Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b8E3zd5AYc.exe

Overview

General Information

Sample Name:b8E3zd5AYc.exe
Analysis ID:715083
MD5:2072a0a726904aed8c39095f36efd296
SHA1:29754dea5a1fb0a2ff054279a3030d84579fad15
SHA256:9ae4d00a359aa5facd231470b9a92b0542c6f8afa6e981dce7b171a08f635287
Tags:exeRecordBreaker
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • b8E3zd5AYc.exe (PID: 5104 cmdline: C:\Users\user\Desktop\b8E3zd5AYc.exe MD5: 2072A0A726904AED8C39095F36EFD296)
    • b8E3zd5AYc.exe (PID: 5976 cmdline: C:\Users\user\Desktop\b8E3zd5AYc.exe MD5: 2072A0A726904AED8C39095F36EFD296)
      • explorer.exe (PID: 3324 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vwhdahh (PID: 2952 cmdline: C:\Users\user\AppData\Roaming\vwhdahh MD5: 2072A0A726904AED8C39095F36EFD296)
    • vwhdahh (PID: 6104 cmdline: C:\Users\user\AppData\Roaming\vwhdahh MD5: 2072A0A726904AED8C39095F36EFD296)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x4984:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      6.0.vwhdahh.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        1.2.b8E3zd5AYc.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            6.0.vwhdahh.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              6.2.vwhdahh.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: b8E3zd5AYc.exeReversingLabs: Detection: 43%
                Source: b8E3zd5AYc.exeVirustotal: Detection: 36%Perma Link
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 21%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                Source: C:\Users\user\AppData\Roaming\vwhdahhReversingLabs: Detection: 43%
                Source: C:\Users\user\AppData\Roaming\vwhdahhVirustotal: Detection: 36%Perma Link
                Source: b8E3zd5AYc.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\vwhdahhJoe Sandbox ML: detected
                Source: 6.0.vwhdahh.400000.2.unpackAvira: Label: TR/Patched.Gen
                Source: 6.0.vwhdahh.400000.3.unpackAvira: Label: TR/Patched.Gen
                Source: 6.0.vwhdahh.400000.0.unpackAvira: Label: TR/Patched.Gen
                Source: 6.0.vwhdahh.400000.1.unpackAvira: Label: TR/Patched.Gen
                Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: b8E3zd5AYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: VC:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdbH source: b8E3zd5AYc.exe, vwhdahh.2.dr
                Source: Binary string: C:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdb source: b8E3zd5AYc.exe, vwhdahh.2.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: GULFSTREAMUA GULFSTREAMUA
                Source: Joe Sandbox ViewIP Address: 176.124.192.17 176.124.192.17
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://turbbv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: host-file-host6.com
                Source: explorer.exe, 00000002.00000000.349059881.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.367736313.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.317150379.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://turbbv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 6.0.vwhdahh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.b8E3zd5AYc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.vwhdahh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.vwhdahh.6115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: b8E3zd5AYc.exe, 00000000.00000002.306080518.00000000008DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: b8E3zd5AYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_0040872B
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_0040872B
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00610110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401834 Sleep,NtTerminateProcess,
                Source: b8E3zd5AYc.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                Source: vwhdahh.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: b8E3zd5AYc.exeReversingLabs: Detection: 43%
                Source: b8E3zd5AYc.exeVirustotal: Detection: 36%
                Source: b8E3zd5AYc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exe
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahh
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahh
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exe
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahh
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwhdahhJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008ECEAA CreateToolhelp32Snapshot,Module32First,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00403304 GetComputerNameExW,FindResourceA,IsBadWritePtr,GlobalGetAtomNameW,DebugBreak,FileTimeToDosDateTime,LocalSize,VerifyVersionInfoW,
                Source: b8E3zd5AYc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: VC:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdbH source: b8E3zd5AYc.exe, vwhdahh.2.dr
                Source: Binary string: C:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdb source: b8E3zd5AYc.exe, vwhdahh.2.dr
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00404930 push eax; ret
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00406ED9 push ecx; ret
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008F2C49 pushad ; iretd
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008EDDA8 push ebx; iretd
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008EDDBD push ebx; iretd
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_004011D0 push ebx; iretd
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_004011D7 push ebx; iretd
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_004011EB push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00404930 push eax; ret
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00406ED9 push ecx; ret
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00611970 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00611977 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_0061198B push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_004011D0 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_004011D7 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_004011EB push ebx; iretd
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_004033AB LoadLibraryA,GetProcAddress,VirtualProtect,
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwhdahhJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwhdahhJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\b8e3zd5ayc.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vwhdahh:Zone.Identifier read attributes | delete

