Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OatAFVzm15.exe

Overview

General Information

Sample Name:OatAFVzm15.exe
Analysis ID:691234
MD5:b741daeca2edb8d539be2938e5f9490f
SHA1:4affabf1f09e55a1777fedbe83fc26905943045c
SHA256:c688c3da0b3fe263e2441f884d47966bb74875c94564e7694aa1c462e5c9435f
Tags:exezeus2
Infos:

Detection

Citadel
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Citadel
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
PE file contains an invalid checksum
Checks if the current process is being debugged
Entry point lies outside standard sections
May initialize a security null descriptor

Classification

  • System is w10x64
  • OatAFVzm15.exe (PID: 772 cmdline: "C:\Users\user\Desktop\OatAFVzm15.exe" MD5: B741DAECA2EDB8D539BE2938E5F9490F)
    • WerFault.exe (PID: 6092 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 212 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
OatAFVzm15.exeJoeSecurity_CitadelYara detected CitadelJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.249623287.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
      00000001.00000000.248127496.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
        00000001.00000002.644531481.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
          00000001.00000000.250108543.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
            Process Memory Space: OatAFVzm15.exe PID: 772JoeSecurity_CitadelYara detected CitadelJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              1.0.OatAFVzm15.exe.400000.0.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                1.0.OatAFVzm15.exe.400000.2.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                  1.0.OatAFVzm15.exe.400000.1.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                    1.2.OatAFVzm15.exe.400000.0.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: OatAFVzm15.exeAvira: detected
                      Source: OatAFVzm15.exeMetadefender: Detection: 56%Perma Link
                      Source: OatAFVzm15.exeReversingLabs: Detection: 92%
                      Source: OatAFVzm15.exeJoe Sandbox ML: detected
                      Source: 1.2.OatAFVzm15.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
                      Source: 1.0.OatAFVzm15.exe.400000.1.unpackAvira: Label: TR/Spy.Gen
                      Source: 1.0.OatAFVzm15.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
                      Source: 1.0.OatAFVzm15.exe.400000.2.unpackAvira: Label: TR/Spy.Gen
                      Source: OatAFVzm15.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: OatAFVzm15.exeString found in binary or memory: http://www.google.com/webhp
                      Source: OatAFVzm15.exeString found in binary or memory: http://www.google.com/webhpbcU

