Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:715074
MD5:e337a4d30d5b3cc3bcf3d3789dad3566
SHA1:739b485a3633b500c43320e98488538c0bda3106
SHA256:bddb07a1bc6effa8751ce6b40fc5e86f6c31f0b2403e696c99b522d89dd179dd
Tags:exeSmokeLoader
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged

Classification

  • System is w10x64
  • file.exe (PID: 5624 cmdline: C:\Users\user\Desktop\file.exe MD5: E337A4D30D5B3CC3BCF3D3789DAD3566)
    • explorer.exe (PID: 3320 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vbfvrba (PID: 4616 cmdline: C:\Users\user\AppData\Roaming\vbfvrba MD5: E337A4D30D5B3CC3BCF3D3789DAD3566)
  • vbfvrba (PID: 3312 cmdline: C:\Users\user\AppData\Roaming\vbfvrba MD5: E337A4D30D5B3CC3BCF3D3789DAD3566)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
        • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
        Click to see the 18 entries
        SourceRuleDescriptionAuthorStrings
        14.2.vbfvrba.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          14.3.vbfvrba.5b0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            11.2.vbfvrba.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                14.2.vbfvrba.5a0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  Click to see the 4 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: file.exeVirustotal: Detection: 36%Perma Link
                  Source: http://host-host-file8.com/URL Reputation: Label: malware
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaJoe Sandbox ML: detected
                  Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                  Source: Binary string: C:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr
                  Source: Binary string: VC:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr

                  Networking

                  barindex
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: Malware configuration extractorURLs: http://host-file-host6.com/
                  Source: Malware configuration extractorURLs: http://host-host-file8.com/
                  Source: Joe Sandbox ViewASN Name: GULFSTREAMUA GULFSTREAMUA
                  Source: Joe Sandbox ViewIP Address: 176.124.192.17 176.124.192.17
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ucdldn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 334Host: host-file-host6.com
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ucdldn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 334Host: host-file-host6.com
                  Source: unknownDNS traffic detected: queries for: host-file-host6.com

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 14.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.3.vbfvrba.5b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.vbfvrba.5a0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.6c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.3.vbfvrba.21b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.6b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.6e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: file.exe, 00000000.00000002.327865550.00000000008AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 0000000E.00000002.458600340.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.376742347.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 0000000E.00000002.458600340.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.376742347.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040180C Sleep,NtTerminateProcess,
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401818 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401822 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401826 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401834 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_0040180C Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401818 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401822 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401826 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401834 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_0040180C Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401818 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401822 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401826 Sleep,NtTerminateProcess,
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401834 Sleep,NtTerminateProcess,
                  Source: file.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  Source: vbfvrba.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\explorer.exeSection loaded: webio.dll
                  Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                  Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                  Source: file.exeVirustotal: Detection: 36%
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\vbfvrba C:\Users\user\AppData\Roaming\vbfvrba
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\vbfvrba C:\Users\user\AppData\Roaming\vbfvrba
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbfvrbaJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@4/1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BEF41 CreateToolhelp32Snapshot,Module32First,
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr
                  Source: Binary string: VC:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaUnpacked PE file: 11.2.vbfvrba.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaUnpacked PE file: 14.2.vbfvrba.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011D0 push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011D7 push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011EB push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B1252 push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B123E push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B1237 push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BFBB7 push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BFBCC push ebx; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008CA9F2 push cs; iretd
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008C4A56 pushad ; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_004011D0 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_004011D7 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_004011EB push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E1252 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E123E push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E1237 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_004011D0 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_004011D7 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_004011EB push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A1252 push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A123E push ebx; iretd
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A1237 push ebx; iretd
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbfvrbaJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbfvrbaJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vbfvrba:Zone.Identifier read attributes | delete

