Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ts.exe_

Overview

General Information

Sample Name:ts.exe_ (renamed file extension from exe_ to exe)
Analysis ID:745562
MD5:ad57d446c107b5abd83b6180456cd0dd
SHA1:8e277fb9bc97bedc7f7f4ba4390cc36702d87b7c
SHA256:58d9d7c2d4a4140bbdc16c9b6ab1b56244ebc8b1c3eaa1fc63386bbce7acdb4c
Infos:

Detection

Emotet
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Emotet
Malicious sample detected (through community Yara rule)
Antivirus detection for dropped file
Machine Learning detection for sample
PE file does not import any functions
Yara signature match
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Uses Microsoft's Enhanced Cryptographic Provider
Contains long sleeps (>= 3 min)

Classification

  • System is w10x64
  • ts.exe (PID: 3664 cmdline: C:\Users\user\Desktop\ts.exe MD5: AD57D446C107B5ABD83B6180456CD0DD)
    • conhost.exe (PID: 4724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ts.exeJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    ts.exeWindows_Trojan_Emotet_db7d33faunknownunknown
    • 0xa7cfe:$chunk_0: 4C 8D 9C 24 B0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
    • 0xaa853:$chunk_0: 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
    • 0xab94f:$chunk_0: 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
    • 0xb218d:$chunk_0: 4C 8D 9C 24 A0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
    • 0xa6601:$chunk_1: 8B C7 41 0F B7 4C 45 00 41 8B 1C 8C 48 03 DD 48 3B DE 72 1B
    • 0xb1a8c:$chunk_2: 48 8B C4 48 89 48 08 48 89 50 10 4C 89 40 18 4C 89 48 20 C3
    • 0xaa841:$chunk_3: 48 8B 45 27 BB 01 00 00 00 48 89 07 8B 45 2F 89 47 08 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
    • 0xab93d:$chunk_3: 48 8B 45 3F BB 01 00 00 00 48 89 07 8B 45 47 89 47 08 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
    • 0xab3a7:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
    • 0xb3d19:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
    • 0xa6272:$chunk_5: BE 02 00 00 00 4C 8D 9C 24 D0 01 00 00 8B C6 49 8B 5B 30 49 8B 73 38 49 8B 7B 40 49 8B E3 41 5F 41 5E 41 5D 41 5C 5D C3
    • 0xa6615:$chunk_6: 43 8B 84 FE 8C 00 00 00 48 03 C6 48 3B D8 73 0B
    • 0xa3097:$chunk_7: 88 02 48 FF C2 48 FF C3 8A 03 84 C0 75 EE EB 03
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\62366813.dllJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      C:\Users\user\Desktop\62366813.dllWindows_Trojan_Emotet_db7d33faunknownunknown
      • 0x92ea:$chunk_0: 4C 8D 9C 24 B0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
      • 0xbe3f:$chunk_0: 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
      • 0xcf3b:$chunk_0: 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
      • 0x13779:$chunk_0: 4C 8D 9C 24 A0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
      • 0x7bed:$chunk_1: 8B C7 41 0F B7 4C 45 00 41 8B 1C 8C 48 03 DD 48 3B DE 72 1B
      • 0x13078:$chunk_2: 48 8B C4 48 89 48 08 48 89 50 10 4C 89 40 18 4C 89 48 20 C3
      • 0xbe2d:$chunk_3: 48 8B 45 27 BB 01 00 00 00 48 89 07 8B 45 2F 89 47 08 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
      • 0xcf29:$chunk_3: 48 8B 45 3F BB 01 00 00 00 48 89 07 8B 45 47 89 47 08 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
      • 0xc993:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
      • 0x15305:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
      • 0x785e:$chunk_5: BE 02 00 00 00 4C 8D 9C 24 D0 01 00 00 8B C6 49 8B 5B 30 49 8B 73 38 49 8B 7B 40 49 8B E3 41 5F 41 5E 41 5D 41 5C 5D C3
      • 0x7c01:$chunk_6: 43 8B 84 FE 8C 00 00 00 48 03 C6 48 3B D8 73 0B
      • 0x4683:$chunk_7: 88 02 48 FF C2 48 FF C3 8A 03 84 C0 75 EE EB 03
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmpWindows_Trojan_Emotet_db7d33faunknownunknown
        • 0x8eea:$chunk_0: 4C 8D 9C 24 B0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
        • 0xba3f:$chunk_0: 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
        • 0xcb3b:$chunk_0: 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
        • 0x13379:$chunk_0: 4C 8D 9C 24 A0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
        • 0x77ed:$chunk_1: 8B C7 41 0F B7 4C 45 00 41 8B 1C 8C 48 03 DD 48 3B DE 72 1B
        • 0x12c78:$chunk_2: 48 8B C4 48 89 48 08 48 89 50 10 4C 89 40 18 4C 89 48 20 C3
        • 0xba2d:$chunk_3: 48 8B 45 27 BB 01 00 00 00 48 89 07 8B 45 2F 89 47 08 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
        • 0xcb29:$chunk_3: 48 8B 45 3F BB 01 00 00 00 48 89 07 8B 45 47 89 47 08 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
        • 0xc593:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
        • 0x14f05:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
        • 0x745e:$chunk_5: BE 02 00 00 00 4C 8D 9C 24 D0 01 00 00 8B C6 49 8B 5B 30 49 8B 73 38 49 8B 7B 40 49 8B E3 41 5F 41 5E 41 5D 41 5C 5D C3
        • 0x7801:$chunk_6: 43 8B 84 FE 8C 00 00 00 48 03 C6 48 3B D8 73 0B
        • 0x4283:$chunk_7: 88 02 48 FF C2 48 FF C3 8A 03 84 C0 75 EE EB 03