                Malware Analysis System Evasion

                barindex
                Source: vwhdahh, 00000006.00000002.437134759.00000000006EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 4360Thread sleep count: 623 > 30
                Source: C:\Windows\explorer.exe TID: 5140Thread sleep count: 388 > 30
                Source: C:\Windows\explorer.exe TID: 5140Thread sleep time: -38800s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4332Thread sleep count: 447 > 30
                Source: C:\Windows\explorer.exe TID: 4332Thread sleep time: -44700s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4508Thread sleep count: 580 > 30
                Source: C:\Windows\explorer.exe TID: 5044Thread sleep count: 339 > 30
                Source: C:\Windows\explorer.exe TID: 5044Thread sleep time: -33900s >= -30000s
                Source: C:\Windows\explorer.exe TID: 5852Thread sleep count: 286 > 30
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Users\user\AppData\Roaming\vwhdahhEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 623
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 388
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 447
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 580
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSystem information queried: ModuleInformation
                Source: explorer.exe, 00000002.00000000.356818409.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000002.00000000.383134992.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                Source: explorer.exe, 00000002.00000000.383134992.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.350913612.00000000043B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.383134992.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000002.00000000.356818409.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\vwhdahhSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00405424 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_004033AB LoadLibraryA,GetProcAddress,VirtualProtect,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008EC787 push dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00610042 push dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess queried: DebugPort
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00405424 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00404C9B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_004070BE SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00406D7C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00405424 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00404C9B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_004070BE SetUnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00406D7C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: vwhdahh.2.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\vwhdahhSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\vwhdahhSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\vwhdahhMemory written: C:\Users\user\AppData\Roaming\vwhdahh base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00610110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeThread created: C:\Windows\explorer.exe EIP: 2951930
                Source: C:\Users\user\AppData\Roaming\vwhdahhThread created: unknown EIP: 2981930
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exe
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahh
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.378638951.0000000005910000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.349348910.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager*r
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.349348910.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.349348910.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000002.00000000.348831070.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.367472459.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.317016427.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanLoc*U
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: GetLocaleInfoA,
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00407EE2 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.0.vwhdahh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.b8E3zd5AYc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.vwhdahh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.vwhdahh.6115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.0.vwhdahh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.b8E3zd5AYc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.vwhdahh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.vwhdahh.6115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Native API
                1
                DLL Side-Loading
                512
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Exploitation for Client Execution
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory421
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Hidden Files and Directories
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Software Packing
                Cached Domain Credentials14
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 715083 Sample: b8E3zd5AYc.exe Startdate: 03/10/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus detection for URL or domain 2->34 36 5 other signatures 2->36 7 b8E3zd5AYc.exe 2->7         started        9 vwhdahh 2->9         started        process3 signatures4 12 b8E3zd5AYc.exe 7->12         started        46 Multi AV Scanner detection for dropped file 9->46 48 Machine Learning detection for dropped file 9->48 50 Contains functionality to inject code into remote processes 9->50 52 Injects a PE file into a foreign processes 9->52 15 vwhdahh 9->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 176.124.192.17, 49697, 80 GULFSTREAMUA Russian Federation 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\vwhdahh, PE32 17->22 dropped 24 C:\Users\user\...\vwhdahh:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                b8E3zd5AYc.exe44%ReversingLabsWin32.Trojan.CrypterX
                b8E3zd5AYc.exe37%VirustotalBrowse
                b8E3zd5AYc.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\vwhdahh100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\vwhdahh44%ReversingLabsWin32.Trojan.CrypterX
                C:\Users\user\AppData\Roaming\vwhdahh37%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                6.0.vwhdahh.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.b8E3zd5AYc.exe.6e15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.b8E3zd5AYc.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.b8E3zd5AYc.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.2.b8E3zd5AYc.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.2.unpack100%AviraTR/Patched.GenDownload File