                  Malware Analysis System Evasion

                  barindex
                  Source: file.exe, 00000000.00000002.327865550.00000000008AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Windows\explorer.exe TID: 5132Thread sleep count: 672 > 30
                  Source: C:\Windows\explorer.exe TID: 1932Thread sleep count: 412 > 30
                  Source: C:\Windows\explorer.exe TID: 1932Thread sleep time: -41200s >= -30000s
                  Source: C:\Windows\explorer.exe TID: 5156Thread sleep count: 350 > 30
                  Source: C:\Windows\explorer.exe TID: 5156Thread sleep time: -35000s >= -30000s
                  Source: C:\Windows\explorer.exe TID: 5892Thread sleep count: 576 > 30
                  Source: C:\Windows\explorer.exe TID: 6104Thread sleep count: 317 > 30
                  Source: C:\Windows\explorer.exe TID: 6104Thread sleep time: -31700s >= -30000s
                  Source: C:\Windows\explorer.exe TID: 5880Thread sleep count: 248 > 30
                  Source: C:\Windows\explorer.exe TID: 5216Thread sleep count: 464 > 30
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 672
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 412
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 576
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 464
                  Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformation
                  Source: explorer.exe, 00000001.00000000.264913549.0000000007AFF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                  Source: explorer.exe, 00000001.00000000.325633709.0000000007B66000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000008
                  Source: explorer.exe, 00000001.00000000.271656643.000000000F278000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.296837092.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.259525432.0000000005EF4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.296837092.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}E2%d
                  Source: explorer.exe, 00000001.00000000.291761489.0000000005F12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformation
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSystem information queried: CodeIntegrityInformation
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSystem information queried: CodeIntegrityInformation
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B092B mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B0D90 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BE81E push dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E092B mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E0D90 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A092B mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A0D90 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaProcess queried: DebugPort

