Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
POv5Nk1dlu.exe

Overview

General Information

Sample Name:POv5Nk1dlu.exe
Analysis ID:756107
MD5:14e2d1b23a073724d63ce5c9c89091cd
SHA1:000e55014fd09600275f5b394c5be51c2bf4dad9
SHA256:cd64bfd3940f7aabd6a74ca47beba4ef1d19f6605dee0f64e5932765a3142fba
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Sigma detected: Drops script at startup location
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Contains functionality to execute programs as a different user
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to launch a process as a different user
Stores files to the Windows start menu directory
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Sample file is different than original file name gathered from version info
OS version to string mapping found (often used in BOTs)
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Tries to load missing DLLs
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to launch a program with higher privileges
Creates a start menu entry (Start Menu\Programs\Startup)
Potential key logger detected (key state polling based)
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to simulate mouse events
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • POv5Nk1dlu.exe (PID: 1408 cmdline: C:\Users\user\Desktop\POv5Nk1dlu.exe MD5: 14E2D1B23A073724D63CE5C9C89091CD)
  • wscript.exe (PID: 4716 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\RDVGHelper\runas.vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • at.exe (PID: 2848 cmdline: "C:\Users\user\RDVGHelper\at.exe" MD5: 8B5794337FDF61005D3F079A792B0AA1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.urlMethodology_Suspicious_Shortcut_Local_URLDetects local script usage for .URL persistence@itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
  • 0x13:$file: URL=file:///
  • 0x56:$file: URL=file:///
  • 0x0:$url_explicit: [InternetShortcut]
  • 0x43:$url_explicit: [InternetShortcut]

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\POv5Nk1dlu.exe, ProcessId: 1408, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.url
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: POv5Nk1dlu.exeReversingLabs: Detection: 76%
Source: POv5Nk1dlu.exeVirustotal: Detection: 73%Perma Link
Source: POv5Nk1dlu.exeAvira: detected
Source: C:\Users\user\RDVGHelper\at.exeAvira: detection malicious, Label: HEUR/AGEN.1245473
Source: POv5Nk1dlu.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B4696 GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BC93C FindFirstFileW,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
Source: at.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bot.whatismyipaddress.com
Source: POv5Nk1dlu.exe, 00000000.00000002.316065070.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bot.whatismyipaddress.com6
Source: POv5Nk1dlu.exe, 00000000.00000002.316065070.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgmTime
Source: at.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgmTimed
Source: at.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.myexternalip.com/raw
Source: POv5Nk1dlu.exe, 00000000.00000002.316065070.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.myexternalip.com/raw/
Source: POv5Nk1dlu.exe, 00000000.00000002.316017878.0000000000DAD000.00000004.00000020.00020000.00000000.sdmp, at.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009C25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009C425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalFix,CloseClipboard,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnWire,CountClipboardFormats,CloseClipboard,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,6F83BC60,6F83AF40,SetCapture,ClientToScreen,6F83B190,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,6F83BC60,6F83AF40,SetCapture,ClientToScreen,6F83B190,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F52344 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009C425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalFix,CloseClipboard,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnWire,CountClipboardFormats,CloseClipboard,

System Summary

barindex
Source: POv5Nk1dlu.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: POv5Nk1dlu.exe, 00000000.00000003.304290006.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
Source: POv5Nk1dlu.exe, 00000000.00000003.304290006.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
Source: POv5Nk1dlu.exe, 00000000.00000002.316438570.0000000001005000.00000080.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
Source: POv5Nk1dlu.exe, 00000000.00000002.316438570.0000000001005000.00000080.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
Source: C:\Users\user\RDVGHelper\at.exeCode function: This is a third-party compiled AutoIt script.
Source: at.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: at.exe, 00000002.00000000.346969623.0000000000A05000.00000080.00000001.01000000.00000007.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
Source: at.exe, 00000002.00000000.346969623.0000000000A05000.00000080.00000001.01000000.00000007.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
Source: at.exe, 00000002.00000003.350512567.0000000003CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
Source: at.exe, 00000002.00000003.350512567.0000000003CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
Source: POv5Nk1dlu.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: POv5Nk1dlu.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
Source: at.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.
