Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764043
MD5:71f3a21ccd6e54f8178d3fb65f4849b9
SHA1:b24f88c179a8e0777bffbcc4c9f969fb4d32d148
SHA256:7dbb8aa3f00f0f0d24acf0b1bdb73d05f422e90fd46c2a6fed0b44fe9a0a721a
Tags:exe
Infos:

Detection

Nymaim
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 3748 cmdline: C:\Users\user\Desktop\file.exe MD5: 71F3A21CCD6E54F8178D3FB65F4849B9)
    • is-I19BM.tmp (PID: 5936 cmdline: "C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmp" /SL4 $30366 "C:\Users\user\Desktop\file.exe" 2214542 96256 MD5: 2C3832FDF847813369EC960CD39C8265)
      • ntFolders.exe (PID: 4824 cmdline: "C:\Program Files (x86)\PrintFolders\ntFolders.exe" MD5: D9A39F6C4EEDC8F1B89E30D35012D6B4)
        • karcA17.exe (PID: 412 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 5776 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "ntFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\ntFolders.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 4212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 5920 cmdline: taskkill /im "ntFolders.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.393868626.0000000001740000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000002.00000002.393249857.0000000000400000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      00000002.00000002.394218193.0000000003160000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
        SourceRuleDescriptionAuthorStrings
        2.2.ntFolders.exe.400000.0.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          2.2.ntFolders.exe.3160000.4.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            2.2.ntFolders.exe.3160000.4.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              2.2.ntFolders.exe.400000.0.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
                No Sigma rule has matched
                Timestamp:192.168.2.445.139.105.17149691802041920 12/09/22-11:02:15.223774
                SID:2041920
                Source Port:49691
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:107.182.129.235192.168.2.480496922852925 12/09/22-11:02:15.529889
                SID:2852925
                Source Port:80
                Destination Port:49692
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://171.22.30.106/library.phpURL Reputation: Label: malware
                Source: http://171.22.30.106/library.phpHAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\karcA17.exeReversingLabs: Detection: 50%
                Source: C:\Program Files (x86)\PrintFolders\ntFolders.exeJoe Sandbox ML: detected
                Source: 0.0.file.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
                Source: 0.3.file.exe.2118000.4.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: 0.2.file.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
                Source: 2.2.ntFolders.exe.10000000.6.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 2.2.ntFolders.exe.3160000.4.raw.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130
                Source: C:\Program Files (x86)\PrintFolders\ntFolders.exeCode function: 2_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,2_2_00403770

                Compliance

                barindex
                Source: C:\Program Files (x86)\PrintFolders\ntFolders.exeUnpacked PE file: 2.2.ntFolders.exe.400000.0.unpack
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: Binary string: E:\DATA\Codework\PrintFolders\source\Release\Russian.pdb source: is-RBTTG.tmp.1.dr
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_0046C770 FindFirstFileA,FindNextFileA,FindClose,1_2_0046C770
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_00474708 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00474708
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_00451554 FindFirstFileA,GetLastError,1_2_00451554
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_0048A778 FindFirstFileA,6D7069D0,FindNextFileA,FindClose,1_2_0048A778
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_004729D4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_004729D4
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_0045CA54 FindFirstFileA,FindNextFileA,FindClose,1_2_0045CA54
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_00406FEC FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,1_2_00406FEC
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_0045DB60 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045DB60
                Source: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpCode function: 1_2_0045DEF4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045DEF4
                Source: C:\Program Files (x86)\PrintFolders\ntFolders.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,2_2_00404490
                Source: C:\Program Files (x86)\PrintFolders\ntFolders.exeCode function: 2_2_00423E2D FindFirstFileExW,2_2_00423E2D
                Source: C:\Program Files (x86)\PrintFolders\ntFolders.exeCode function: 2_2_1000959D FindFirstFileExW,2_2_1000959D
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-2JDIE.tmp\is-I19BM.tmpJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\Jump to behavior

                Networking

                barindex
                Source: TrafficSnort IDS: 2041920 ET TROJAN GCleaner Downloader Activity M8 192.168.2.4:49691 -> 45.139.105.171:80
                Source: TrafficSnort IDS: 2852925 ETPRO TROJAN GCleaner Downloader - Payload Response 107.182.129.235:80 -> 192.168.2.4:49692
                Source: Malware configuration extractorIPs: 45.139.105.1
                Source: Malware configuration extractorIPs: 85.31.46.167
                Source: Malware configuration extractorIPs: 107.182.129.235
                Source: Malware configuration extractorIPs: 171.22.30.106
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewIP Address: 45.139.105.171 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: ntFolders.exe, 00000002.00000002.394014970.0000000001844000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.182.129.235/storage/extension.php
                Source: ntFolders.exe, 00000002.00000002.394014970.0000000001844000.00000004.00000020.00020000.00000000.sdmpString found