        00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Emotet_db7d33faunknownunknown
          • 0x92ea:$chunk_0: 4C 8D 9C 24 B0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
          • 0xbe3f:$chunk_0: 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
          • 0xcf3b:$chunk_0: 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
          • 0x13779:$chunk_0: 4C 8D 9C 24 A0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
          • 0x7bed:$chunk_1: 8B C7 41 0F B7 4C 45 00 41 8B 1C 8C 48 03 DD 48 3B DE 72 1B
          • 0x13078:$chunk_2: 48 8B C4 48 89 48 08 48 89 50 10 4C 89 40 18 4C 89 48 20 C3
          • 0xbe2d:$chunk_3: 48 8B 45 27 BB 01 00 00 00 48 89 07 8B 45 2F 89 47 08 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
          • 0xcf29:$chunk_3: 48 8B 45 3F BB 01 00 00 00 48 89 07 8B 45 47 89 47 08 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
          • 0xc993:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
          • 0x15305:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
          • 0x785e:$chunk_5: BE 02 00 00 00 4C 8D 9C 24 D0 01 00 00 8B C6 49 8B 5B 30 49 8B 73 38 49 8B 7B 40 49 8B E3 41 5F 41 5E 41 5D 41 5C 5D C3
          • 0x7c01:$chunk_6: 43 8B 84 FE 8C 00 00 00 48 03 C6 48 3B D8 73 0B
          • 0x4683:$chunk_7: 88 02 48 FF C2 48 FF C3 8A 03 84 C0 75 EE EB 03
          00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.3.ts.exe.228231c0000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              0.3.ts.exe.228231c0000.3.unpackWindows_Trojan_Emotet_db7d33faunknownunknown
              • 0x86ea:$chunk_0: 4C 8D 9C 24 B0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
              • 0xb23f:$chunk_0: 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
              • 0xc33b:$chunk_0: 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
              • 0x12b79:$chunk_0: 4C 8D 9C 24 A0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
              • 0x6fed:$chunk_1: 8B C7 41 0F B7 4C 45 00 41 8B 1C 8C 48 03 DD 48 3B DE 72 1B
              • 0x12478:$chunk_2: 48 8B C4 48 89 48 08 48 89 50 10 4C 89 40 18 4C 89 48 20 C3
              • 0xb22d:$chunk_3: 48 8B 45 27 BB 01 00 00 00 48 89 07 8B 45 2F 89 47 08 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
              • 0xc329:$chunk_3: 48 8B 45 3F BB 01 00 00 00 48 89 07 8B 45 47 89 47 08 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
              • 0xbd93:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
              • 0x14705:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
              • 0x6c5e:$chunk_5: BE 02 00 00 00 4C 8D 9C 24 D0 01 00 00 8B C6 49 8B 5B 30 49 8B 73 38 49 8B 7B 40 49 8B E3 41 5F 41 5E 41 5D 41 5C 5D C3
              • 0x7001:$chunk_6: 43 8B 84 FE 8C 00 00 00 48 03 C6 48 3B D8 73 0B
              • 0x3a83:$chunk_7: 88 02 48 FF C2 48 FF C3 8A 03 84 C0 75 EE EB 03
              0.3.ts.exe.228233eea14.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                0.3.ts.exe.228233eea14.0.unpackWindows_Trojan_Emotet_db7d33faunknownunknown
                • 0x86ea:$chunk_0: 4C 8D 9C 24 B0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
                • 0xb23f:$chunk_0: 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
                • 0xc33b:$chunk_0: 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
                • 0x12b79:$chunk_0: 4C 8D 9C 24 A0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
                • 0x6fed:$chunk_1: 8B C7 41 0F B7 4C 45 00 41 8B 1C 8C 48 03 DD 48 3B DE 72 1B
                • 0x12478:$chunk_2: 48 8B C4 48 89 48 08 48 89 50 10 4C 89 40 18 4C 89 48 20 C3
                • 0xb22d:$chunk_3: 48 8B 45 27 BB 01 00 00 00 48 89 07 8B 45 2F 89 47 08 4C 8D 9C 24 00 01 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
                • 0xc329:$chunk_3: 48 8B 45 3F BB 01 00 00 00 48 89 07 8B 45 47 89 47 08 4C 8D 9C 24 C0 00 00 00 8B C3 49 8B 5B 10 49 8B 73 18 49 8B 7B 20 49 8B E3 5D C3
                • 0xbd93:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
                • 0x14705:$chunk_4: 48 39 3B 4C 8D 9C 24 90 00 00 00 49 8B 5B 10 49 8B 73 20 40 0F 95 C7 8B C7 49 8B 7B 28 49 8B E3 5D C3
                • 0x6c5e:$chunk_5: BE 02 00 00 00 4C 8D 9C 24 D0 01 00 00 8B C6 49 8B 5B 30 49 8B 73 38 49 8B 7B 40 49 8B E3 41 5F 41 5E 41 5D 41 5C 5D C3
                • 0x7001:$chunk_6: 43 8B 84 FE 8C 00 00 00 48 03 C6 48 3B D8 73 0B
                • 0x3a83:$chunk_7: 88 02 48 FF C2 48 FF C3 8A 03 84 C0 75 EE EB 03
                0.3.ts.exe.228231c0000.3.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: ts.exeAvira: detected
                  Source: C:\Users\user\Desktop\62366813.dllAvira: detection malicious, Label: HEUR/AGEN.1251140
                  Source: ts.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58828F0 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,
                  Source: ts.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDF51C FindFirstFileW,