                6.0.vwhdahh.400000.3.unpack100%AviraTR/Patched.GenDownload File
                6.2.vwhdahh.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.b8E3zd5AYc.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.0.unpack100%AviraTR/Patched.GenDownload File
                5.2.vwhdahh.6115a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.1.unpack100%AviraTR/Patched.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com22%VirustotalBrowse
                host-host-file8.com22%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                176.124.192.17
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.349059881.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.367736313.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.317150379.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  176.124.192.17
                  host-file-host6.comRussian Federation
                  59652GULFSTREAMUAtrue
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:715083
                  Start date and time:2022-10-03 16:05:16 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:b8E3zd5AYc.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@6/2@4/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 85.4% (good quality ratio 81.1%)
                  • Quality average: 77.4%
                  • Quality standard deviation: 28.7%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  16:07:07Task SchedulerRun new task: Firefox Default Browser Agent 4E3843BFD359A85B path: C:\Users\user\AppData\Roaming\vwhdahh
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):147968
                  Entropy (8bit):7.0103245501974785
                  Encrypted:false
                  SSDEEP:3072:NVicgveaGAWt7HahxWSA0srMWbNFqID5yP5YO:NVOvaSA0srdNE8YP5Y
                  MD5:2072A0A726904AED8C39095F36EFD296
                  SHA1:29754DEA5A1FB0A2FF054279A3030D84579FAD15
                  SHA-256:9AE4D00A359AA5FACD231470B9A92B0542C6F8AFA6E981DCE7B171A08F635287
                  SHA-512:E431F61A4359854C1A69922331EDBDF98431114B2656FC63D0DECB266350F2417CD541511CA96901BF9DDAD38081B85A4F4D69ABF7C9543E4AE95359A596E7E2
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 44%
                  • Antivirus: Virustotal, Detection: 37%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}..............N1......N'................D....N ......N0......N5.....Rich............PE..L..../.`.............................K............@..................................X..........................................P........K..........................................................0,..@............................................text............................... ..`.data...|...........................@....rsrc....K.......L..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.0103245501974785
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:b8E3zd5AYc.exe
                  File size:147968
                  MD5:2072a0a726904aed8c39095f36efd296
                  SHA1:29754dea5a1fb0a2ff054279a3030d84579fad15
                  SHA256:9ae4d00a359aa5facd231470b9a92b0542c6f8afa6e981dce7b171a08f635287
                  SHA512:e431f61a4359854c1a69922331edbdf98431114b2656fc63d0decb266350f2417cd541511ca96901bf9ddad38081b85a4f4d69abf7c9543e4ae95359a596e7e2
                  SSDEEP:3072:NVicgveaGAWt7HahxWSA0srMWbNFqID5yP5YO:NVOvaSA0srdNE8YP5Y
                  TLSH:7DE3E02135B0C432C66386B01DA1D6D0BA7FF551ABB199773B6D076E0F216C1AE3A327
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}...............N1......N'.................D....N ......N0......N5.....Rich............PE..L..../.`...........................
                  Icon Hash:aedaae9ecea62aa2
                  Entrypoint:0x404bf7
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:TERMINAL_SERVER_AWARE
                  Time Stamp:0x609A2FBD [Tue May 11 07:18:21 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:2d5ec24fb9d2ee4cf8208f9e16125d4f
                  Instruction
                  call 00007F1EE89CEE0Bh
                  jmp 00007F1EE89CB99Dh
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  mov ecx, dword ptr [esp+04h]
                  test ecx, 00000003h
                  je 00007F1EE89CBB46h
                  mov al, byte ptr [ecx]
                  add ecx, 01h
                  test al, al
                  je 00007F1EE89CBB70h
                  test ecx, 00000003h
                  jne 00007F1EE89CBB11h
                  add eax, 00000000h
                  lea esp, dword ptr [esp+00000000h]
                  lea esp, dword ptr [esp+00000000h]
                  mov eax, dword ptr [ecx]
                  mov edx, 7EFEFEFFh
                  add edx, eax
                  xor eax, FFFFFFFFh
                  xor eax, edx
                  add ecx, 04h
                  test eax, 81010100h
                  je 00007F1EE89CBB0Ah
                  mov eax, dword ptr [ecx-04h]
                  test al, al
                  je 00007F1EE89CBB54h
                  test ah, ah
                  je 00007F1EE89CBB46h
                  test eax, 00FF0000h
                  je 00007F1EE89CBB35h
                  test eax, FF000000h
                  je 00007F1EE89CBB24h
                  jmp 00007F1EE89CBAEFh
                  lea eax, dword ptr [ecx-01h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-02h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-03h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-04h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  cmp ecx, dword ptr [0041FADCh]
                  jne 00007F1EE89CBB24h
                  rep ret
                  jmp 00007F1EE89CEDF3h
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  Programming Language:
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [C++] VS2008 build 21022
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe0fc0x50.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x17b0000x4bf8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x12100x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2c300x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xdbf60xdc00False0.48618607954545456data5.924373758356647IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0xf0000x16bd7c0x11600False0.8880114658273381data7.5838946029468435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x17b0000x4bf80x4c00False0.7270764802631579data6.372265355834209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x17b2b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                  RT_ICON0x17bb580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                  RT_ICON0x17e1000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                  RT_STRING0x17f3a80x42data
