Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764029
MD5:2396925cc38be4f07bd426cf080256ce
SHA1:8884e5383b3601e59089f0d287acad1eff20c676
SHA256:e91bb1f7c2b2ffd094d3915f1fffbfe929efd49e1d732b51d60e8a378a8a066b
Tags:exe
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Amadeys stealer DLL
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected Amadey bot
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Drops PE files
Contains functionality to read the PEB
Contains functionality to launch a program with higher privileges
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 3520 cmdline: C:\Users\user\Desktop\file.exe MD5: 2396925CC38BE4F07BD426CF080256CE)
    • gntuud.exe (PID: 2016 cmdline: "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" MD5: 2396925CC38BE4F07BD426CF080256CE)
      • schtasks.exe (PID: 5144 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • gntuud.exe (PID: 5292 cmdline: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe MD5: 2396925CC38BE4F07BD426CF080256CE)
  • cleanup
{"C2 url": "77.73.133.72/hfk3vK9/index.php", "Version": "3.50"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllINDICATOR_TOOL_PWS_AmadyDetects password stealer DLL. Dropped by AmadeyditekSHen
    • 0xd868:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15604:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x16074:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15158:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0x151bc:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0xdd0c:$s3: \Mikrotik\Winbox\Addresses.cdb
    • 0x190d8:$s4: \HostName
    • 0x19100:$s5: \Password
    • 0x17c04:$s6: SOFTWARE\RealVNC\
    • 0x17c30:$s6: SOFTWARE\RealVNC\
    • 0x17c5c:$s6: SOFTWARE\RealVNC\
    • 0x17ca4:$s6: SOFTWARE\RealVNC\
    • 0x17cd0:$s6: SOFTWARE\RealVNC\
    • 0x18008:$s7: SOFTWARE\TightVNC\
    • 0x18034:$s7: SOFTWARE\TightVNC\
    • 0x18060:$s7: SOFTWARE\TightVNC\
    • 0x180ac:$s7: SOFTWARE\TightVNC\
    • 0x1c43c:$s8: cred.dll
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1640:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000001.00000003.293480849.00000000007CB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000001.00000003.271178795.0000000000680000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            4.2.gntuud.exe.400000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              4.2.gntuud.exe.6e0e67.1.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                4.3.gntuud.exe.940000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  0.2.file.exe.900e67.1.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    0.2.file.exe.400000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                      Click to see the 9 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/index.phpAvira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dllAvira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/index.php8Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/index.phpplayAvira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dllVirustotal: Detection: 18%Perma Link
                      Source: http://77.73.133.72/hfk3vK9/index.phpVirustotal: Detection: 9%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllAvira: detection malicious, Label: HEUR/AGEN.1233121
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllReversingLabs: Detection: 88%
                      Source: file.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeJoe Sandbox ML: detected
                      Source: 0.2.file.exe.900e67.1.unpackMalware Configuration Extractor: Amadey {"C2 url": "77.73.133.72/hfk3vK9/index.php", "Version": "3.50"}

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeUnpacked PE file: 4.2.gntuud.exe.400000.0.unpack
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: file.exe, file.exe, 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, gntuud.exe, 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp
                      Source: Binary string: C:\wabuj\8-vuca\fomehibarayar-zejegogotu94\guyo\veceradaro\fev.pdb source: file.exe, gntuud.exe.0.dr
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00420BA6 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00920E0D FindFirstFileExW,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00420BA6 FindFirstFileExW,

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 77.73.133.72/hfk3vK9/index.php
                      Source: Joe Sandbox ViewASN Name: AS43260TR AS43260TR
                      Source: Joe Sandbox ViewIP Address: 77.73.133.72 77.73.133.72
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_
                      Source: gntuud.exe, 00000001.00000003.293349447.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/index.php
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/index.php8
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/index.phpplay
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404180 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402C70 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegSetValueExA,RegCloseKey,GdiplusStartup,GetDC,RegGetValueA,RegGetValueA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,RegGetValueA,GetSystemMetrics,GetSystemMetrics,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,SelectObject,DeleteObject,DeleteObject,DeleteObject,ReleaseDC,GdipDisposeImage,GdiplusShutdown,