Source: at.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
Source: POv5Nk1dlu.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.url, type: DROPPEDMatched rule: Methodology_Suspicious_Shortcut_Local_URL author = @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson), description = Detects local script usage for .URL persistence, score = 27.09.2019, reference = https://twitter.com/cglyer/status/1176184798248919044
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F5E060
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F5E800
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F5FE40
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F66843
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FD804A
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F87006
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F86522
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F6710E
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F716C4
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F51287
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F68A0E
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F7BFE6
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F7DBB5
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0095E060
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0095E800
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0095FE40
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009D804A
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00964140
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00972405
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00986522
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0098267E
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009D0665
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097283A
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00966843
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009889DF
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00986A94
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009D0AE2
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00968A0E
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B8B13
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009AEB07
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097CD61
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00987006
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00963190
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0096710E
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00951287
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009733C7
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097F419
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00965680
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009716C4
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009778D3
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009658C0
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097DBB5
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00971BB8
Source: C:\Users\user\RDVGHelper\at.exeCode function: String function: 00957F41 appears 33 times
Source: C:\Users\user\RDVGHelper\at.exeCode function: String function: 00970D27 appears 65 times
Source: C:\Users\user\RDVGHelper\at.exeCode function: String function: 00978B40 appears 36 times
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009A8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,731F6290,731F7BC0,CreateProcessAsUserW,731F5000,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,731F7C20,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F53633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDC8EE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDC49C PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F5189B NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDC86D SendMessageW,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCC2E ClientToScreen,6F83B270,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,6F83BC60,6F83AF40,SetCapture,ClientToScreen,6F83B190,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCD6C GetWindowLongW,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F516DE GetParent,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDD6C6 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F516B5 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F51290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDDA9A NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F51287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,73324310,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDC27C 6F83B200,6F83B5E0,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F5167D NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDC220 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCBF9 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCBAE NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDC788 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCB7F NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDCB50 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FDD74C GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00953633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DC220 NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DC27C 6F83B200,6F83B5E0,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DC49C PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DC788 