                  RT_STRING0x17f3f00x280data
                  RT_STRING0x17f6700x3cedata
                  RT_STRING0x17fa400x1b2data
                  RT_ACCELERATOR0x17f1d80x80data
                  RT_GROUP_ICON0x17f1a80x30data
                  RT_VERSION0x17f2680x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  None0x17f2580xadata
                  DLLImport
                  KERNEL32.dllLoadLibraryA, InterlockedPushEntrySList, GetConsoleAliasesW, ReadFile, ReadConsoleW, GetVolumeInformationA, GetComputerNameA, LocalFree, InterlockedDecrement, SetSystemTimeAdjustment, SetLocaleInfoA, FindNextVolumeA, FindCloseChangeNotification, CopyFileExA, MoveFileWithProgressW, VerifyVersionInfoW, LocalSize, FileTimeToDosDateTime, DebugBreak, GlobalGetAtomNameW, IsBadWritePtr, FindResourceA, GetComputerNameExW, GetProcAddress, GetStringTypeW, GetFileTime, GetConsoleAliasesLengthW, GetVolumeNameForVolumeMountPointA, DeleteVolumeMountPointA, GetCPInfo, PostQueuedCompletionStatus, MoveFileWithProgressA, CopyFileA, lstrcpynW, WriteConsoleW, GetBinaryTypeA, WriteConsoleOutputW, GetCommandLineA, InterlockedIncrement, CreateActCtxW, FormatMessageA, GetModuleHandleW, GetModuleHandleA, LeaveCriticalSection, GetStringTypeExA, OpenMutexW, FindResourceW, RtlCaptureContext, InterlockedExchange, InitializeCriticalSectionAndSpinCount, DeleteFiber, InterlockedExchangeAdd, EnumDateFormatsA, GetPrivateProfileStructA, GetNamedPipeHandleStateW, RegisterWaitForSingleObject, LocalAlloc, QueryMemoryResourceNotification, SetLastError, GetProcessPriorityBoost, GetMailslotInfo, HeapWalk, SetFilePointer, SetConsoleMode, RaiseException, RtlUnwind, GetLastError, MoveFileA, DeleteFileA, GetStartupInfoA, HeapAlloc, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, LCMapStringA, LCMapStringW
                  USER32.dllCharUpperBuffW
                  WINHTTP.dllWinHttpCreateUrl
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 3, 2022 16:07:07.615299940 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.673779011 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.674664021 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.674791098 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.680356026 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.734281063 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.739805937 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.747894049 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.748110056 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.749926090 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.809226036 CEST8049697176.124.192.17192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 3, 2022 16:07:07.582444906 CEST5689453192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:07.602804899 CEST53568948.8.8.8192.168.2.5
                  Oct 3, 2022 16:07:07.761130095 CEST5029553192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:08.825186014 CEST5029553192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:09.883174896 CEST5029553192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:11.788995981 CEST53502958.8.8.8192.168.2.5
                  Oct 3, 2022 16:07:12.853193045 CEST53502958.8.8.8192.168.2.5
                  Oct 3, 2022 16:07:13.909287930 CEST53502958.8.8.8192.168.2.5
                  TimestampSource IPDest IPChecksumCodeType
                  Oct 3, 2022 16:07:12.853375912 CEST192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                  Oct 3, 2022 16:07:13.909559011 CEST192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 3, 2022 16:07:07.582444906 CEST192.168.2.58.8.8.80x90b8Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:07.761130095 CEST192.168.2.58.8.8.80xeb27Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:08.825186014 CEST192.168.2.58.8.8.80xeb27Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:09.883174896 CEST192.168.2.58.8.8.80xeb27Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 3, 2022 16:07:07.602804899 CEST8.8.8.8192.168.2.50x90b8No error (0)host-file-host6.com176.124.192.17A (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:11.788995981 CEST8.8.8.8192.168.2.50xeb27Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:12.853193045 CEST8.8.8.8192.168.2.50xeb27Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:13.909287930 CEST8.8.8.8192.168.2.50xeb27Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  • turbbv.com
                    • host-file-host6.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.549697176.124.192.1780C:\Windows\explorer.exe
                  TimestampkBytes transferredDirectionData
                  Oct 3, 2022 16:07:07.674791098 CEST104OUTPOST / HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://turbbv.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 195
                  Host: host-file-host6.com
                  Oct 3, 2022 16:07:07.747894049 CEST105INHTTP/1.1 200 OK
                  Server: nginx/1.20.1
                  Date: Mon, 03 Oct 2022 14:07:07 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: close
                  Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: fYour IP blocked0


                  Click to jump to process

                  Target ID:0
                  Start time:16:06:10
                  Start date:03/10/2022
                  Path:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:16:06:13
                  Start date:03/10/2022
                  Path:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:2
                  Start time:16:06:19
                  Start date:03/10/2022
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff69bc80000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:high

                  Target ID:5
                  Start time:16:07:07
                  Start date:03/10/2022
                  Path:C:\Users\user\AppData\Roaming\vwhdahh
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\vwhdahh
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 44%, ReversingLabs
                  • Detection: 37%, Virustotal, Browse
                  Reputation:low

                  Target ID:6
                  Start time:16:07:10
                  Start date:03/10/2022
                  Path:C:\Users\user\AppData\Roaming\vwhdahh
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\vwhdahh
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  No disassembly