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: vbfvrba.1.drJump to dropped file
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                  Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2671930
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaThread created: unknown EIP: 2691930
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaThread created: unknown EIP: 4531930
                  Source: explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.255414725.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.286060810.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                  Source: explorer.exe, 00000001.00000000.296783129.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.325706644.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000001.00000000.308505060.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.255215437.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.255414725.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.286060810.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 14.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.3.vbfvrba.5b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.vbfvrba.5a0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.6c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.3.vbfvrba.21b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.6b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.6e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 14.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.3.vbfvrba.5b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.vbfvrba.5a0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.6c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.3.vbfvrba.21b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.6b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.6e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  32
                  Process Injection
                  11
                  Masquerading
                  1
                  Input Capture
                  311
                  Security Software Discovery
                  Remote Services1
                  Input Capture
                  Exfiltration Over Other Network Medium2
                  Non-Application Layer Protocol
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  12
                  Virtualization/Sandbox Evasion
                  LSASS Memory12
                  Virtualization/Sandbox Evasion
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                  Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)32
                  Process Injection
                  Security Account Manager3
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Hidden Files and Directories
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Obfuscated Files or Information
                  LSA Secrets3
                  System Information Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common1
                  Software Packing
                  Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  File Deletion
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 715074 Sample: file.exe Startdate: 03/10/2022 Architecture: WINDOWS Score: 100 23 host-file-host6.com 2->23 37 Malicious sample detected (through community Yara rule) 2->37 39 Antivirus detection for URL or domain 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 4 other signatures 2->43 7 file.exe 2->7         started        10 vbfvrba 2->10         started        12 vbfvrba 2->12         started        signatures3 process4 signatures5 45 Detected unpacking (changes PE section rights) 7->45 47 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->47 49 Maps a DLL or memory area into another process 7->49 14 explorer.exe 2 7->14 injected 51 Machine Learning detection for dropped file 10->51 53 Checks if the current machine is a virtual machine (disk enumeration) 10->53 55 Creates a thread in another existing process (thread injection) 10->55 process6 dnsIp7 25 host-file-host6.com 176.124.192.17, 49703, 80 GULFSTREAMUA Russian Federation 14->25 27 host-host-file8.com 14->27 19 C:\Users\user\AppData\Roaming\vbfvrba, PE32 14->19 dropped 21 C:\Users\user\...\vbfvrba:Zone.Identifier, ASCII 14->21 dropped 29 System process connects to network (likely due to code injection or exploit) 14->29 31 Benign windows process drops PE files 14->31 33 Deletes itself after installation 14->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->35 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe37%VirustotalBrowse
                  file.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\vbfvrba100%Joe Sandbox ML
                  SourceDetectionScannerLabelLinkDownload
                  14.3.vbfvrba.5b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.2.vbfvrba.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.2.vbfvrba.6e0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.file.exe.6b0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.3.file.exe.6c0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.3.vbfvrba.21b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  14.2.vbfvrba.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  14.2.vbfvrba.5a0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://host-file-host6.com/0%URL Reputationsafe
                  http://host-host-file8.com/100%URL Reputationmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  host-file-host6.com
                  176.124.192.17
                  truetrue
                    unknown
                    host-host-file8.com
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://host-file-host6.com/true
                      • URL Reputation: safe
                      unknown
                      http://host-host-file8.com/true
                      • URL Reputation: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      176.124.192.17
                      host-file-host6.comRussian Federation
                      59652GULFSTREAMUAtrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:715074
                      Start date and time:2022-10-03 15:57:31 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 35s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@3/2@4/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 28.8% (good quality ratio 24.4%)