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: Yara matchFile source: OatAFVzm15.exe, type: SAMPLE
                      Source: Yara matchFile source: 1.0.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.OatAFVzm15.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.OatAFVzm15.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000000.249623287.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.248127496.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.644531481.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.250108543.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OatAFVzm15.exe PID: 772, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: OatAFVzm15.exe, type: SAMPLE
                      Source: Yara matchFile source: 1.0.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.OatAFVzm15.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.OatAFVzm15.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.OatAFVzm15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000000.249623287.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.248127496.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.644531481.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.250108543.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OatAFVzm15.exe PID: 772, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: Process Memory Space: OatAFVzm15.exe PID: 772, type: MEMORYSTRMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                      Source: OatAFVzm15.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: Process Memory Space: OatAFVzm15.exe PID: 772, type: MEMORYSTRMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 212
                      Source: OatAFVzm15.exeMetadefender: Detection: 56%
                      Source: OatAFVzm15.exeReversingLabs: Detection: 92%
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AB9.tmpJump to behavior
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: classification engineClassification label: mal76.bank.winEXE@2/4@0/0
                      Source: unknownProcess created: C:\Users\user\Desktop\OatAFVzm15.exe "C:\Users\user\Desktop\OatAFVzm15.exe"
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 212
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess772
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: OatAFVzm15.exeStatic PE information: real checksum: 0x2ea1b should be: 0x5069c
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .data
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\OatAFVzm15.exeProcess queried: DebugPort
                      Source: OatAFVzm15.exe, 00000001.00000000.250108543.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: S:(ML;;NRNWNX;;;LW)SeSecurityPrivilegeS:(ML;CIOI;NRNWNX;;;LW)?O?I?Tcabcabinet.dllFCICreateFCIAddFileFCIFlushCabinetFCIDestroyunknownInstallDateSOFTWARE\Microsoft\Windows NT\CurrentVersionDigitalProductId%s_%08X%08Xfatal_errorbcdfghklmnpqrstvwxzaeiouyGlobal\Local\:d
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath Interception1
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping1
                      Security Software Discovery
                      Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Software Packing
                      LSASS Memory1
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                      Process Injection
                      Security Account Manager1
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
                      Remote System Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      OatAFVzm15.exe57%MetadefenderBrowse
                      OatAFVzm15.exe92%ReversingLabsWin32.Trojan.Zeus
                      OatAFVzm15.exe100%AviraTR/Spy.Gen
                      OatAFVzm15.exe100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      1.2.OatAFVzm15.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
                      1.0.OatAFVzm15.exe.400000.1.unpack100%AviraTR/Spy.GenDownload File
                      1.0.OatAFVzm15.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
                      1.0.OatAFVzm15.exe.400000.2.unpack100%AviraTR/Spy.GenDownload File
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.google.com/webhpOatAFVzm15.exefalse
                        high
                        http://www.google.com/webhpbcUOatAFVzm15.exefalse
                          high
                          No contacted IP infos
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:691234
                          Start date and time:2022-08-27 03:58:55 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 5m 38s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:OatAFVzm15.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Run name:Run with higher sleep bypass
                          Number of analysed new started processes analysed:25
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal76.bank.winEXE@2/4@0/0
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Sleeps bigger than 300000ms are automatically reduced to 1000ms
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.42.73.29
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, login.live.com, eudb.ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                          • Not all processes where analyzed, report is missing behavior information
                          • VT rate limit hit for: OatAFVzm15.exe