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: ts.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.3.ts.exe.228231c0000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228233eea14.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228231c0000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ts.exe.7ffa0aed0000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228233ca850.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228233eea14.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.22823350000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\Desktop\62366813.dll, type: DROPPED

                  System Summary

                  barindex
                  Source: ts.exe, type: SAMPLEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.3.ts.exe.228231c0000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.3.ts.exe.228233eea14.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.3.ts.exe.228231c0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.2.ts.exe.7ffa0aed0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.3.ts.exe.228233ca850.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.3.ts.exe.228233eea14.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 0.3.ts.exe.22823350000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: C:\Users\user\Desktop\62366813.dll, type: DROPPEDMatched rule: Windows_Trojan_Emotet_db7d33fa Author: unknown
                  Source: 62366813.dll.0.drStatic PE information: No import functions for PE file found
                  Source: ts.exe, type: SAMPLEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.3.ts.exe.228231c0000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.3.ts.exe.228233eea14.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.3.ts.exe.228231c0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.2.ts.exe.7ffa0aed0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.3.ts.exe.228233ca850.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.3.ts.exe.228233eea14.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 0.3.ts.exe.22823350000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: 00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: C:\Users\user\Desktop\62366813.dll, type: DROPPEDMatched rule: Windows_Trojan_Emotet_db7d33fa reference_sample = 08c23400ff546db41f9ddbbb19fa75519826744dde3b3afb38f3985266577afc, os = windows, severity = x86, creation_date = 2022-05-09, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = eac196154ab1ad636654c966e860dcd5763c50d7b8221dbbc7769c879daf02fd, id = db7d33fa-e50c-4c59-ab92-edb74aac87c9, last_modified = 2022-06-09
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58A46E8
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5883DF0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58C6D94
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5890B06
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58A3A40
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58DAEB0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588EEF4
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BD668
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BC5A0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BCDD0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588DDE8
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58CE614
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5897D18
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58C053C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58CFD5C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58C6830
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5890024
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58CC854
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58D8848
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588D7CC
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5885FC0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BF7F4
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BC788
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5882F80
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58CE164
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BD160
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58CEC94
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BC3B8
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5894400
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED61F4
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE5F68
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED3750
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDF51C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED3518
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED66AC
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED765C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE5B54
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED7AF0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE4AE4
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDC480
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE443C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED6428