                      • Quality average: 45.2%
                      • Quality standard deviation: 27.1%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      15:59:22Task SchedulerRun new task: Firefox Default Browser Agent 937156EFB9A900F6 path: C:\Users\user\AppData\Roaming\vbfvrba
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):150016
                      Entropy (8bit):6.777924709615045
                      Encrypted:false
                      SSDEEP:3072:0jiakzWt9fGfGXLHuAr+ax7OwtUqzxsaCCSSbO:0j8qbHbKItdWaLV
                      MD5:E337A4D30D5B3CC3BCF3D3789DAD3566
                      SHA1:739B485A3633B500C43320E98488538C0BDA3106
                      SHA-256:BDDB07A1BC6EFFA8751CE6B40FC5E86F6C31F0B2403E696C99B522D89DD179DD
                      SHA-512:6C054CFC49CBADF90850F15CF7B6DFE3D801EEFD55E017F212B261FB3E03C4BB37EE94F0B31C2983EE3FC00BE32E90B2642994F24B05D4AA7D8E140EC79205B1
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}..............N1......N'................D....N ......N0......N5.....Rich............PE..L...4..`.....................6.......L............@.................................y...........................................P........K..........................................................0,..@............................................text............................... ..`.data...............................@....rsrc....K.......L..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.777924709615045
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:150016
                      MD5:e337a4d30d5b3cc3bcf3d3789dad3566
                      SHA1:739b485a3633b500c43320e98488538c0bda3106
                      SHA256:bddb07a1bc6effa8751ce6b40fc5e86f6c31f0b2403e696c99b522d89dd179dd
                      SHA512:6c054cfc49cbadf90850f15cf7b6dfe3d801eefd55e017f212b261fb3e03c4bb37ee94f0b31c2983ee3fc00be32e90b2642994f24b05d4aa7d8e140ec79205b1
                      SSDEEP:3072:0jiakzWt9fGfGXLHuAr+ax7OwtUqzxsaCCSSbO:0j8qbHbKItdWaLV
                      TLSH:6AE3DF2139A0C473C616CA710874D964BB3FF9926B3985477B8C2B2D0F713D25EBA35A
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}...............N1......N'.................D....N ......N0......N5.....Rich............PE..L...4..`.....................6.....
                      Icon Hash:32f2c4ccccc692a0
                      Entrypoint:0x404c07
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x60C1FF34 [Thu Jun 10 12:01:56 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:2d5ec24fb9d2ee4cf8208f9e16125d4f
                      Instruction
                      call 00007F4DC8D091DBh
                      jmp 00007F4DC8D05D6Dh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      mov ecx, dword ptr [esp+04h]
                      test ecx, 00000003h
                      je 00007F4DC8D05F16h
                      mov al, byte ptr [ecx]
                      add ecx, 01h
                      test al, al
                      je 00007F4DC8D05F40h
                      test ecx, 00000003h
                      jne 00007F4DC8D05EE1h
                      add eax, 00000000h
                      lea esp, dword ptr [esp+00000000h]
                      lea esp, dword ptr [esp+00000000h]
                      mov eax, dword ptr [ecx]
                      mov edx, 7EFEFEFFh
                      add edx, eax
                      xor eax, FFFFFFFFh
                      xor eax, edx
                      add ecx, 04h
                      test eax, 81010100h
                      je 00007F4DC8D05EDAh
                      mov eax, dword ptr [ecx-04h]
                      test al, al
                      je 00007F4DC8D05F24h
                      test ah, ah
                      je 00007F4DC8D05F16h
                      test eax, 00FF0000h
                      je 00007F4DC8D05F05h
                      test eax, FF000000h
                      je 00007F4DC8D05EF4h
                      jmp 00007F4DC8D05EBFh
                      lea eax, dword ptr [ecx-01h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-02h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-03h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-04h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      cmp ecx, dword ptr [0042006Ch]
                      jne 00007F4DC8D05EF4h
                      rep ret
                      jmp 00007F4DC8D091C3h
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      Programming Language:
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [C++] VS2008 build 21022
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe10c0x50.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x17c0000x4bf8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12100x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2c300x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xdc060xde00False0.48134853603603606data5.874806872478882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0xf0000x16c2fc0x11c00False0.8886168573943662data7.587752029512684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x17c0000x4bf80x4c00False0.47774465460526316data4.668681479659218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x17c2b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors
                      RT_ICON0x17cb580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                      RT_ICON0x17f1000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                      RT_STRING0x1803a80x42data
                      RT_STRING0x1803f00x280data
                      RT_STRING0x1806700x3cedata
                      RT_STRING0x180a400x1b2data
                      RT_ACCELERATOR0x1801d80x80data
                      RT_GROUP_ICON0x1801a80x30data
                      RT_VERSION0x1802680x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                      None0x1802580xadata
                      DLLImport
