OatAFVzm15.exe.400000.1.unpack100%AviraTR/Spy.GenDownload File
                      0.2.OatAFVzm15.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.google.com/webhpOatAFVzm15.exefalse
                        high
                        http://www.google.com/webhpbcUOatAFVzm15.exefalse
                          high
                          No contacted IP infos
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:691234
                          Start date and time:2022-08-27 03:53:24 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 4m 45s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:OatAFVzm15.bin (renamed file extension from bin to exe)
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:21
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal76.bank.winEXE@2/4@0/0
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.189.173.21
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, login.live.com, eudb.ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                          • Not all processes where analyzed, report is missing behavior information
                          TimeTypeDescription
                          03:54:29API Interceptor1x Sleep call for process: WerFault.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.8482562292103298
                          Encrypted:false
                          SSDEEP:96:+E+F05lwhXNhM1Dg3f6UpXIQcQmc6NcEgcw3M+HbHg/opAnQ0DF16FaqXOf6qim1:/+O7whOiH4JqZjh/u7sDOS274It0i
                          MD5:4B7B7F0537F809D79C433468B89E9372
                          SHA1:C3A4FA4203802588B7C626EE51AD6DA3407F0AE9
                          SHA-256:B9D5E71EC9055AAE80452DC0238762C9B4B97F2CE7D4CB25BC9D8BBD4CC471C4
                          SHA-512:C2592A2600AB52EDC55CFB1E33948C389B384C2831312ECC40439DF959838D2AD9B71B7BD0862E3997D2C185CFC582EDC68BC6286232877C6D663CED2C7D4B07
                          Malicious:true
                          Reputation:low
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.6.0.7.1.2.6.6.8.2.7.2.1.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.6.0.7.1.2.6.8.3.7.4.0.9.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.7.0.d.6.f.1.8.-.0.6.b.c.-.4.0.7.6.-.9.8.e.7.-.5.4.e.7.5.0.f.8.9.6.d.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.4.7.c.2.3.7.a.-.c.e.6.7.-.4.e.7.3.-.9.7.b.3.-.7.2.7.3.3.9.b.8.5.9.7.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.O.a.t.A.F.V.z.m.1.5...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.9.4.-.0.0.0.1.-.0.0.1.f.-.4.2.f.9.-.8.9.5.d.0.3.b.a.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.7.6.f.6.0.9.7.1.0.f.3.c.d.f.0.6.3.5.7.7.d.c.7.a.5.8.c.7.e.c.e.0.0.0.0.f.f.f.f.!.0.0.0.0.4.a.f.f.a.b.f.1.f.0.9.e.5.5.a.1.7.7.7.f.e.d.b.e.8.3.f.c.2.6.9.0.5.9.4.3.0.4.5.c.!.O.a.t.A.F.V.z.m.1.5...e.x.e.....T.a.r.g.e.t.A.p.p.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Sat Aug 27 10:54:27 2022, 0x1205a4 type
                          Category:dropped
                          Size (bytes):36808
                          Entropy (8bit):1.960207501755446
                          Encrypted:false
                          SSDEEP:96:5m8UhK981/jwmoazYaUOtli76Fcn/s93kIdkD2RpuseAiekdSVXqaen3+FTJSeXw:LUbjiazJtlO6FxuGkdSVXWn3+tgPjHh
                          MD5:EB117393F426614F125FC2F4DB62A75A
                          SHA1:FCBE6606A4E25DA6CFED8F62B3142AB6A0E1EDA3
                          SHA-256:CC2806C3210AE4AF53DCDD0E484806DD201CC3EFEC9355CF0CCDF8BB1A4AF945
                          SHA-512:41A040E299F34D25DD8FC02DD217BF8556EF494FB639118820F462EF8D03E3E7BE16E8152E7B331FB19B3CC072573642E348728FCD32A3F7A918794E349AB663
                          Malicious:false
                          Reputation:low
                          Preview:MDMP....... ..........c........................4...........D....+..........T.......8...........T...........X...p............................................................................................U...........B..............GenuineIntelW...........T..............c.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8294
                          Entropy (8bit):3.693442422335981
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNizu6Yx6YqbSUmNgmf2QjSnCpDN89bYNsfPEom:RrlsNi66+6YGSUmNgmf2QjSVYGfPK
                          MD5:23148935006202ED488938B09339292F
                          SHA1:7AB9E12EE777245AFAA33F49BCDCC478A3C20D1C
                          SHA-256:D61D2A1E7D65C026EABD4B17ED1A8AC50828BB5C254BAE793FE4934204C676B4
                          SHA-512:25C44CE924F479A5E3B15141AE5A43484DE0D24236E87B88D3DDF8ACFDD7B2AAD6B0B3A9752D298C36CD7331962486E32FEDA8E61C4F1653992E0CD985405CEB
                          Malicious:false
                          Reputation:low
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.9.8.8.<./.P.i.d.>.......