                      System Summary

                      barindex
                      Source: 00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, type: DROPPEDMatched rule: Detects password stealer DLL. Dropped by Amadey Author: ditekSHen
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, type: DROPPEDMatched rule: INDICATOR_TOOL_PWS_Amady author = ditekSHen, description = Detects password stealer DLL. Dropped by Amadey
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBD0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00429470
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042848D
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00432890
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009296D7
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009286F4
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00429470
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0042848D
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00432890
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0040CBD0
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00418C40 appears 40 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00416F50 appears 130 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00918EA7 appears 33 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 009171B7 appears 125 times
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: String function: 00416F50 appears 130 times
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: String function: 00418C40 appears 40 times
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess Stats: CPU usage > 98%
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll 5CD41F164DE6F783B7DA82B5F6DBD49413ECCD87CC7470F2004D58CA081FB0E0
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeFile created: C:\Users\user\AppData\Roaming\f49dfc5e4e2508Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\ecaac49691Jump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/4@0/1
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00746356 CreateToolhelp32Snapshot,Module32First,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeMutant created: \Sessions\1\BaseNamedObjects\f49dfc5e4e2508eabedc241a3f1ae459
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5300:120:WilError_01
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: file.exe, file.exe, 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, gntuud.exe, 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp
                      Source: Binary string: C:\wabuj\8-vuca\fomehibarayar-zejegogotu94\guyo\veceradaro\fev.pdb source: file.exe, gntuud.exe.0.dr

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeUnpacked PE file: 4.2.gntuud.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.wuve:R;.bedicar:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeUnpacked PE file: 4.2.gntuud.exe.400000.0.unpack .text:ER;.data:W;.wuve:R;.bedicar:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418C86 push ecx; ret
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418C86 push ecx; ret
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0074B3E8 push 54850227h; ret
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0074951B push cs; ret
                      Source: file.exeStatic PE information: section name: .wuve
                      Source: file.exeStatic PE information: section name: .bedicar
                      Source: gntuud.exe.0.drStatic PE information: section name: .wuve
                      Source: gntuud.exe.0.drStatic PE information: section name: .bedicar