                          No simulations
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.8477355130975469
                          Encrypted:false
                          SSDEEP:96:0FOFfc6hFNhM1Dg3f6UpXIQcQzc6CmcE1cw3CH+HbHg/opAnQ0DF16Fawn9TxifT:049Lh8iHNXfnjJ/u7suS274It0i
                          MD5:67ED49590B71E87BC8AEF7FED35BEDA5
                          SHA1:17943598405BF7ADEE1A6D940C728B98C7CFFEF5
                          SHA-256:FFE956B2D85E2C8FABFB8AC382C63DB6D2F283BF7366439F1CE9D7FDD58AB76D
                          SHA-512:F8A9380C2DFFDB7691CE32EDDE652318D89DD76BA2B1D760B512B0B1F4B628C8CEAF71CC9962F975CE13A6EA13F7C5B46557FC4D4BC8CC61114E1FFF3ECBA0AF
                          Malicious:true
                          Reputation:low
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.6.0.7.1.5.9.0.8.8.1.3.7.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.6.0.7.1.5.9.2.4.2.8.2.3.2.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.a.e.f.a.5.d.-.3.0.d.9.-.4.5.3.0.-.8.4.9.6.-.e.9.3.6.f.3.3.f.2.5.b.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.2.8.c.0.d.5.-.a.2.b.a.-.4.5.7.f.-.8.b.d.3.-.9.7.2.2.d.7.f.a.d.b.5.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.O.a.t.A.F.V.z.m.1.5...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.0.4.-.0.0.0.1.-.0.0.1.f.-.2.3.5.9.-.a.9.1.f.0.4.b.a.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.7.6.f.6.0.9.7.1.0.f.3.c.d.f.0.6.3.5.7.7.d.c.7.a.5.8.c.7.e.c.e.0.0.0.0.f.f.f.f.!.0.0.0.0.4.a.f.f.a.b.f.1.f.0.9.e.5.5.a.1.7.7.7.f.e.d.b.e.8.3.f.c.2.6.9.0.5.9.4.3.0.4.5.c.!.O.a.t.A.F.V.z.m.1.5...e.x.e.....T.a.r.g.e.t.A.p.p.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Sat Aug 27 10:59:51 2022, 0x1205a4 type
                          Category:dropped
                          Size (bytes):34716
                          Entropy (8bit):2.202131923820371
                          Encrypted:false
                          SSDEEP:192:ZkBBj9VBsiv0O65OsdSN591U03PjKHyl6DBQCW:aJVBsQ6rY5jKxBXW
                          MD5:45472289EA981225005104219636EC68
                          SHA1:28675A39F6405261955670E64A2092D0699D6B9D
                          SHA-256:038786401FD022238B42FA9231B7CF4682E150676FF567A892B3CCACF5DA4962
                          SHA-512:387D498F6D8B904849EFF2F28384BA4312A69C975EE5DC45C562F7525BC0C6C7046802541174239E7E5B9E90C0DFE935FD9537C8F2BEE511B00F16463C4B680E
                          Malicious:false
                          Reputation:low
                          Preview:MDMP....... .......'..c........................4................(..........T.......8...........T............................................................................................................U...........B......T.......GenuineIntelW...........T...........$..c.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8284
                          Entropy (8bit):3.6967453155481205
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNija6F6YqbSUMLrgmf2QjS3OzCpxT89bESsfiGsm:RrlsNie6F6YWSUMngmf2QjS3O9ERfd
                          MD5:66631305A7D025E8E6DE30003254E753
                          SHA1:9BA48BE6C3EA2D67A691F793850901C59A5ACE21
                          SHA-256:FEA2674FE4A504EFE873738BA4433B61BE9211955148464134B824873AC01B2F
                          SHA-512:09864257CB92A302C4132094C61BDC5E61AEAAE7ECA427376421A8E795CA8DAA3967F25DB06F28D8026325291DA6BA97A52FE9A122004573821D330035825504
                          Malicious:false
                          Reputation:low
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.2.<./.P.i.d.>.........
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4567
                          Entropy (8bit):4.4595943412768975
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zsdJgtWI90SWgc8sqYjf8fm8M4JPlF/c+q8vA2pjusNVMlOd:uITf3PzgrsqYYJsPgju2VMlOd
                          MD5:2E9D1069FB8B86985BBC56341C8458B5
                          SHA1:46C27DD82AA8C2F31EC1BBB149B8D576EA54CA6C
                          SHA-256:1B4B6082E07DF792F627F9E3E1025B99278F6AB0842669BC1D4CB390FA1ACB96
                          SHA-512:2F40A7A399B517D5C9F94BCFB600AED642E1D7346F67AF65D44E47B0800FCA9D21B288D46B8069C499D7B20CF1599B0A1DDD9E05415699EAA65FECB5FA06A911
                          Malicious:false
                          Reputation:low
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1665850" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):3.4408516130120472
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.94%
                          • Clipper DOS Executable (2020/12) 0.02%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Lumena CEL bitmap (63/63) 0.00%
                          File name:OatAFVzm15.exe
                          File size:267264
                          MD5:b741daeca2edb8d539be2938e5f9490f
                          SHA1:4affabf1f09e55a1777fedbe83fc26905943045c
                          SHA256:c688c3da0b3fe263e2441f884d47966bb74875c94564e7694aa1c462e5c9435f
                          SHA512:f43fac8e1ab37c70c6633cd558fd9d164fea51cd1835086cdaf42aff60d2b444626b609d4af5f627953913bcf6fc4a0dd1bb39737dc0e23b1bd3bd61930edd20
                          SSDEEP:3072:E/DD2zNc31I3tgt89I51ceYaQHK3HEEooVj9k:E/hCdgtR569aQuHEcVj9
                          TLSH:6844BF5BB98184B7D5BA3B709DA8B23663FF8D24242DCD87E7580D993831861F22D307