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED8BDC
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE03D8
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE1960
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE415C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDB134
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED1924
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED7908
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDF28C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED525C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDCA5C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE5A40
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDE234
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDD1E8
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED49E4
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED89D0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED17A0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDBF78
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDD710
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDE090
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE3858
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE3050
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDF028
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED9FD0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDDDA0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDCD9C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED9D68
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED6548
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE0D2C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED250C
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED5D08
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDB4F0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE1E88
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED5668
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED8648
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AED4604
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE45F0
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEE05C4
                  Source: C:\Users\user\Desktop\ts.exeFile read: C:\Users\user\Desktop\ts.exeJump to behavior
                  Source: ts.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\ts.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\ts.exe C:\Users\user\Desktop\ts.exe
                  Source: C:\Users\user\Desktop\ts.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4724:120:WilError_01
                  Source: C:\Users\user\Desktop\ts.exeFile created: C:\Users\user\Desktop\62366813.dllJump to behavior
                  Source: C:\Users\user\Desktop\ts.exeFile created: C:\Users\user\AppData\Local\Temp\1B9F.tmpJump to behavior
                  Source: classification engineClassification label: mal76.troj.winEXE@2/3@0/0
                  Source: ts.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: ts.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: ts.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: ts.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: ts.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: ts.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: ts.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: ts.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A589ACC4 pushfq ; ret
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A589AD06 push rbp; iretd
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A5899B8E push rbp; iretd
                  Source: ts.exeStatic PE information: section name: _RDATA
                  Source: 06B049A8.dll.0.drStatic PE information: section name: _RDATA
                  Source: C:\Users\user\Desktop\ts.exeFile created: C:\Users\user\Desktop\62366813.dllJump to dropped file
                  Source: C:\Users\user\Desktop\ts.exeFile created: C:\Users\user\Desktop\06B049A8.dllJump to dropped file
                  Source: C:\Users\user\Desktop\ts.exe TID: 5720Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\ts.exeDropped PE file which has not been started: C:\Users\user\Desktop\06B049A8.dllJump to dropped file
                  Source: C:\Users\user\Desktop\ts.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FFA0AEDF51C FindFirstFileW,
                  Source: C:\Users\user\Desktop\ts.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588B568 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588B110 SetUnhandledExceptionFilter,_invalid_parameter_noinfo,
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588B710 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588B568 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588B2BC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A58BE50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\ts.exeCode function: GetLocaleInfoEx,
                  Source: C:\Users\user\Desktop\ts.exeCode function: EnumSystemLocalesW,