                      Persistence and Installation Behavior

                      barindex
                      Source: Yara matchFile source: 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 2016, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 1948Thread sleep time: -690000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5260Thread sleep time: -50000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5324Thread sleep time: -1620000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5252Thread sleep time: -1080000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5324Thread sleep time: -180000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 1948Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 360000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000
                      Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.8 %
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeAPI coverage: 4.7 %
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405400 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00420BA6 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00920E0D FindFirstFileExW,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00420BA6 FindFirstFileExW,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 30000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 50000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 360000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 30000
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWA
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004037D0 DeleteObject,GetUserNameW,GetUserNameW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetUserNameW,LookupAccountNameW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,LookupAccountNameW,ConvertSidToStringSidW,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,LocalFree,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B901 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041DF02 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0090092B mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0091E169 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0091BB68 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00900D90 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0041B901 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0041DF02 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00745C33 push dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418163 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CA80 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418BCC SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009183CA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00918CCE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0091CCE7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418163 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0041CA80 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418BCC SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403F40 GetModuleFileNameA,CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,GetModuleHandleA,GetProcAddress,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,VirtualFree,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404350 ShellExecuteA,
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\f49dfc5e4e2508\cred64.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418887 cpuid
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418CA1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00424BC4 _free,_free,_free,GetTimeZoneInformation,_free,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405400 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBD0 GetUserNameA,SetCurrentDirectoryA,GetFileAttributesA,CreateDirectoryA,GetFileAttributesA,GetModuleFileNameA,SetCurrentDirectoryA,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.gntuud.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.gntuud.exe.6e0e67.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.gntuud.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.900e67.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.gntuud.exe.6e0e67.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.gntuud.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.940000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.gntuud.exe.680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.gntuud.exe.680000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.gntuud.exe.940000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.900e67.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000003.293480849.00000000007CB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.271178795.0000000000680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 2016, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, type: DROPPED
                      Source: Yara matchFile source: 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 2016, type: MEMORYSTR
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Exploitation for Privilege Escalation
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Screen Capture
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      Registry Run Keys / Startup Folder
                      111
                      Process Injection
                      21
                      Virtualization/Sandbox Evasion
                      LSASS Memory121
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      Exfiltration Over Bluetooth1
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)1
                      Scheduled Task/Job
                      111
                      Process Injection
                      Security Account Manager21
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)1
                      Registry Run Keys / Startup Folder
                      1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Software Packing
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      file.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll100%AviraHEUR/AGEN.1233121
                      C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll88%ReversingLabsWin32.Infostealer.Decred
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      77.73.133.72/hfk3vK9/index.php0%URL Reputationsafe
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll19%VirustotalBrowse
                      http://77.73.133.72/hfk3vK9/index.php10%VirustotalBrowse
                      http://77.73.133.72/hfk3vK9/index.php100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/index.php8100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/index.phpplay100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      77.73.133.72/hfk3vK9/index.phptrue
                      • URL Reputation: safe
                      low
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dllgntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 19%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/index.phpgntuud.exe, 00000001.00000003.293349447.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 10%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/index.php8gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/index.phpplaygntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      77.73.133.72
                      unknownKazakhstan
                      43260AS43260TRtrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:764029
                      Start date and time:2022-12-09 10:31:05 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 11m 8s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@7/4@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 94%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      10:32:10API Interceptor2664x Sleep call for process: gntuud.exe modified
                      10:32:12Task SchedulerRun new task: gntuud.exe path: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):129024
