Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P2SMn3jloH.exe

Overview

General Information

Sample Name:P2SMn3jloH.exe
Analysis ID:736951
MD5:0779f7b34e9079944427b8260b49c205
SHA1:31f2cf1dc970fdfaf51b9aab2c9e0b9715fb53ec
SHA256:5c7ff5f2993bdb60d15a567dfaef41dcd30875d6629f2775acdb190e01dcef87
Tags:exeSnakeKeylogger
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Found evaded block containing many API calls
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • P2SMn3jloH.exe (PID: 4020 cmdline: C:\Users\user\Desktop\P2SMn3jloH.exe MD5: 0779F7B34E9079944427B8260B49C205)
    • P2SMn3jloH.exe (PID: 3420 cmdline: C:\Users\user\Desktop\P2SMn3jloH.exe MD5: 0779F7B34E9079944427B8260B49C205)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • utisvaa (PID: 1280 cmdline: C:\Users\user\AppData\Roaming\utisvaa MD5: 0779F7B34E9079944427B8260B49C205)
    • utisvaa (PID: 5332 cmdline: C:\Users\user\AppData\Roaming\utisvaa MD5: 0779F7B34E9079944427B8260B49C205)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x5218:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        1.2.P2SMn3jloH.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          13.0.utisvaa.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            13.0.utisvaa.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              13.0.utisvaa.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: P2SMn3jloH.exeReversingLabs: Detection: 46%
                Source: P2SMn3jloH.exeVirustotal: Detection: 34%Perma Link
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 17%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 16%Perma Link
                Source: C:\Users\user\AppData\Roaming\utisvaaReversingLabs: Detection: 46%
                Source: C:\Users\user\AppData\Roaming\utisvaaVirustotal: Detection: 34%Perma Link
                Source: P2SMn3jloH.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\utisvaaJoe Sandbox ML: detected
                Source: 13.0.utisvaa.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 13.0.utisvaa.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 13.0.utisvaa.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 13.0.utisvaa.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: P2SMn3jloH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb source: P2SMn3jloH.exe, utisvaa.2.dr
                Source: Binary string: (C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb@ source: P2SMn3jloH.exe, utisvaa.2.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: RISS-ASRU RISS-ASRU
                Source: Joe Sandbox ViewIP Address: 87.251.79.60 87.251.79.60
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dcihclar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: host-file-host6.com
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dcihclar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.P2SMn3jloH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.utisvaa.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.utisvaa.21a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.254069978.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: P2SMn3jloH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.254069978.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0041A8B0
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040E970
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00419918
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004139A7
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00414250
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00414A7C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00419220
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00418CDC
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0041B481
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0041465C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00413E7C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00418798
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: String function: 0040EF38 appears 38 times
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401834 Sleep,NtTerminateProcess,
                Source: P2SMn3jloH.exeStatic PE information: Resource name: RT_VERSION type: Intel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: utisvaa.2.drStatic PE information: Resource name: RT_VERSION type: Intel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: P2SMn3jloH.exeReversingLabs: Detection: 46%
                Source: P2SMn3jloH.exeVirustotal: Detection: 34%
                Source: P2SMn3jloH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exe
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaa
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaa
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exe
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaa
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utisvaaJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00405467 SetLastError,GetTickCount,LoadLibraryA,AreFileApisANSI,GetNamedPipeHandleStateW,InterlockedIncrement,EnterCriticalSection,GetConsoleAliasExesLengthW,EnumCalendarInfoW,InterlockedExchange,GetPrivateProfileStructA,EnterCriticalSection,InterlockedCompareExchange,EnumCalendarInfoA,LocalUnlock,CancelDeviceWakeupRequest,GetComputerNameW,EnterCriticalSection,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,InterlockedIncrement,GetCharWidthA,SetThreadToken,MoveFileWithProgressA,FindNextVolumeA,GetModuleHandleA,CreateActCtxW,VerifyVersionInfoA,InterlockedDecrement,InterlockedIncrement,MoveFileWithProgressA,WriteConsoleW,GlobalFindAtomW,LoadLibraryW,MoveFileWithProgressA,SetProcessAffinityMask,GetACP,DefineDosDeviceW,GetDiskFreeSpaceExW,InterlockedExchange,GetPrivateProfileStructW,LockFile,_lread,ReadConsoleInputW,GetPrivateProfileIntA,OpenJobObjectW,GetTapeParameters,GetMailslotInfo,CopyFileW,GetSystemWindowsDirectoryA,OpenFileMappingA,GetConsoleAliasesLengthA,SetFileTime,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00405224 CallNamedPipeA,GetThreadPriority,SearchPathA,OpenEventA,FindResourceW,GetVersionExA,SetWaitableTimer,CopyFileW,WriteConsoleInputA,SizeofResource,GlobalDeleteAtom,lstrlenW,GetModuleHandleA,GetWindowsDirectoryA,MapViewOfFileEx,GlobalGetAtomNameA,DebugBreak,LocalUnlock,VerifyVersionInfoW,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCommand line argument: PpA
                Source: P2SMn3jloH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb source: P2SMn3jloH.exe, utisvaa.2.dr
                Source: Binary string: (C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb@ source: P2SMn3jloH.exe, utisvaa.2.dr
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004088F4 push eax; ret
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040A483 push ecx; ret
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040EF7D push ecx; ret
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B1970 push ebx; iretd
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B1977 push ebx; iretd
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B198B push ebx; iretd
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_004011D0 push ebx; iretd
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_004011D7 push ebx; iretd
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_004011EB push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A198B push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A1970 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A1977 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_004011D0 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_004011D7 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_004011EB push ebx; iretd
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00417194 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utisvaaJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utisvaaJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\p2smn3jloh.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\utisvaa:Zone.Identifier read attributes | delete