                          File Content Preview:MZ......................@...............................................................................................................................................................................................................................PE..L..
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x403ee5
                          Entrypoint Section:.data
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:
                          Time Stamp:0x408FF235 [Wed Apr 28 18:04:37 2004 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:7
                          OS Version Minor:2
                          File Version Major:7
                          File Version Minor:2
                          Subsystem Version Major:7
                          Subsystem Version Minor:2
                          Import Hash:f3b6157e0baac9b50d25d58c877c29ad
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 6Ch
                          push esi
                          push dword ptr [ebp+0Ch]
                          lea eax, dword ptr [ebp-68h]
                          push eax
                          push dword ptr [ebp+08h]
                          call 00007F36E0770AC7h
                          lea eax, dword ptr [ebp-68h]
                          push eax
                          push 00000000h
                          push 0041A2CCh
                          call dword ptr [004011A4h]
                          test eax, eax
                          je 00007F36E0770B1Bh
                          mov esi, eax
                          call 00007F36E0777CB3h
                          jmp 00007F36E0770B14h
                          xor eax, eax
                          pop esi
                          leave
                          retn 0008h
                          push ebp
                          mov ebp, esp
                          push ecx
                          push ecx
                          mov eax, dword ptr [0041A2A4h]
                          push ebx
                          push edi
                          call 00007F36E0779029h
                          xor ebx, ebx
                          mov dword ptr [ebp-08h], eax
                          cmp eax, ebx
                          jne 00007F36E0770B19h
                          xor eax, eax
                          jmp 00007F36E0770BD3h
                          push 00000002h
                          push ebx
                          push ebx
                          lea eax, dword ptr [ebp+08h]
                          push eax
                          push edi
                          push dword ptr [ebp+08h]
                          mov byte ptr [ebp-01h], bl
                          push FFFFFFFFh
                          call dword ptr [004011F4h]
                          test eax, eax
                          jne 00007F36E0770B16h
                          mov byte ptr [ebp-01h], 00000001h
                          push esi
                          mov esi, dword ptr [004011E0h]
                          push ebx
                          push 00000004h
                          lea ecx, dword ptr [ebp+0Ch]
                          push ecx
                          mov ecx, dword ptr [ebp-08h]
                          mov eax, 0041A290h
                          sub eax, dword ptr [0041A2A4h]
                          add eax, ecx
                          push eax
                          push edi
                          call esi
                          test eax, eax
                          jne 00007F36E0770B15h
                          inc byte ptr [ebp-01h]
                          push ebx
                          push 00000004h
                          lea ecx, dword ptr [ebp-08h]
                          push ecx
                          mov ecx, dword ptr [ebp-08h]
                          mov eax, 0041A2A4h
                          sub eax, dword ptr [0041A2A4h]
                          add eax, ecx
                          push eax
                          push edi
                          call esi
                          pop esi
                          test eax, eax
                          jne 00007F36E0770B15h
                          inc byte ptr [ebp-01h]
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x12000xd20178
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x400000xf0.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x4d0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .data0x10000x40000x4000False0.5638427734375data5.9940228845162915IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x50000x10000x1000False0.588623046875data6.193572249131582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x60000x1b0000x1b000False0.49233217592592593data5.64920698370386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x210000x1f0000x1f000False0.0011498235887096775data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .idata0x400000x14000x1400False0.4671875data5.092882560692016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          DLLImport
                          ADVAPI32.dllRegCloseKey, CryptCreateHash, LookupPrivilegeValueW, SetNamedSecurityInfoW, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CreateProcessAsUserW, RegQueryValueExW, CryptReleaseContext, RegCreateKeyExW, GetTokenInformation, GetSidSubAuthorityCount, OpenThreadToken, CryptAcquireContextW, GetSidSubAuthority, OpenProcessToken, CryptGetHashParam, RegEnumKeyExW, RegOpenKeyExW, GetLengthSid, IsWellKnownSid, GetSecurityDescriptorSacl, SetSecurityDescriptorSacl, CryptDestroyHash, AdjustTokenPrivileges, ConvertSidToStringSidW, RegSetValueExW, CryptHashData, EqualSid, InitiateSystemShutdownExW, ConvertStringSecurityDescriptorToSecurityDescriptorW