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DC8EE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DC86D SendMessageW,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCBAE NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCBF9 NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCB50 NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCB7F NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCC2E ClientToScreen,6F83B270,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,6F83BC60,6F83AF40,SetCapture,ClientToScreen,6F83B190,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DCD6C GetWindowLongW,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00951290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00951287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,73324310,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009516B5 NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009516DE GetParent,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DD6C6 NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0095167D NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DD74C GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0095189B NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009DDA9A NtdllDialogWndProc_W,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B40B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,
Source: POv5Nk1dlu.exe, 00000000.00000003.305755579.00000000034A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewinresume2 vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000003.303502621.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewinresume2 vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000002.315183078.0000000000B90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME1 vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000002.315295636.0000000000C16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000002.315295636.0000000000C16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000000.301657715.000000000106B000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewinresume2 vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000002.315224332.0000000000BBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewinresume2 vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000003.302533451.0000000000C16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000003.302533451.0000000000C16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000003.302345223.0000000000B9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exe, 00000000.00000003.302345223.0000000000B9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs POv5Nk1dlu.exe
Source: POv5Nk1dlu.exeBinary or memory string: OriginalFilenamewinresume2 vs POv5Nk1dlu.exe
Source: C:\Windows\System32\wscript.exeSection loaded: sfc.dll
Source: POv5Nk1dlu.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: at.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: POv5Nk1dlu.exeReversingLabs: Detection: 76%
Source: POv5Nk1dlu.exeVirustotal: Detection: 73%
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeFile read: C:\Users\user\Desktop\POv5Nk1dlu.exeJump to behavior
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\POv5Nk1dlu.exe C:\Users\user\Desktop\POv5Nk1dlu.exe
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\RDVGHelper\runas.vbs"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\RDVGHelper\at.exe "C:\Users\user\RDVGHelper\at.exe"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\RDVGHelper\at.exe "C:\Users\user\RDVGHelper\at.exe"
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009A8713 AdjustTokenPrivileges,CloseHandle,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009A8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeFile created: C:\Users\user\RDVGHelperJump to behavior
Source: classification engineClassification label: mal84.expl.evad.winEXE@4/3@0/0
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FBA2D5 GetLastError,FormatMessageW,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00FB3E91 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00954FE9 76DCC0F0,FindResourceExW,LoadResource,SizeofResource,LockResource,
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\RDVGHelper\runas.vbs"
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeAutomated click: OK
Source: C:\Users\user\RDVGHelper\at.exeAutomated click: OK
Source: POv5Nk1dlu.exeStatic file information: File size 1348104 > 1048576
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F78B85 push ecx; ret
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00978B85 push ecx; ret
Source: POv5Nk1dlu.exeStatic PE information: section name: .imports
Source: at.exe.0.drStatic PE information: section name: .imports
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F54D61 LoadLibraryA,GetProcAddress,
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeFile created: C:\Users\user\RDVGHelper\at.exeJump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\RDVGHelper\at.exe "C:\Users\user\RDVGHelper\at.exe"
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.urlJump to behavior
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.urlJump to behavior
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F54A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00954A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009D55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009733C7 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\RDVGHelper\at.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\RDVGHelper\at.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeAPI coverage: 6.2 %