                Malware Analysis System Evasion

                barindex
                Source: utisvaa, 0000000D.00000002.408489516.00000000001FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 2436Thread sleep count: 627 > 30
                Source: C:\Windows\explorer.exe TID: 1172Thread sleep count: 340 > 30
                Source: C:\Windows\explorer.exe TID: 1172Thread sleep time: -34000s >= -30000s
                Source: C:\Windows\explorer.exe TID: 2680Thread sleep count: 355 > 30
                Source: C:\Windows\explorer.exe TID: 2680Thread sleep time: -35500s >= -30000s
                Source: C:\Windows\explorer.exe TID: 2136Thread sleep count: 511 > 30
                Source: C:\Windows\explorer.exe TID: 5176Thread sleep count: 217 > 30
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 627
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 355
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 511
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeEvaded block: after key decision
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSystem information queried: ModuleInformation
                Source: explorer.exe, 00000002.00000000.313587656.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z,
                Source: explorer.exe, 00000002.00000000.313587656.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000002.00000000.343231821.0000000007166000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
                Source: explorer.exe, 00000002.00000000.313587656.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i,
                Source: explorer.exe, 00000002.00000000.312903359.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG
                Source: explorer.exe, 00000002.00000000.266848734.0000000005063000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9'
                Source: explorer.exe, 00000002.00000000.312903359.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\utisvaaSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00408A87 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00417194 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B0042 push dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A0042 push dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess queried: DebugPort
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00407933 _abort,__NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00408A87 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040A40B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00410E4E SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00408F5F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: utisvaa.2.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\utisvaaSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\utisvaaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeMemory written: C:\Users\user\Desktop\P2SMn3jloH.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Roaming\utisvaaMemory written: C:\Users\user\AppData\Roaming\utisvaa base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeThread created: C:\Windows\explorer.exe EIP: 57B1930
                Source: C:\Users\user\AppData\Roaming\utisvaaThread created: unknown EIP: 5851930
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exe
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaa
                Source: explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.303168822.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.265409063.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerT7<=ge
                Source: explorer.exe, 00000002.00000000.348886201.00000000090D8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.270117022.0000000006770000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.303168822.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.265409063.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000002.00000000.265126182.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.302408124.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.333974747.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CProgmanile
                Source: explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.303168822.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.265409063.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00411388 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00405224 CallNamedPipeA,GetThreadPriority,SearchPathA,OpenEventA,FindResourceW,GetVersionExA,SetWaitableTimer,CopyFileW,WriteConsoleInputA,SizeofResource,GlobalDeleteAtom,lstrlenW,GetModuleHandleA,GetWindowsDirectoryA,MapViewOfFileEx,GlobalGetAtomNameA,DebugBreak,LocalUnlock,VerifyVersionInfoW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.P2SMn3jloH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.utisvaa.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.utisvaa.21a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.P2SMn3jloH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.utisvaa.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.utisvaa.21a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                512
                Process Injection
                11
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts3
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory421
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)512
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Deobfuscate/Decode Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials16
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                File Deletion
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 736951 Sample: P2SMn3jloH.exe Startdate: 03/11/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus detection for URL or domain 2->34 36 5 other signatures 2->36 7 P2SMn3jloH.exe 2->7         started        10 utisvaa 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 P2SMn3jloH.exe 7->12         started        50 Multi AV Scanner detection for dropped file 10->50 52 Machine Learning detection for dropped file 10->52 15 utisvaa 10->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 87.251.79.60, 49699, 80 RISS-ASRU Russian Federation 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\utisvaa, PE32 17->22 dropped 24 C:\Users\user\...\utisvaa:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                P2SMn3jloH.exe46%ReversingLabsWin32.Trojan.Generic
                P2SMn3jloH.exe35%VirustotalBrowse
                P2SMn3jloH.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\utisvaa100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\utisvaa46%ReversingLabsWin32.Trojan.Generic
                C:\Users\user\AppData\Roaming\utisvaa35%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                13.0.utisvaa.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.2.P2SMn3jloH.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                12.2.utisvaa.21a15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.P2SMn3jloH.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.P2SMn3jloH.exe.21b15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.P2SMn3jloH.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.P2SMn3jloH.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.2.utisvaa.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com18%VirustotalBrowse
                host-host-file8.com17%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                87.251.79.60
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                87.251.79.60
                host-file-host6.comRussian Federation
                20803RISS-ASRUtrue
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:736951
                Start date and time:2022-11-03 12:24:08 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 44s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:P2SMn3jloH.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@6/2@4/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 93.8% (good quality ratio 87.2%)
                • Quality average: 75.4%
                • Quality standard deviation: 30.8%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                12:26:08Task SchedulerRun new task: Firefox Default Browser Agent 18B1406226926BB9 path: C:\Users\user\AppData\Roaming\utisvaa
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\explorer.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):215552
                Entropy (8bit):6.969285988131741
                Encrypted:false
                SSDEEP:3072:zmRA4EwqbftQPtRLlTsLxmE6pf5ADM8VGQqf/r4nnFxtHglCFBQx:zmyHbFeRRILgEFI8sfTuxtHMOq
                MD5:0779F7B34E9079944427B8260B49C205
                SHA1:31F2CF1DC970FDFAF51B9AAB2C9E0B9715FB53EC
                SHA-256:5C7FF5F2993BDB60D15A567DFAEF41DCD30875D6629F2775ACDB190E01DCEF87
                SHA-512:E22E6186F82A3EB329874C246A9D64CC45EDE3A6EE93447DCDC3E93CB0C52A40B9CFB36E0350E1CDC1487D47BB94D3478B49376C2DE5C64A82DA545C2C976B3E
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 46%
                • Antivirus: Virustotal, Detection: 35%, Browse
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.^.".^.".^.".@...C.".@.....".y.Y.Y.".^.#...".@...l.".@..._.".@..._.".Rich^.".........PE..L...#H.a..................... ....................@..................................D..........................................P........C..........................................................HC..@............... ............................text...J........................... ..`.data..............................@....rsrc....C.......D..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\explorer.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Reputation:high, very likely benign file
                Preview:[ZoneTransfer]....ZoneId=0
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.969285988131741
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.83%
                • Windows Screen Saver (13104/52) 0.13%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:P2SMn3jloH.exe
                File size:215552
                MD5:0779f7b34e9079944427b8260b49c205
                SHA1:31f2cf1dc970fdfaf51b9aab2c9e0b9715fb53ec
                SHA256:5c7ff5f2993bdb60d15a567dfaef41dcd30875d6629f2775acdb190e01dcef87
                SHA512:e22e6186f82a3eb329874c246a9d64cc45ede3a6ee93447dcdc3e93cb0c52a40b9cfb36e0350e1cdc1487d47bb94d3478b49376c2de5c64a82da545c2c976b3e
                SSDEEP:3072:zmRA4EwqbftQPtRLlTsLxmE6pf5ADM8VGQqf/r4nnFxtHglCFBQx:zmyHbFeRRILgEFI8sfTuxtHMOq
                TLSH:D424CF233AD0C073E27E92758815D7B55A7BB87405365A8B3BE8567C8F313D2AE2434B
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.^.".^.".^.".@...C.".@.....".y.Y.Y.".^.#...".@...l.".@..._.".@..._.".Rich^.".........PE..L...#H.a..................... .....
                Icon Hash:aaf8c8eaa2e4a0c1
                Entrypoint:0x4094f6
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:TERMINAL_SERVER_AWARE
                Time Stamp:0x61884823 [Sun Nov 7 21:41:55 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:0
                File Version Major:5
                File Version Minor:0
                Subsystem Version Major:5
                Subsystem Version Minor:0
                Import Hash:8fb85d04360d27123c3a8e1c2ffb7f7e