                      KERNEL32.dllLoadLibraryA, InterlockedPushEntrySList, GetConsoleAliasesW, ReadFile, ReadConsoleW, GetVolumeInformationA, GetComputerNameA, LocalFree, InterlockedDecrement, SetSystemTimeAdjustment, SetLocaleInfoA, FindNextVolumeA, FindCloseChangeNotification, CopyFileExA, MoveFileWithProgressW, VerifyVersionInfoW, LocalSize, FileTimeToDosDateTime, DebugBreak, GlobalGetAtomNameW, IsBadWritePtr, FindResourceA, GetComputerNameExW, GetProcAddress, GetStringTypeW, GetFileTime, GetConsoleAliasesLengthW, GetVolumeNameForVolumeMountPointA, DeleteVolumeMountPointA, GetCPInfo, PostQueuedCompletionStatus, MoveFileWithProgressA, CopyFileA, lstrcpynW, WriteConsoleW, GetBinaryTypeA, WriteConsoleOutputW, GetCommandLineA, InterlockedIncrement, CreateActCtxW, FormatMessageA, GetModuleHandleW, GetModuleHandleA, LeaveCriticalSection, GetStringTypeExA, OpenMutexW, FindResourceW, RtlCaptureContext, InterlockedExchange, InitializeCriticalSectionAndSpinCount, DeleteFiber, InterlockedExchangeAdd, EnumDateFormatsA, GetPrivateProfileStructA, GetNamedPipeHandleStateW, RegisterWaitForSingleObject, LocalAlloc, QueryMemoryResourceNotification, SetLastError, GetProcessPriorityBoost, GetMailslotInfo, HeapWalk, SetFilePointer, SetConsoleMode, RaiseException, RtlUnwind, GetLastError, MoveFileA, DeleteFileA, GetStartupInfoA, HeapAlloc, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, LCMapStringA, LCMapStringW
                      USER32.dllCharUpperBuffW
                      WINHTTP.dllWinHttpCreateUrl
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 3, 2022 15:59:23.101623058 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.158726931 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.158838034 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.158982992 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.159025908 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.215492964 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.215522051 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.225384951 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.225481987 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.227018118 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.283112049 CEST8049703176.124.192.17192.168.2.7
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 3, 2022 15:59:22.755625010 CEST5947753192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:23.084805012 CEST53594778.8.8.8192.168.2.7
                      Oct 3, 2022 15:59:23.237786055 CEST5575253192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:24.234636068 CEST5575253192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:25.265894890 CEST5575253192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:27.263375998 CEST53557528.8.8.8192.168.2.7
                      Oct 3, 2022 15:59:28.261560917 CEST53557528.8.8.8192.168.2.7
                      Oct 3, 2022 15:59:29.293272972 CEST53557528.8.8.8192.168.2.7
                      TimestampSource IPDest IPChecksumCodeType
                      Oct 3, 2022 15:59:28.261730909 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                      Oct 3, 2022 15:59:29.293365955 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 3, 2022 15:59:22.755625010 CEST192.168.2.78.8.8.80x1f55Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:23.237786055 CEST192.168.2.78.8.8.80xb9d5Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:24.234636068 CEST192.168.2.78.8.8.80xb9d5Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:25.265894890 CEST192.168.2.78.8.8.80xb9d5Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 3, 2022 15:59:23.084805012 CEST8.8.8.8192.168.2.70x1f55No error (0)host-file-host6.com176.124.192.17A (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:27.263375998 CEST8.8.8.8192.168.2.70xb9d5Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:28.261560917 CEST8.8.8.8192.168.2.70xb9d5Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:29.293272972 CEST8.8.8.8192.168.2.70xb9d5Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      • ucdldn.net
                        • host-file-host6.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.749703176.124.192.1780C:\Windows\explorer.exe
                      TimestampkBytes transferredDirectionData
                      Oct 3, 2022 15:59:23.158982992 CEST103OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://ucdldn.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 334
                      Host: host-file-host6.com
                      Oct 3, 2022 15:59:23.225384951 CEST104INHTTP/1.1 200 OK
                      Server: nginx/1.20.1
                      Date: Mon, 03 Oct 2022 13:59:23 GMT
                      Content-Type: text/html; charset=UTF-8
                      Transfer-Encoding: chunked
                      Connection: close
                      Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                      Data Ascii: fYour IP blocked0


                      Click to jump to process

                      Target ID:0
                      Start time:15:58:26
                      Start date:03/10/2022
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\file.exe
                      Imagebase:0x400000
                      File size:150016 bytes
                      MD5 hash:E337A4D30D5B3CC3BCF3D3789DAD3566
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:1
                      Start time:15:58:34
                      Start date:03/10/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff75ed40000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:high

                      Target ID:11
                      Start time:15:59:22
                      Start date:03/10/2022
                      Path:C:\Users\user\AppData\Roaming\vbfvrba
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\vbfvrba
                      Imagebase:0x400000
                      File size:150016 bytes
                      MD5 hash:E337A4D30D5B3CC3BCF3D3789DAD3566
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.376742347.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      Target ID:14
                      Start time:16:00:01
                      Start date:03/10/2022
                      Path:C:\Users\user\AppData\Roaming\vbfvrba
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\vbfvrba
                      Imagebase:0x400000
                      File size:150016 bytes
                      MD5 hash:E337A4D30D5B3CC3BCF3D3789DAD3566
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000E.00000002.458600340.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      No disassembly