Source: C:\Users\user\RDVGHelper\at.exeAPI coverage: 5.6 %
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00954AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B4696 GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BC93C FindFirstFileW,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009BF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini
Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer

Anti Debugging

barindex
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F85CCC RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,MessageBoxW,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F85CCC RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,MessageBoxW,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F54D61 LoadLibraryA,GetProcAddress,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009A81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009C41FD BlockInput,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F7A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097A364 SetUnhandledExceptionFilter,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009A8C93 LogonUserW,
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F54A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00953B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\RDVGHelper\at.exe "C:\Users\user\RDVGHelper\at.exe"
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B4EC9 mouse_event,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009A81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009B4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,
Source: POv5Nk1dlu.exe, at.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: POv5Nk1dlu.exe, at.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0097886B cpuid
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\POv5Nk1dlu.exeCode function: 0_2_00F850D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_0098418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00954AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_00992230 GetUserNameW,
Source: at.exeBinary or memory string: WIN_81
Source: at.exeBinary or memory string: WIN_XP
Source: at.exe, 00000002.00000002.358422252.0000000001607000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIN_XP&
Source: at.exeBinary or memory string: WIN_XPe
Source: at.exeBinary or memory string: WIN_VISTA
Source: POv5Nk1dlu.exe, 00000000.00000003.302345223.0000000000B9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIN_XP3r\
Source: at.exeBinary or memory string: WIN_7
Source: at.exeBinary or memory string: WIN_8
Source: at.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009C6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,
Source: C:\Users\user\RDVGHelper\at.exeCode function: 2_2_009C6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
2
Valid Accounts
11
Scripting
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default Accounts1
Native API
2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
Exfiltration Over Bluetooth1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
2
Valid Accounts
11
Scripting
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares2
Clipboard Data
Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)2
Registry Run Keys / Startup Folder
21
Access Token Manipulation
21
Obfuscated Files or Information
NTDS16
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon Script12
Process Injection
1
Software Packing
LSA Secrets13
Security Software Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.common1
Scheduled Task/Job
1
DLL Side-Loading
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup Items2
Registry Run Keys / Startup Folder
1
Masquerading
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
Valid Accounts
Proc Filesystem1
Application Window Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)21
Access Token Manipulation
Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron12
Process Injection
Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
POv5Nk1dlu.exe77%ReversingLabsWin32.Backdoor.NanoCore
POv5Nk1dlu.exe73%VirustotalBrowse
POv5Nk1dlu.exe100%AviraHEUR/AGEN.1245473
SourceDetectionScannerLabelLink
C:\Users\user\RDVGHelper\at.exe100%AviraHEUR/AGEN.1245473
SourceDetectionScannerLabelLinkDownload
0.0.POv5Nk1dlu.exe.f50000.0.unpack100%AviraHEUR/AGEN.1245473Download File
2.0.at.exe.950000.0.unpack100%AviraHEUR/AGEN.1245473Download File
2.2.at.exe.950000.0.unpack100%AviraHEUR/AGEN.1220844Download File
0.2.POv5Nk1dlu.exe.f50000.0.unpack100%AviraHEUR/AGEN.1220844Download File
No Antivirus matches
SourceDetectionScannerLabelLink
http://checkip.dyndns.orgmTimed0%Avira URL Cloudsafe
http://bot.whatismyipaddress.com60%Avira URL Cloudsafe
http://checkip.dyndns.orgmTime0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://api.ipify.orgPOv5Nk1dlu.exe, 00000000.00000002.316017878.0000000000DAD000.00000004.00000020.00020000.00000000.sdmp, at.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://checkip.dyndns.orgmTimedat.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://bot.whatismyipaddress.comat.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://bot.whatismyipaddress.com6POv5Nk1dlu.exe, 00000000.00000002.316065070.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.myexternalip.com/rawat.exe, 00000002.00000002.358917443.00000000017B4000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://checkip.dyndns.orgmTimePOv5Nk1dlu.exe, 00000000.00000002.316065070.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.myexternalip.com/raw/POv5Nk1dlu.exe, 00000000.00000002.316065070.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          No contacted IP infos