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4567
                          Entropy (8bit):4.458512499662193
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zsfJgtWI901kWgc8sqYjL+8fm8M4JPlF4w+q8v1jusNVMlNd:uITfBn19grsqYP7JRKju2VMlNd
                          MD5:0FB843827EE07A725FE3024B7C8CFB8F
                          SHA1:6830F95E3E914FD2C72698FF7FC59BC9B80D1F61
                          SHA-256:F980C1D6BD0DF238297434C8FCF0DF6B429F066FF5FC3E857F1518C50175FECF
                          SHA-512:BDD63C12640EBC14797E8068A56D1EE76C17E3A0CA28C00C5ACB85CB3E39D34B169F3889663389A59EDDB71A56A8AAD763BC573B88BD10E16FB4E31E5A5978D3
                          Malicious:false
                          Reputation:low
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1665845" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):3.4408516130120472
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.94%
                          • Clipper DOS Executable (2020/12) 0.02%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Lumena CEL bitmap (63/63) 0.00%
                          File name:OatAFVzm15.exe
                          File size:267264
                          MD5:b741daeca2edb8d539be2938e5f9490f
                          SHA1:4affabf1f09e55a1777fedbe83fc26905943045c
                          SHA256:c688c3da0b3fe263e2441f884d47966bb74875c94564e7694aa1c462e5c9435f
                          SHA512:f43fac8e1ab37c70c6633cd558fd9d164fea51cd1835086cdaf42aff60d2b444626b609d4af5f627953913bcf6fc4a0dd1bb39737dc0e23b1bd3bd61930edd20
                          SSDEEP:3072:E/DD2zNc31I3tgt89I51ceYaQHK3HEEooVj9k:E/hCdgtR569aQuHEcVj9
                          TLSH:6844BF5BB98184B7D5BA3B709DA8B23663FF8D24242DCD87E7580D993831861F22D307
                          File Content Preview:MZ......................@...............................................................................................................................................................................................................................PE..L..
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x403ee5
                          Entrypoint Section:.data
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:
                          Time Stamp:0x408FF235 [Wed Apr 28 18:04:37 2004 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:7
                          OS Version Minor:2
                          File Version Major:7
                          File Version Minor:2
                          Subsystem Version Major:7
                          Subsystem Version Minor:2
                          Import Hash:f3b6157e0baac9b50d25d58c877c29ad
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 6Ch
                          push esi
                          push dword ptr [ebp+0Ch]
                          lea eax, dword ptr [ebp-68h]
                          push eax
                          push dword ptr [ebp+08h]
                          call 00007F45A86E8FB7h
                          lea eax, dword ptr [ebp-68h]
                          push eax
                          push 00000000h
                          push 0041A2CCh
                          call dword ptr [004011A4h]
                          test eax, eax
                          je 00007F45A86E900Bh
                          mov esi, eax
                          call 00007F45A86F01A3h
                          jmp 00007F45A86E9004h
                          xor eax, eax
                          pop esi
                          leave
                          retn 0008h
                          push ebp
                          mov ebp, esp
                          push ecx
                          push ecx
                          mov eax, dword ptr [0041A2A4h]
                          push ebx
                          push edi
                          call 00007F45A86F1519h
                          xor ebx, ebx
                          mov dword ptr [ebp-08h], eax
                          cmp eax, ebx
                          jne 00007F45A86E9009h
                          xor eax, eax
                          jmp 00007F45A86E90C3h
                          push 00000002h