                      Entropy (8bit):6.512109370826634
                      Encrypted:false
                      SSDEEP:3072:ox7pOYzBekTRmWDWCMq6As523HeS9FAiZ87vO2rlL3RnG9:ox7ZNhTR/dMq6AO0a7vVlT
                      MD5:349B2B47FEF50FA6A1FC19D0EE4B2DB8
                      SHA1:077F4328B3F060A9F010B1A63D9E127D24DDAFD4
                      SHA-256:5CD41F164DE6F783B7DA82B5F6DBD49413ECCD87CC7470F2004D58CA081FB0E0
                      SHA-512:83FD58BE4C0051ED05B7A03443D256D52F09206D2F433BD302C9E9E3780B9D472E823AED1DB01B5052DC8FDC63A4352BEAC9E399858A8252C057F11CF2BD1773
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, Author: Joe Security
                      • Rule: INDICATOR_TOOL_PWS_Amady, Description: Detects password stealer DLL. Dropped by Amadey, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, Author: ditekSHen
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 88%
                      Reputation:moderate, very likely benign file
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......x.............@..........................@..........................................O.......&.... ..............................................................................................................CODE................................ ..`DATA................................@...BSS......................................idata..&...........................@....edata..O...........................@..P.reloc..............................@..P.rsrc........ ......................@..P.............@......................@..P................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                      Category:dropped
                      Size (bytes):95068
                      Entropy (8bit):7.918851174293143
                      Encrypted:false
                      SSDEEP:1536:CmbM4iTkYMKsGHObkbXmBRn052EGdH/LaAD5Y9xe4dHEdI2uhiVxp669M6bpt:hiI5GubLR+GhWr7bddpKhN
                      MD5:6F8C496BA629E10E2BBF21C5BB00EA7B
                      SHA1:3C6C25B7C07632F85DF4E651F68FB849852D354A
                      SHA-256:00012D0BE6FC61DFF5851A32B162F2FDBBD13E1289213DEF91DCD25AF1C57B4B
                      SHA-512:58F718FCB6A4D3B53024B9CC00502641259825705562472FDA199C8856C9EB5C258072AC616C06F5849BDA077B0F5B88F4EBDD2638AF179627D4AC623F7AEE06
                      Malicious:false
                      Reputation:low
                      Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\....xcS.m..#Hm.....T......<!...wq5...v1.?S.....rHj-.U:...5............|..+.......}...<.>...H.......Wo.CK`/l.1./...C...W.....,1....R.0.W.M.!.l7.~S....."SW.^..c......^s........u,-n....A..?.2.....l.(.?....7..~.q$.f..1\.q[.....oS:.gOY".....f-%.P.b.Z....>.....4+..b.Y&..F...)Pq.L....... .....H.#.|..).?.H.'.|....).?m.....h.t......|4.%...d....
                      Process:C:\Users\user\Desktop\file.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):430592
                      Entropy (8bit):6.163540154379331
                      Encrypted:false
                      SSDEEP:6144:YecLXGqxxoij2Fjzp5/bCgXhh6K9W9n6ded89kTt:Y1LGq3NA5/bvIK9W9nbac
                      MD5:2396925CC38BE4F07BD426CF080256CE
                      SHA1:8884E5383B3601E59089F0D287ACAD1EFF20C676
                      SHA-256:E91BB1F7C2B2FFD094D3915F1FFFBFE929EFD49E1D732B51D60E8A378A8A066B
                      SHA-512:D0622E928CAD41C185244CED7E0AC587B256B9A773F85D8ADEC807B4CDCBB73E55AB03AF3C8A8EA4A67BA347F9FE21A30515CB9A5AC871189B4AADC9442432A9
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L.....a.................n...P.......p............@.................................;e.......................................s..<.... ..............................................................0I..@............................................text...Vm.......n.................. ..`.data...${.......L...r..............@....wuve...............................@..@.bedicarp...........................@..@.rsrc........ ......................@..@.reloc..l............t..............@..B................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\file.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.163540154379331
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:430592
                      MD5:2396925cc38be4f07bd426cf080256ce
                      SHA1:8884e5383b3601e59089f0d287acad1eff20c676
                      SHA256:e91bb1f7c2b2ffd094d3915f1fffbfe929efd49e1d732b51d60e8a378a8a066b
                      SHA512:d0622e928cad41c185244ced7e0ac587b256b9a773f85d8adec807b4cdcbb73e55ab03af3c8a8ea4a67ba347f9fe21a30515cb9a5ac871189b4aadc9442432a9
                      SSDEEP:6144:YecLXGqxxoij2Fjzp5/bCgXhh6K9W9n6ded89kTt:Y1LGq3NA5/bvIK9W9nbac
                      TLSH:F194D0003299C6F1E3A21D375819DBE1E93BB82BF7245537F3582B6F6E3328157A2215
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......a.................n.
                      Icon Hash:8286dccea68c9ca4
                      Entrypoint:0x407096
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x6190B3DA [Sun Nov 14 06:59:38 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:eeffe9860bc9c6507e24465b9b5239be
                      Instruction
                      call 00007FD0B4BE489Ch
                      jmp 00007FD0B4BDEBFEh
                      mov edi, edi
                      push ebp
                      mov ebp, esp
                      sub esp, 28h
                      xor eax, eax
                      push ebx
                      mov ebx, dword ptr [ebp+0Ch]
                      push esi
                      mov esi, dword ptr [ebp+10h]
                      push edi
                      mov edi, dword ptr [ebp+08h]
                      mov byte ptr [ebp-08h], al
                      mov byte ptr [ebp-07h], al
                      mov byte ptr [ebp-06h], al
                      mov byte ptr [ebp-05h], al
                      mov byte ptr [ebp-04h], al
                      mov byte ptr [ebp-03h], al
                      mov byte ptr [ebp-02h], al
                      mov byte ptr [ebp-01h], al
                      cmp dword ptr [0044CB64h], eax
                      je 00007FD0B4BDED90h
                      push dword ptr [0044FB08h]
                      call 00007FD0B4BE37C8h
                      pop ecx
                      jmp 00007FD0B4BDED87h
                      mov eax, 0040CC48h
                      mov ecx, dword ptr [ebp+14h]
                      mov edx, 000000A6h
                      cmp ecx, edx
                      jg 00007FD0B4BDEEFAh
                      je 00007FD0B4BDEEE1h
                      cmp ecx, 19h
                      jg 00007FD0B4BDEE7Eh
                      je 00007FD0B4BDEE6Fh
                      mov edx, ecx
                      push 00000002h
                      pop ecx
                      sub edx, ecx
                      je 00007FD0B4BDEE53h
                      dec edx
                      je 00007FD0B4BDEE43h
                      sub edx, 05h
                      je 00007FD0B4BDEE2Bh
                      dec edx
                      je 00007FD0B4BDEE0Ch
                      sub edx, 05h
                      je 00007FD0B4BDEDF3h
                      dec edx
                      je 00007FD0B4BDEDC7h
                      sub edx, 09h
                      jne 00007FD0B4BDEF5Ah
                      mov dword ptr [ebp-28h], 00000003h
                      mov dword ptr [ebp-24h], 00401348h
                      fld qword ptr [edi]
                      lea ecx, dword ptr [ebp-28h]
                      fstp qword ptr [ebp-20h]
                      push ecx
                      fld qword ptr [ebx]
                      fstp qword ptr [ebp+00h]
                      Programming Language:
                      • [C++] VS2008 build 21022