          Joe Sandbox Version:36.0.0 Rainbow Opal
          Analysis ID:756107
          Start date and time:2022-11-29 16:40:49 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 36s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:POv5Nk1dlu.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal84.expl.evad.winEXE@4/3@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 0.9% (good quality ratio 0.9%)
          • Quality average: 78.5%
          • Quality standard deviation: 11.3%
          HCA Information:
          • Successful, ratio: 64%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          16:41:51AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.url
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\POv5Nk1dlu.exe
          File Type:Generic INItialization configuration [InternetShortcut]
          Category:modified
          Size (bytes):134
          Entropy (8bit):4.778942459748406
          Encrypted:false
          SSDEEP:3:HRAbABGQVuOUVifX5XQw0ylyLABGQVuOUVifX5XQw0W:HRYF5OLX5XQw08YF5OLX5XQw0W
          MD5:A84D228A61B08792024FF4337CC606F6
          SHA1:92DD57483FFF604A9848EDF1B060EB9BD11D6C42
          SHA-256:8CA3F2A55F27D106D5521C66C109B98CF9A13EAD480A46AA8F3906E1DD645F9B
          SHA-512:13663A0862CD250CBB2AAF238A77A97F4528A5E0E200C79C3B16AF30076290F2338F4C5D14B7B7E390DC4B8D39A5C0BBA77C648D86F9023722EFEB9E15CF2F77
          Malicious:true
          Yara Hits:
          • Rule: Methodology_Suspicious_Shortcut_Local_URL, Description: Detects local script usage for .URL persistence, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runas.url, Author: @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
          Reputation:low
          Preview:[InternetShortcut].URL=file:///C:\Users\user\RDVGHelper\runas.vbs[InternetShortcut].URL=file:///C:\Users\user\RDVGHelper\runas.vbs
          Process:C:\Users\user\Desktop\POv5Nk1dlu.exe
          File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
          Category:dropped
          Size (bytes):1348112
          Entropy (8bit):5.849778682930291
          Encrypted:false
          SSDEEP:24576:4AHnh+eWsN3skA4RV1Hom2KXDuFLLJiEzeyG75B:/h+ZkldoPKT4L4Ez3G9B
          MD5:8B5794337FDF61005D3F079A792B0AA1
          SHA1:61FAEBE8AB40D8C124AC8A5D060964EB9AF877A8
          SHA-256:184491C39AC7E31E86978E965583BEB6D692885B27C91003EF497A53CED6D70C
          SHA-512:6515FF218949A2F2DA753430F9469B40A887906955D31905C730F5340480780673367CFEC7E72DFE09AE34EF045366C8A5F5A22C32ABE5E13ABABBD7DC2EC3AB
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L...H..\.........."......`...P...P.......`........@.......................................@...@.......@.........................|........D...................@..4q..................................t...H...........................................UPX0.....P.......P......................UPX1.....`...`...\...T..............@....rsrc....P.......J..................@....imports.0.......$..................@....reloc.......@...r..................@...........................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\POv5Nk1dlu.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):106
          Entropy (8bit):4.736102681477269
          Encrypted:false
          SSDEEP:3:jaPcYonh3QBHoUVifX5EtACHn:jk+h8ILX5G1
          MD5:2372F2EE2222AB931284A8D08A10C318
          SHA1:C5DED8E64290FE4C74BC5FBADCCDF0BCAA5C6C7F
          SHA-256:E791FD8D094533E9CCA63CF23B8BEB8AB8F0E2F447BE2FDF1EE1B3B5A1DFD988
          SHA-512:B6EC56F1EC2ECE19C3370B8F53A92251D82D811AFEE9C202535AC565247236B76040D22A9EB7DDD77A2988E2C8BC4C42EE4A010558379D2A96B74BE109C4606D
          Malicious:false
          Reputation:low
          Preview:Set WshShell = WScript.CreateObject("WScript.Shell")..WshShell.Run """C:\Users\user\RDVGHelper\at.exe"""
          File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
          Entropy (8bit):5.8497727328429265
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.39%
          • UPX compressed Win32 Executable (30571/9) 0.30%
          • Win32 EXE Yoda's Crypter (26571/9) 0.26%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          File name:POv5Nk1dlu.exe
          File size:1348104
          MD5:14e2d1b23a073724d63ce5c9c89091cd
          SHA1:000e55014fd09600275f5b394c5be51c2bf4dad9
          SHA256:cd64bfd3940f7aabd6a74ca47beba4ef1d19f6605dee0f64e5932765a3142fba
          SHA512:882164c258e762be8129ff85f1fcffe5c37df46931a2fcf7275673d0f982fbb6e2c0a7008ea6ddec5983e78162a2085f21f2d3f95f95e5f9e0b32462e7913a25
          SSDEEP:24576:4AHnh+eWsN3skA4RV1Hom2KXDuFLLJiEzeyG75Z:/h+ZkldoPKT4L4Ez3G9Z
          TLSH:4A558D02B3928035FEAE91739B59B20156BCFD64013385FF1298DD79BA701A11F2E66F
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
          Icon Hash:868c661b1d9cc4e6
          Entrypoint:0x42800a
          Entrypoint Section:UPX0
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
          Time Stamp:0x5CCFBA48 [Mon May 6 04:38:32 2019 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:bd3825b6e0410966f0c31f64b6c7644a
          Instruction
          call 00007F55550BFA3Dh