                  Source: C:\Users\user\Desktop\ts.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                  Source: C:\Users\user\Desktop\ts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                  Source: C:\Users\user\Desktop\ts.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                  Source: C:\Users\user\Desktop\ts.exeCode function: EnumSystemLocalesW,
                  Source: C:\Users\user\Desktop\ts.exeCode function: EnumSystemLocalesW,
                  Source: C:\Users\user\Desktop\ts.exeCode function: GetLocaleInfoW,
                  Source: C:\Users\user\Desktop\ts.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Users\user\Desktop\ts.exeCode function: 0_2_00007FF7A588B978 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: ts.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.3.ts.exe.228231c0000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228233eea14.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228231c0000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ts.exe.7ffa0aed0000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228233ca850.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.228233eea14.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.ts.exe.22823350000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\Desktop\62366813.dll, type: DROPPED
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath Interception1
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium2
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Obfuscated Files or Information
                  NTDS1
                  File and Directory Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
                  System Information Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  ts.exe100%AviraHEUR/AGEN.1213146
                  ts.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\Desktop\62366813.dll100%AviraHEUR/AGEN.1251140
                  SourceDetectionScannerLabelLinkDownload
                  0.3.ts.exe.228231c0000.3.unpack100%AviraHEUR/AGEN.1215461Download File
                  0.3.ts.exe.228233eea14.0.unpack100%AviraHEUR/AGEN.1215461Download File
                  0.2.ts.exe.7ffa0aed0000.2.unpack100%AviraHEUR/AGEN.1251140Download File
                  No Antivirus matches
                  No Antivirus matches
                  No contacted domains info
                  No contacted IP infos
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:745562
                  Start date and time:2022-11-14 14:05:50 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 5m 55s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:ts.exe_ (renamed file extension from exe_ to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal76.troj.winEXE@2/3@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 85% (good quality ratio 77.3%)
                  • Quality average: 62.1%
                  • Quality standard deviation: 30.2%
                  HCA Information:
                  • Successful, ratio: 95%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                  • Not all processes where analyzed, report is missing behavior information
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\ts.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):121344
                  Entropy (8bit):6.020791170598696
                  Encrypted:false
                  SSDEEP:3072:dvsJ1yYfWqzIcJ6+R8uQyUtjt8F+8uYW5j:R4cYfWqzr4+R8xZCF+dJ
                  MD5:726E5AA7D5929BDC85333E966770FF1A
                  SHA1:B43E1A8CF31AD480EC2AE01420E2017488993A8F
                  SHA-256:89BE65452EA9DC74134F60311D57B84956D149C600C89801FB152BB04420B16B
                  SHA-512:1E69593638B9735C3F7E1E0AE49705B8A10F833D65B9D754973FFF4EDB48DBD270C60E7D157D92F0E42E228C91FCFF2B32D1B1C7F8E4119CA2CBDBBFF70F7FE4
                  Malicious:true
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........7.q.V.".V.".V."3$.#.V."3$.#eV."3$.#.V."3$.#.V.".V.".V."...#.V."...#.V."...#.V."`/.#.V."`/.#.V."`/1".V."`/.#.V."Rich.V."........................PE..d....&rc.........." .........................................................0............`.............................................T...d...(............................ ..l.......8...........................@...@............ ..P............................text............................... ..`.rdata..,.... ......................@..@.data...............................@....pdata..............................@..@_RDATA..\...........................@..@.rsrc...............................@..@.reloc..l.... ......................@..B........................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\ts.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):95232
                  Entropy (8bit):6.655206296626177
                  Encrypted:false
                  SSDEEP:1536:UTPDxXuEznF2kuaKvu0By22/uTjKd0ovxVg0pJvHj4o0iplGnn5A:UbDx+ELlKtG/u69rj4TiplG5
                  MD5:5D182B467B4894159F9A4E956A381B67