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x173c40x3c.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x1a510.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d0000xda4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49300x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x19c.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x16d560x16e00False0.5955110143442623data6.70284422084366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x180000x37b240x34c00False0.5779074718601895data5.56923108020657IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .wuve0x500000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .bedicar0x510000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x520000x1a5100x1a600False0.6376073755924171data6.234348410854522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x6d0000x1c6c0x1e00False0.38958333333333334data3.8825877184339204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      AFX_DIALOG_LAYOUT0x6a4500x2dataSlovakSlovakia
                      AFX_DIALOG_LAYOUT0x6a4380x2dataSlovakSlovakia
                      AFX_DIALOG_LAYOUT0x6a4400xcdataSlovakSlovakia
                      SUXUMOWUDAKOLA0x682d00x2107ASCII text, with very long lines (8455), with no line terminatorsSlovakSlovakia
                      RT_CURSOR0x6a4580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                      RT_CURSOR0x6b3000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                      RT_CURSOR0x6bbd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0SlovakSlovakia
                      RT_CURSOR0x6bd000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0SlovakSlovakia
                      RT_ICON0x529900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                      RT_ICON0x530580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                      RT_ICON0x556000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                      RT_ICON0x55a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                      RT_ICON0x569400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                      RT_ICON0x571e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                      RT_ICON0x577500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                      RT_ICON0x59cf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                      RT_ICON0x5ada00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SlovakSlovakia
                      RT_ICON0x5b7280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                      RT_ICON0x5bbf80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                      RT_ICON0x5caa00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                      RT_ICON0x5d3480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                      RT_ICON0x5da100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                      RT_ICON0x5df780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                      RT_ICON0x605200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                      RT_ICON0x615c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                      RT_ICON0x61a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSlovakSlovakia
                      RT_ICON0x629400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSlovakSlovakia
                      RT_ICON0x631e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSlovakSlovakia
                      RT_ICON0x638b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSlovakSlovakia
                      RT_ICON0x63e180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SlovakSlovakia
                      RT_ICON0x663c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SlovakSlovakia
                      RT_ICON0x674680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SlovakSlovakia
                      RT_ICON0x67df00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SlovakSlovakia
                      RT_STRING0x6bfc80x546dataSlovakSlovakia
                      RT_ACCELERATOR0x6a3d80x40dataSlovakSlovakia
                      RT_GROUP_CURSOR0x6bba80x22dataSlovakSlovakia
                      RT_GROUP_CURSOR0x6bdb00x22dataSlovakSlovakia
                      RT_GROUP_ICON0x61a300x68dataSlovakSlovakia
                      RT_GROUP_ICON0x55a680x30dataSlovakSlovakia
                      RT_GROUP_ICON0x5bb900x68dataSlovakSlovakia
                      RT_GROUP_ICON0x682580x76dataSlovakSlovakia
                      RT_VERSION0x6bdd80x1f0MS Windows COFF PowerPC object fileSlovakSlovakia
                      None0x6a4180xadataSlovakSlovakia
                      None0x6a4280xadataSlovakSlovakia
                      DLLImport
                      KERNEL32.dllFillConsoleOutputCharacterA, GetCPInfo, GetProfileIntW, GetSystemDefaultLCID, GetModuleHandleW, WaitNamedPipeW, TlsSetValue, GetPriorityClass, GetVolumeInformationA, LoadLibraryW, IsProcessInJob, AssignProcessToJobObject, GetCalendarInfoW, GetFileAttributesA, TransactNamedPipe, WriteConsoleW, GetVolumePathNameA, CreateJobObjectA, GetVolumeNameForVolumeMountPointA, FillConsoleOutputCharacterW, GetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, SetFileAttributesA, LoadLibraryA, WriteConsoleA, GetProcessWorkingSetSize, LocalAlloc, OpenJobObjectW, FoldStringW, FoldStringA, FindFirstChangeNotificationA, GetFileInformationByHandle, FindActCtxSectionStringW, LCMapStringW, GetConsoleAliasesW, GetFullPathNameW, HeapFree, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, TlsGetValue, TlsAlloc, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleOutputCP, MultiByteToWideChar, SetStdHandle, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA, GetModuleHandleA, HeapSize, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetEndOfFile, GetProcessHeap, ReadFile
                      ADVAPI32.dllBackupEventLogW
                      Language of compilation systemCountry where language is spokenMap
                      SlovakSlovakia
                      No network behavior found

                      Click to jump to process

                      Target ID:0
                      Start time:10:31:56
                      Start date:09/12/2022
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\file.exe
                      Imagebase:0x400000
                      File size:430592 bytes
                      MD5 hash:2396925CC38BE4F07BD426CF080256CE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:1
                      Start time:10:32:03
                      Start date:09/12/2022
                      Path:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
                      Imagebase:0x400000
                      File size:430592 bytes
                      MD5 hash:2396925CC38BE4F07BD426CF080256CE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.293480849.00000000007CB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.271178795.0000000000680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Amadey, Description: Yara detected Amadey bot, Source: 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      Target ID:2
                      Start time:10:32:10
                      Start date:09/12/2022
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Imagebase:0x1050000
                      File size:185856 bytes
                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:3
                      Start time:10:32:10
                      Start date:09/12/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff745070000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:4
                      Start time:10:32:12
                      Start date:09/12/2022
                      Path:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      Imagebase:0x400000
                      File size:430592 bytes
                      MD5 hash:2396925CC38BE4F07BD426CF080256CE
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      No disassembly