          jmp 00007F55550B27F4h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          push edi
          push esi
          mov esi, dword ptr [esp+10h]
          mov ecx, dword ptr [esp+14h]
          mov edi, dword ptr [esp+0Ch]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F55550B297Ah
          cmp edi, eax
          jc 00007F55550B2CDEh
          bt dword ptr [004C41FCh], 01h
          jnc 00007F55550B2979h
          rep movsb
          jmp 00007F55550B2C8Ch
          cmp ecx, 00000080h
          jc 00007F55550B2B44h
          mov eax, edi
          xor eax, esi
          test eax, 0000000Fh
          jne 00007F55550B2980h
          bt dword ptr [004BF324h], 01h
          jc 00007F55550B2E50h
          bt dword ptr [004C41FCh], 00000000h
          jnc 00007F55550B2B1Dh
          test edi, 00000003h
          jne 00007F55550B2B2Eh
          test esi, 00000003h
          jne 00007F55550B2B0Dh
          bt edi, 02h
          jnc 00007F55550B297Fh
          mov eax, dword ptr [esi]
          sub ecx, 04h
          lea esi, dword ptr [esi+04h]
          mov dword ptr [edi], eax
          lea edi, dword ptr [edi+04h]
          bt edi, 03h
          jnc 00007F55550B2983h
          movq xmm1, qword ptr [esi]
          sub ecx, 08h
          lea esi, dword ptr [esi+08h]
          movq qword ptr [edi], xmm1
          lea edi, dword ptr [edi+08h]
          test esi, 00000007h
          je 00007F55550B29D5h
          bt esi, 03h
          Programming Language:
          • [ASM] VS2013 build 21005
          • [ C ] VS2013 build 21005
          • [C++] VS2013 build 21005
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2013 UPD5 build 40629
          • [RES] VS2013 build 21005
          • [LNK] VS2013 UPD5 build 40629
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1410000x17c.imports
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x10c0000x34414.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1440000x7134.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x10ba740x48UPX1
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          UPX00x10000xb50000xb5000False0.5158192334254144data6.647020934312938IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          UPX10xb60000x560000x55c00False0.07822749635568513data1.3367400085274173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x10c0000x350000x34a00False0.6905943809382423data6.924446867745964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .imports0x1410000x30000x2400False0.3615451388888889data4.6777086279249716IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .reloc0x1440000x80000x7200False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          NameRVASizeTypeLanguageCountry
          RT_ICON0x10c4e40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain
          RT_ICON0x10c6100x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain
          RT_ICON0x10c73c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain
          RT_ICON0x10c8680xeac8Device independent bitmap graphic, 300 x 600 x 4, image size 57600EnglishGreat Britain
          RT_MENU0x11b3340x50dataEnglishGreat Britain
          RT_STRING0x11b3880x48b8data
          RT_STRING0x11fc440x48b8data
          RT_STRING0x1245000x594dataEnglishGreat Britain
          RT_STRING0x124a980x68adataEnglishGreat Britain
          RT_STRING0x1251280x490dataEnglishGreat Britain
          RT_STRING0x1255bc0x5fcdataEnglishGreat Britain
          RT_STRING0x125bbc0x65cdataEnglishGreat Britain
          RT_STRING0x12621c0x466dataEnglishGreat Britain
          RT_STRING0x1266880x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain
          RT_RCDATA0x1267e40x19560data
          RT_GROUP_ICON0x13fd480x14dataEnglishGreat Britain
          RT_GROUP_ICON0x13fd600x14dataEnglishGreat Britain
          RT_GROUP_ICON0x13fd780x14dataEnglishGreat Britain
          RT_GROUP_ICON0x13fd900x14dataEnglishGreat Britain
          RT_VERSION0x13fda80x278dataEnglishUnited States
          RT_MANIFEST0x1400240x3efASCII text, with CRLF line terminatorsEnglishGreat Britain
          DLLImport
          KERNEL32.DLLDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
          PSAPI.DLLGetProcessMemoryInfo
          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
          UxTheme.dllIsThemeActive
          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Target ID:0
          Start time:16:41:46
          Start date:29/11/2022
          Path:C:\Users\user\Desktop\POv5Nk1dlu.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\POv5Nk1dlu.exe
          Imagebase:0xf50000
          File size:1348104 bytes
          MD5 hash:14E2D1B23A073724D63CE5C9C89091CD
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          Target ID:1
          Start time:16:41:59
          Start date:29/11/2022
          Path:C:\Windows\System32\wscript.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\RDVGHelper\runas.vbs"
          Imagebase:0x7ff6caef0000
          File size:163840 bytes
          MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:2
          Start time:16:42:07
          Start date:29/11/2022
          Path:C:\Users\user\RDVGHelper\at.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\RDVGHelper\at.exe"
          Imagebase:0x950000
          File size:1348112 bytes
          MD5 hash:8B5794337FDF61005D3F079A792B0AA1
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          Reputation:low

          No disassembly