                  SHA1:0A610C6DE3419CE165D05D770637C8084D584FFD
                  SHA-256:ED2239E28A20674D772109DB4F302F7240491FBBC1FB3AD8F30071A6A66736BA
                  SHA-512:E6067624F570C40FF0EF2B084F60343379BC83400816217496ACB0897FECB9F4A892CDF4087B27B2E3E58BA0A8873E5CEE6CE8C15B414FC590BE69A6B56B55B4
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: C:\Users\user\Desktop\62366813.dll, Author: Joe Security
                  • Rule: Windows_Trojan_Emotet_db7d33fa, Description: unknown, Source: C:\Users\user\Desktop\62366813.dll, Author: unknown
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3}!.R.r.R.r.R.r.+.r}S.r.+.r.R.rRich.R.r........................PE..d...3q`b.........." .....\...(.......Y....................................................`..........................................................................................................................................................................text...xZ.......\.................. ..`.rdata.......p.......`..............@..@.data................h..............@....pdata...............l..............@..@................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\ts.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):619
                  Entropy (8bit):5.332868847941536
                  Encrypted:false
                  SSDEEP:12:RkjUJY/Ux2UA7FrPHOqF9ptE+7i6x6s+0+5v0aYJ4Cjp5KbJzS+Fo6:mjT/cj2POwTql35vNCp5szS6o6
                  MD5:DD2DA9843BF632309924DC6CC54B6DDC
                  SHA1:471B4075C9C6D86B94CA1DC43413222F925854FD
                  SHA-256:B114B49E322D0D6425F9A555C21BF4C0DEC2E423EE4009BB4B4A099901EAC96C
                  SHA-512:FBEFB8EC50D8D879D75D3DFD6399F744D3C72316A425758C13D82DA0992B96B1E9BF951220A0149A010A2B84E10D8FB69CA8C71590ABE172989EF82357C12540
                  Malicious:false
                  Reputation:low
                  Preview:The embedded DLL was dropped to 62366813.dll..Running the embedded DLL with the following parameters:..DLL SHA256:.......ED2239E28A20674D772109DB4F302F7240491FBBC1FB3AD8F30071A6A66736BA..Epoch:............5..Computer name:....DESKTOPX53HTF9P (random)..Serial:...........7C904961 (random)..Emotet dummy DLL was dropped to 06B049A8.dll..KERNELBASE.dll!BaseUnicodeCommandLine was patched..Command line was patched to "C:\Windows\System32\regsvr32.exe" "06B049A8.dll"..Loading 62366813.dll.....Calling DllEntryPoint() in custom mode.....DllEntryPoint() returned TRUE..The module may still be running in a separated thread..
                  File type:PE32+ executable (console) x86-64, for MS Windows
                  Entropy (8bit):6.442416778819568
                  TrID:
                  • Win64 Executable Console (202006/5) 92.65%
                  • Win64 Executable (generic) (12005/4) 5.51%
                  • Generic Win/DOS Executable (2004/3) 0.92%
                  • DOS Executable Generic (2002/1) 0.92%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:ts.exe
                  File size:744981
                  MD5:ad57d446c107b5abd83b6180456cd0dd
                  SHA1:8e277fb9bc97bedc7f7f4ba4390cc36702d87b7c
                  SHA256:58d9d7c2d4a4140bbdc16c9b6ab1b56244ebc8b1c3eaa1fc63386bbce7acdb4c
                  SHA512:35eaa45de9906131f0020640f11eeef46e10244c09c67018a4723cf4932fc3662fbdb61e230f96ce10f47adb12d46e1cf6dc365c79c92c87b1a2679f222a1983
                  SSDEEP:12288:LXZ1QgQQ5KLv9Z/QN1MlFuViQic76k0d3hNnC1Pc2lBrxhirous0o3RcYeqzVR8I:LXV2EplBrPZus04p3CBdOj
                  TLSH:A8F49E56B2E903F9F5A79134C487560AE7B0784612219B9F47B04AAB1F377726E3F320
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........E........................f...................................................L.......L.n.....L.......Rich...................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x14000b2a8
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows cui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x637226A2 [Mon Nov 14 11:29:38 2022 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:d02262cfa0ab12b8c838af1a98da369c
                  Instruction
                  dec eax
                  sub esp, 28h
                  call 00007F53C0C9A0ECh
                  dec eax
                  add esp, 28h
                  jmp 00007F53C0C99897h
                  int3
                  int3
                  inc eax
                  push ebx
                  dec eax
                  sub esp, 20h
                  dec eax
                  mov ebx, ecx
                  xor ecx, ecx
                  call dword ptr [00056E53h]
                  dec eax
                  mov ecx, ebx
                  call dword ptr [00056E42h]
                  call dword ptr [00056E4Ch]
                  dec eax
                  mov ecx, eax
                  mov edx, C0000409h
                  dec eax
                  add esp, 20h
                  pop ebx
                  dec eax
                  jmp dword ptr [00056E40h]
                  dec eax
                  mov dword ptr [esp+08h], ecx