                Instruction
                call 00007F1E44C53682h
                jmp 00007F1E44C4B66Eh
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                test eax, eax
                je 00007F1E44C4B804h
                sub eax, 08h
                cmp dword ptr [eax], 0000DDDDh
                jne 00007F1E44C4B7F9h
                push eax
                call 00007F1E44C4ACC2h
                pop ecx
                pop ebp
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                push esi
                mov esi, ecx
                mov byte ptr [esi+0Ch], 00000000h
                test eax, eax
                jne 00007F1E44C4B855h
                call 00007F1E44C50160h
                mov dword ptr [esi+08h], eax
                mov ecx, dword ptr [eax+6Ch]
                mov dword ptr [esi], ecx
                mov ecx, dword ptr [eax+68h]
                mov dword ptr [esi+04h], ecx
                mov ecx, dword ptr [esi]
                cmp ecx, dword ptr [004312D8h]
                je 00007F1E44C4B804h
                mov ecx, dword ptr [004311F0h]
                test dword ptr [eax+70h], ecx
                jne 00007F1E44C4B7F9h
                call 00007F1E44C4CA01h
                mov dword ptr [esi], eax
                mov eax, dword ptr [esi+04h]
                cmp eax, dword ptr [004310F8h]
                je 00007F1E44C4B808h
                mov eax, dword ptr [esi+08h]
                mov ecx, dword ptr [004311F0h]
                test dword ptr [eax+70h], ecx
                jne 00007F1E44C4B7FAh
                call 00007F1E44C538B9h
                mov dword ptr [esi+04h], eax
                mov eax, dword ptr [esi+08h]
                test byte ptr [eax+70h], 00000002h
                jne 00007F1E44C4B806h
                or dword ptr [eax+70h], 02h
                mov byte ptr [esi+0Ch], 00000001h
                jmp 00007F1E44C4B7FCh
                mov ecx, dword ptr [eax]
                mov dword ptr [esi], ecx
                mov eax, dword ptr [eax+04h]
                mov dword ptr [esi+04h], eax
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                mov edi, edi
                push ebp
                mov ebp, esp
                sub esp, 14h
                mov eax, dword ptr [004307FCh]
                xor eax, ebp
                mov dword ptr [ebp-04h], eax
                push ebx
                push esi
                xor ebx, ebx
                Programming Language:
                • [ASM] VS2008 build 21022
                • [ C ] VS2008 build 21022
                • [IMP] VS2005 build 50727
                • [C++] VS2008 build 21022
                • [RES] VS2008 build 21022
                • [LNK] VS2008 build 21022
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7e40x50.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x18b0000x4310.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x12800x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43480x40.text
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x220.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x1e44a0x1e600False0.5128600823045267data6.400320083175456IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x200000x16ade40x11c00False0.8920417033450704data7.6284485167398906IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x18b0000x43100x4400False0.6488970588235294data6.048423243299262IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RIWEZOZAC0x18e7000x55fASCII text, with very long lines (1375), with no line terminatorsRomanianRomania
                RT_ICON0x18b3300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania
                RT_ICON0x18bbd80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania
                RT_ICON0x18c2a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania
                RT_ICON0x18c8080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania
                RT_ICON0x18d8b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania
                RT_ICON0x18e2380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania
                RT_STRING0x18ee080xb6dataRomanianRomania
                RT_STRING0x18eec00x2aedataRomanianRomania
                RT_STRING0x18f1700x19cdataRomanianRomania
                RT_ACCELERATOR0x18ec600x58dataRomanianRomania
                RT_GROUP_ICON0x18e6a00x5adataRomanianRomania
                RT_VERSION0x18ecb80x14cIntel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                DLLImport
                KERNEL32.dllLocalSize, InterlockedExchange, GetTickCount, CopyFileExA, GetConsoleAliasExesLengthW, EnumSystemCodePagesA, TlsGetValue, MoveFileWithProgressA, VerifyVersionInfoW, LocalUnlock, DebugBreak, GlobalGetAtomNameA, MapViewOfFileEx, GetWindowsDirectoryA, GetModuleHandleA, lstrlenW, GlobalDeleteAtom, SizeofResource, WriteConsoleInputA, CopyFileW, SetWaitableTimer, GetVersionExA, FindResourceW, OpenEventA, SearchPathA, GetThreadPriority, CallNamedPipeA, GetProcAddress, GlobalAlloc, SetFileTime, GetConsoleAliasesLengthA, GetComputerNameA, GetSystemWindowsDirectoryA, GetMailslotInfo, GetTapeParameters, OpenJobObjectW, GetPrivateProfileIntA, ReadConsoleInputW, _lread, LockFile, GetPrivateProfileStructW, GetDiskFreeSpaceExW, DefineDosDeviceW, GetACP, SetProcessAffinityMask, GlobalFindAtomW, InterlockedDecrement, VerifyVersionInfoA, CreateActCtxW, FindNextVolumeA, GetComputerNameW, CancelDeviceWakeupRequest, EnumCalendarInfoA, InterlockedCompareExchange, GetPrivateProfileStructA, EnumCalendarInfoW, EnterCriticalSection, InterlockedIncrement, GetNamedPipeHandleStateW, AreFileApisANSI, LoadLibraryA, SetLastError, WriteConsoleW, GetVolumeInformationA, OpenFileMappingA, LoadLibraryW, Sleep, InitializeCriticalSection, DeleteCriticalSection, LeaveCriticalSection, RtlUnwind, RaiseException, GetLastError, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetStartupInfoW, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetCPInfo, GetModuleHandleW, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapCreate, VirtualFree, VirtualAlloc, HeapSize, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, GetStartupInfoA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, InitializeCriticalSectionAndSpinCount, SetFilePointer, GetConsoleCP, GetConsoleMode, GetLocaleInfoW, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CloseHandle, CreateFileA