                          push ebx
                          push ebx
                          lea eax, dword ptr [ebp+08h]
                          push eax
                          push edi
                          push dword ptr [ebp+08h]
                          mov byte ptr [ebp-01h], bl
                          push FFFFFFFFh
                          call dword ptr [004011F4h]
                          test eax, eax
                          jne 00007F45A86E9006h
                          mov byte ptr [ebp-01h], 00000001h
                          push esi
                          mov esi, dword ptr [004011E0h]
                          push ebx
                          push 00000004h
                          lea ecx, dword ptr [ebp+0Ch]
                          push ecx
                          mov ecx, dword ptr [ebp-08h]
                          mov eax, 0041A290h
                          sub eax, dword ptr [0041A2A4h]
                          add eax, ecx
                          push eax
                          push edi
                          call esi
                          test eax, eax
                          jne 00007F45A86E9005h
                          inc byte ptr [ebp-01h]
                          push ebx
                          push 00000004h
                          lea ecx, dword ptr [ebp-08h]
                          push ecx
                          mov ecx, dword ptr [ebp-08h]
                          mov eax, 0041A2A4h
                          sub eax, dword ptr [0041A2A4h]
                          add eax, ecx
                          push eax
                          push edi
                          call esi
                          pop esi
                          test eax, eax
                          jne 00007F45A86E9005h
                          inc byte ptr [ebp-01h]
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x12000xd20178
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x400000xf0.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x4d0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .data0x10000x40000x4000False0.5638427734375data5.9940228845162915IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x50000x10000x1000False0.588623046875data6.193572249131582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x60000x1b0000x1b000False0.49233217592592593data5.64920698370386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x210000x1f0000x1f000False0.0011498235887096775data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .idata0x400000x14000x1400False0.4671875data5.092882560692016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          DLLImport
                          ADVAPI32.dllRegCloseKey, CryptCreateHash, LookupPrivilegeValueW, SetNamedSecurityInfoW, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CreateProcessAsUserW, RegQueryValueExW, CryptReleaseContext, RegCreateKeyExW, GetTokenInformation, GetSidSubAuthorityCount, OpenThreadToken, CryptAcquireContextW, GetSidSubAuthority, OpenProcessToken, CryptGetHashParam, RegEnumKeyExW, RegOpenKeyExW, GetLengthSid, IsWellKnownSid, GetSecurityDescriptorSacl, SetSecurityDescriptorSacl, CryptDestroyHash, AdjustTokenPrivileges, ConvertSidToStringSidW, RegSetValueExW, CryptHashData, EqualSid, InitiateSystemShutdownExW, ConvertStringSecurityDescriptorToSecurityDescriptorW
                          CRYPT32.dllCertDeleteCRLFromStore, CertCloseStore, PFXImportCertStore, CertEnumCertificatesInStore, CertDuplicateCRLContext, PFXExportCertStoreEx, CertOpenSystemStoreW
                          KERNEL32.dllCreateProcessW, HeapAlloc, SystemTimeToFileTime, SetFilePointerEx, HeapFree, CreateDirectoryW, GetComputerNameW, GetTickCount, GetCurrentThread, GetProcessHeap, IsBadReadPtr, SetFileTime, VirtualQueryEx, WriteFile, OpenProcess, Thread32First, WideCharToMultiByte, ReadProcessMemory, GetVersionExW, HeapDestroy, HeapCreate, GetFileAttributesW, Thread32Next, ReadFile, GetTimeZoneInformation, CreateFileW, MultiByteToWideChar, FlushFileBuffers, GetTempPathW, GetFileSizeEx, FreeLibrary, GetEnvironmentVariableW, SetLastError, VirtualProtectEx, VirtualAllocEx, FindClose, LoadLibraryA, RemoveDirectoryW, FindNextFileW, VirtualProtect, CreateToolhelp32Snapshot, GetFileTime, ReleaseMutex, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, DeleteFileW, GetFileInformationByHandle, GetSystemTime, SetFileAttributesW, CreateThread, CreateRemoteThread, Process32FirstW, Process32NextW, lstrcmpi, WTSGetActiveConsoleSessionId, SetThreadPriority, GetLocalTime, GlobalLock, GlobalUnlock, ResetEvent, MoveFileExW, GetUserDefaultUILanguage, SetEndOfFile, GetNativeSystemInfo, FindFirstFileW, CreateMutexW, HeapReAlloc, GetTempFileNameW, OpenMutexW, FileTimeToDosDateTime, GetProcessId, EnterCriticalSection, VirtualAlloc, LeaveCriticalSection, InitializeCriticalSection, SetThreadContext, GetThreadContext, ExpandEnvironmentStringsW, GetPrivateProfileIntW, GetPrivateProfileStringW, WriteProcessMemory, LocalFree, GetCurrentProcessId, CloseHandle, ExitProcess, DuplicateHandle, OpenEventW, GetFileAttributesExW, lstrcmpiW, WaitForMultipleObjects, CreateEventW, GetProcAddress, GetModuleFileNameW, Sleep, VirtualFreeEx, VirtualFree, GetModuleHandleW, SetEvent, WaitForSingleObject, SetErrorMode, GetCommandLineW, GetLastError
                          NETAPI32.dllNetUserEnum, NetApiBufferFree, NetUserGetInfo
                          OLEAUT32.dllVariantInit, VariantClear, SysAllocString, SysFreeString
                          SHELL32.dllCommandLineToArgvW, SHGetFolderPathW, ShellExecuteW
                          SHLWAPI.dllwvnsprintfW, PathIsDirectoryW, PathFindFileNameW, PathAddBackslashW, SHDeleteValueW, PathSkipRootW, SHDeleteKeyW, PathRemoveBackslashW, UrlUnescapeA, PathRenameExtensionW, PathMatchSpecW, StrCmpNIA, wvnsprintfA, PathUnquoteSpacesW, PathQuoteSpacesW, PathIsURLW, StrStrIW, PathRemoveFileSpecW, PathAddExtensionW, StrStrIA, PathCombineW, StrCmpNIW
                          Secur32.dllGetUserNameExW
                          USER32.dllDrawIcon, LoadImageW, CharLowerBuffA, CharLowerW, ToUnicode, GetClipboardData, GetKeyboardState, ExitWindowsEx, GetIconInfo, DispatchMessageW, CharUpperW, PeekMessageW, CharLowerA, TranslateMessage, CharToOemW, MsgWaitForMultipleObjects, GetCursorPos
                          WININET.dllInternetCrackUrlA, HttpAddRequestHeadersW, InternetSetStatusCallbackW, GetUrlCacheEntryInfoW, HttpSendRequestW, InternetReadFileExA, InternetQueryDataAvailable, HttpSendRequestExW, HttpSendRequestExA, HttpAddRequestHeadersA, InternetQueryOptionA, InternetCloseHandle, InternetOpenA, HttpSendRequestA, HttpOpenRequestA, InternetSetOptionA, InternetReadFile, InternetConnectA, HttpQueryInfoA
                          WS2_32.dllWSASetLastError, closesocket, FreeAddrInfoW, listen, socket, recv, sendto, WSASend, WSAEventSelect, getpeername, WSAIoctl, connect, WSAAddressToStringW, WSAStartup, recvfrom, getaddrinfo, select, WSAGetLastError, getsockname, shutdown, setsockopt, send, accept, bind
                          ole32.dllStringFromGUID2, CLSIDFromString, CoUninitialize, CoCreateInstance, CoInitializeEx
                          No network behavior found

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:03:54:22
                          Start date:27/08/2022
                          Path:C:\Users\user\Desktop\OatAFVzm15.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\OatAFVzm15.exe"
                          Imagebase:0x400000
                          File size:267264 bytes
                          MD5 hash:B741DAECA2EDB8D539BE2938E5F9490F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000000.00000000.257430326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000000.00000000.256899254.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000000.00000002.270314318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000000.00000000.254870638.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:3
                          Start time:03:54:24
                          Start date:27/08/2022
                          Path:C:\Windows\SysWOW64\WerFault.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 224
                          Imagebase:0x1170000
                          File size:434592 bytes
                          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          No disassembly