                          CRYPT32.dllCertDeleteCRLFromStore, CertCloseStore, PFXImportCertStore, CertEnumCertificatesInStore, CertDuplicateCRLContext, PFXExportCertStoreEx, CertOpenSystemStoreW
                          KERNEL32.dllCreateProcessW, HeapAlloc, SystemTimeToFileTime, SetFilePointerEx, HeapFree, CreateDirectoryW, GetComputerNameW, GetTickCount, GetCurrentThread, GetProcessHeap, IsBadReadPtr, SetFileTime, VirtualQueryEx, WriteFile, OpenProcess, Thread32First, WideCharToMultiByte, ReadProcessMemory, GetVersionExW, HeapDestroy, HeapCreate, GetFileAttributesW, Thread32Next, ReadFile, GetTimeZoneInformation, CreateFileW, MultiByteToWideChar, FlushFileBuffers, GetTempPathW, GetFileSizeEx, FreeLibrary, GetEnvironmentVariableW, SetLastError, VirtualProtectEx, VirtualAllocEx, FindClose, LoadLibraryA, RemoveDirectoryW, FindNextFileW, VirtualProtect, CreateToolhelp32Snapshot, GetFileTime, ReleaseMutex, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, DeleteFileW, GetFileInformationByHandle, GetSystemTime, SetFileAttributesW, CreateThread, CreateRemoteThread, Process32FirstW, Process32NextW, lstrcmpi, WTSGetActiveConsoleSessionId, SetThreadPriority, GetLocalTime, GlobalLock, GlobalUnlock, ResetEvent, MoveFileExW, GetUserDefaultUILanguage, SetEndOfFile, GetNativeSystemInfo, FindFirstFileW, CreateMutexW, HeapReAlloc, GetTempFileNameW, OpenMutexW, FileTimeToDosDateTime, GetProcessId, EnterCriticalSection, VirtualAlloc, LeaveCriticalSection, InitializeCriticalSection, SetThreadContext, GetThreadContext, ExpandEnvironmentStringsW, GetPrivateProfileIntW, GetPrivateProfileStringW, WriteProcessMemory, LocalFree, GetCurrentProcessId, CloseHandle, ExitProcess, DuplicateHandle, OpenEventW, GetFileAttributesExW, lstrcmpiW, WaitForMultipleObjects, CreateEventW, GetProcAddress, GetModuleFileNameW, Sleep, VirtualFreeEx, VirtualFree, GetModuleHandleW, SetEvent, WaitForSingleObject, SetErrorMode, GetCommandLineW, GetLastError
                          NETAPI32.dllNetUserEnum, NetApiBufferFree, NetUserGetInfo
                          OLEAUT32.dllVariantInit, VariantClear, SysAllocString, SysFreeString
                          SHELL32.dllCommandLineToArgvW, SHGetFolderPathW, ShellExecuteW
                          SHLWAPI.dllwvnsprintfW, PathIsDirectoryW, PathFindFileNameW, PathAddBackslashW, SHDeleteValueW, PathSkipRootW, SHDeleteKeyW, PathRemoveBackslashW, UrlUnescapeA, PathRenameExtensionW, PathMatchSpecW, StrCmpNIA, wvnsprintfA, PathUnquoteSpacesW, PathQuoteSpacesW, PathIsURLW, StrStrIW, PathRemoveFileSpecW, PathAddExtensionW, StrStrIA, PathCombineW, StrCmpNIW
                          Secur32.dllGetUserNameExW
                          USER32.dllDrawIcon, LoadImageW, CharLowerBuffA, CharLowerW, ToUnicode, GetClipboardData, GetKeyboardState, ExitWindowsEx, GetIconInfo, DispatchMessageW, CharUpperW, PeekMessageW, CharLowerA, TranslateMessage, CharToOemW, MsgWaitForMultipleObjects, GetCursorPos
                          WININET.dllInternetCrackUrlA, HttpAddRequestHeadersW, InternetSetStatusCallbackW, GetUrlCacheEntryInfoW, HttpSendRequestW, InternetReadFileExA, InternetQueryDataAvailable, HttpSendRequestExW, HttpSendRequestExA, HttpAddRequestHeadersA, InternetQueryOptionA, InternetCloseHandle, InternetOpenA, HttpSendRequestA, HttpOpenRequestA, InternetSetOptionA, InternetReadFile, InternetConnectA, HttpQueryInfoA
                          WS2_32.dllWSASetLastError, closesocket, FreeAddrInfoW, listen, socket, recv, sendto, WSASend, WSAEventSelect, getpeername, WSAIoctl, connect, WSAAddressToStringW, WSAStartup, recvfrom, getaddrinfo, select, WSAGetLastError, getsockname, shutdown, setsockopt, send, accept, bind
                          ole32.dllStringFromGUID2, CLSIDFromString, CoUninitialize, CoCreateInstance, CoInitializeEx
                          No network behavior found

                          Click to jump to process

                          Target ID:1
                          Start time:03:59:48
                          Start date:27/08/2022
                          Path:C:\Users\user\Desktop\OatAFVzm15.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\OatAFVzm15.exe"
                          Imagebase:0x400000
                          File size:267264 bytes
                          MD5 hash:B741DAECA2EDB8D539BE2938E5F9490F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000001.00000000.249623287.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000001.00000000.248127496.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000001.00000002.644531481.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000001.00000000.250108543.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:3
                          Start time:03:59:50
                          Start date:27/08/2022
                          Path:C:\Windows\SysWOW64\WerFault.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 212
                          Imagebase:0xcb0000
                          File size:434592 bytes
                          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          No disassembly