                GDI32.dllGetCharWidthA
                ADVAPI32.dllSetThreadToken
                Language of compilation systemCountry where language is spokenMap
                RomanianRomania
                TimestampSource PortDest PortSource IPDest IP
                Nov 3, 2022 12:26:08.621563911 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.715183020 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:08.715354919 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.715487957 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.715517044 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.810715914 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.114351034 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.205801010 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.238164902 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.240447044 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.551862001 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.559798956 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.559859037 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.727560043 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.727715015 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:10.161276102 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:10.251888990 CET804969987.251.79.60192.168.2.3
                TimestampSource PortDest PortSource IPDest IP
                Nov 3, 2022 12:26:08.155019999 CET4997753192.168.2.38.8.8.8
                Nov 3, 2022 12:26:08.616261959 CET53499778.8.8.8192.168.2.3
                Nov 3, 2022 12:26:09.253171921 CET5784053192.168.2.38.8.8.8
                Nov 3, 2022 12:26:10.239569902 CET5784053192.168.2.38.8.8.8
                Nov 3, 2022 12:26:11.279532909 CET5784053192.168.2.38.8.8.8
                Nov 3, 2022 12:26:13.280474901 CET53578408.8.8.8192.168.2.3
                Nov 3, 2022 12:26:14.267415047 CET53578408.8.8.8192.168.2.3
                Nov 3, 2022 12:26:16.298055887 CET53578408.8.8.8192.168.2.3
                TimestampSource IPDest IPChecksumCodeType
                Nov 3, 2022 12:26:14.267613888 CET192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                Nov 3, 2022 12:26:16.298300982 CET192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 3, 2022 12:26:08.155019999 CET192.168.2.38.8.8.80x2a3bStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:09.253171921 CET192.168.2.38.8.8.80x6e7eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:10.239569902 CET192.168.2.38.8.8.80x6e7eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:11.279532909 CET192.168.2.38.8.8.80x6e7eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 3, 2022 12:26:08.616261959 CET8.8.8.8192.168.2.30x2a3bNo error (0)host-file-host6.com87.251.79.60A (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:13.280474901 CET8.8.8.8192.168.2.30x6e7eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:14.267415047 CET8.8.8.8192.168.2.30x6e7eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:16.298055887 CET8.8.8.8192.168.2.30x6e7eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                • dcihclar.com
                  • host-file-host6.com

                Click to jump to process

                Target ID:0
                Start time:12:25:04
                Start date:03/11/2022
                Path:C:\Users\user\Desktop\P2SMn3jloH.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\P2SMn3jloH.exe
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.254069978.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:1
                Start time:12:25:05
                Start date:03/11/2022
                Path:C:\Users\user\Desktop\P2SMn3jloH.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\P2SMn3jloH.exe
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:2
                Start time:12:25:11
                Start date:03/11/2022
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Explorer.EXE
                Imagebase:0x7ff69fe90000
                File size:3933184 bytes
                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                Reputation:high

                Target ID:12
                Start time:12:26:08
                Start date:03/11/2022
                Path:C:\Users\user\AppData\Roaming\utisvaa
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\utisvaa
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 46%, ReversingLabs
                • Detection: 35%, Virustotal, Browse
                Reputation:low

                Target ID:13
                Start time:12:26:11
                Start date:03/11/2022
                Path:C:\Users\user\AppData\Roaming\utisvaa
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\utisvaa
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                No disassembly