                  dec eax
                  sub esp, 38h
                  mov ecx, 00000017h
                  call dword ptr [00056E34h]
                  test eax, eax
                  je 00007F53C0C99A29h
                  mov ecx, 00000002h
                  int 29h
                  dec eax
                  lea ecx, dword ptr [0008F83Ah]
                  call 00007F53C0C99BEEh
                  dec eax
                  mov eax, dword ptr [esp+38h]
                  dec eax
                  mov dword ptr [0008F921h], eax
                  dec eax
                  lea eax, dword ptr [esp+38h]
                  dec eax
                  add eax, 08h
                  dec eax
                  mov dword ptr [0008F8B1h], eax
                  dec eax
                  mov eax, dword ptr [0008F90Ah]
                  dec eax
                  mov dword ptr [0008F77Bh], eax
                  dec eax
                  mov eax, dword ptr [esp+40h]
                  dec eax
                  mov dword ptr [0008F87Fh], eax
                  mov dword ptr [0008F755h], C0000409h
                  mov dword ptr [0008F74Fh], 00000001h
                  mov dword ptr [0008F759h], 00000001h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x7a2b40x3c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x288.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x9d0000x3c9c.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa30000xd8c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x725a00x38.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x726000x28.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x724600x140.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x620000x380.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x607b80x60800False0.4547542908031088data6.494863973067288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x620000x18e5e0x19000False0.440009765625data5.1869098128532585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x7b0000x214dc0x1fc00False0.48175289124015747data5.941625434601615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .pdata0x9d0000x3c9c0x3e00False0.4765625data5.653230312289686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  _RDATA0xa10000x15c0x200False0.41796875data3.3314562870393805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0xa20000x2880x400False0.33203125data3.8449104178415685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xa30000xd8c0xe00False0.46791294642857145data5.39595888202804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_MANIFEST0xa20600x224XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (488), with CRLF line terminatorsEnglishUnited States
                  DLLImport
                  ADVAPI32.dllCryptGetHashParam, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptAcquireContextW, CryptReleaseContext
                  KERNEL32.dllReadFile, VirtualFree, WriteFile, VirtualAlloc, CreateToolhelp32Snapshot, CreateEventW, Sleep, GetLastError, CreateFileA, LoadLibraryA, DeleteFileA, CloseHandle, Module32FirstW, GetFileSize, Module32NextW, GetTickCount, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, GetModuleHandleW, GetProcAddress, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, MultiByteToWideChar, WideCharToMultiByte, InitializeCriticalSectionEx, EncodePointer, DecodePointer, GetStringTypeW, LCMapStringEx, GetLocaleInfoEx, CompareStringEx, GetCPInfo, RtlUnwind, RtlUnwindEx, RtlPcToFileHeader, RaiseException, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetCommandLineA, GetCommandLineW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetStdHandle, HeapAlloc, HeapFree, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetProcessHeap, SetStdHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, GetTimeZoneInformation, HeapSize, CreateFileW, WriteConsoleW
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found

                  Click to jump to process

                  Target ID:0
                  Start time:14:06:45
                  Start date:14/11/2022
                  Path:C:\Users\user\Desktop\ts.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\Desktop\ts.exe
                  Imagebase:0x7ff7a5880000
                  File size:744981 bytes
                  MD5 hash:AD57D446C107B5ABD83B6180456CD0DD
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Emotet_db7d33fa, Description: unknown, Source: 00000000.00000002.562441647.00007FFA0AED1000.00000020.00000001.01000000.00000004.sdmp, Author: unknown
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Emotet_db7d33fa, Description: unknown, Source: 00000000.00000003.299862162.00000228231C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Emotet_db7d33fa, Description: unknown, Source: 00000000.00000003.299383409.0000022823350000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:14:06:45
                  Start date:14/11/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7fcd70000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly