Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LwNdQo4zIk.exe

Overview

General Information

Sample Name:LwNdQo4zIk.exe
Analysis ID:778226
MD5:3ccd6b369eb1dde57d181e7550bd7268
SHA1:aee399e263c838570c00133feab275b81009e12a
SHA256:f5717aef9a4323816387603920b652a94ac0d9cedef36391cedd9cdcbfef7f60
Tags:32exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Drops PE files
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • LwNdQo4zIk.exe (PID: 6072 cmdline: C:\Users\user\Desktop\LwNdQo4zIk.exe MD5: 3CCD6B369EB1DDE57D181E7550BD7268)
    • rundll32.exe (PID: 1568 cmdline: "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5192 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 960 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.249983417.000000000217D000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.250162242.0000000002260000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LwNdQo4zIk.exeVirustotal: Detection: 49%Perma Link
Source: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpReversingLabs: Detection: 50%
Source: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpVirustotal: Detection: 64%Perma Link
Source: LwNdQo4zIk.exeJoe Sandbox ML: detected
Source: 0.2.LwNdQo4zIk.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A7759 CryptAcquireContextA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB9D1 CryptDeriveKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B01AF CryptExportKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B035E CryptDestroyKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B056E CryptReleaseContext,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA67F CryptAcquireContextA,CryptAcquireContextA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AF6E3 CryptExportKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA75C CryptEncrypt,CryptEncrypt,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA7D8 CryptDestroyKey,CryptDestroyKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA80E CryptReleaseContext,CryptReleaseContext,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA9DE CryptBinaryToStringA,CryptBinaryToStringA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C2A13 CryptBinaryToStringA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AFA91 CryptExportKey,CryptExportKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A5B70 CryptBinaryToStringA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AEB1B CryptGenKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A8D87 CryptBinaryToStringA,GetTempPathW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D51140C CryptDeriveKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D507CD1 CryptReleaseContext,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D500CD9 CryptDestroyKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4F9484 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D500486 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D50AF62 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4F3F01 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4E8F2B CryptDeriveKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4F279D HttpSendRequestW,CryptReleaseContext,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4E46B5 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4FE812 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D509035 CryptReleaseContext,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4EC080 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4F1A58 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D536A70 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4ECA64 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D507ADA CryptDeriveKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4EEAE5 CryptGetHashParam,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D500283 CryptReleaseContext,GetProcAddress,GetProcAddress,

Compliance

barindex
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack
Source: LwNdQo4zIk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
Source: Binary string: C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: Binary string: >h6C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B7085 InternetReadFile,

System Summary

barindex
Source: 00000000.00000002.249983417.000000000217D000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.250162242.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: LwNdQo4zIk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000000.00000002.249983417.000000000217D000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.250162242.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 960
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004FA0B0
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B4115
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB2C2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C13A5
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004DE3A7
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A067F
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004DD9E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D51213A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D4ECA64
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D52822C
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp 20DC61C5456EA5756F432AEBECF74660ACEBF5ACE0F7C8D1B360757ED79075D8
Source: LwNdQo4zIk.exeStatic PE information: Section: .data ZLIB complexity 0.9918356461560528
Source: LwNdQo4zIk.exeVirustotal: Detection: 49%
Source: LwNdQo4zIk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B1333 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: unknownProcess created: C:\Users\user\Desktop\LwNdQo4zIk.exe C:\Users\user\Desktop\LwNdQo4zIk.exe
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 960
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1568
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile created: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpJump to behavior
Source: classification engineClassification label: mal84.evad.winEXE@4/5@0/1
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
Source: LwNdQo4zIk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: Binary string: >h6C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F7054 push 004E123Eh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F0321 push 004ED2FBh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D6483 push 0046B803h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D85D5 push 004C899Fh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004EB75E push 004D3CB3h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A7759 push dword ptr [004FCE43h]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004EA92F push 004DAC2Fh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F59CA push 004B1D5Fh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB9D1 push 0046C15Ah; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046FE63 push 00469E02h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C8FA2 push 004ADFCDh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C8FA2 push 004B29F4h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00491044 push 0046B803h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F3042 push 004BACA2h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0047E048 push 004F3C92h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A5057 push 004A4A45h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AC057 push 004A024Ch; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00494069 push 0046CDFCh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0049B068 push 0046CDFCh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046D063 push 0046AD57h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0049806C push dword ptr [004FC7DBh]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C5069 push 004ADFCDh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046F07F push dword ptr [004FD207h]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0047B07B push 00469E02h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D300B push dword ptr [004FD567h]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00480001 push dword ptr [004FC7DBh]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004CD000 push 004A0557h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B8005 push 004AC2A1h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00474016 push 0046C15Ah; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B701A push 004F3C92h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D1013 push 004B06B3h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile created: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeAPI coverage: 6.5 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.5 %
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 136000
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: rundll32.exe, 00000001.00000002.760368357.000000006D58B000.00000004.00000001.01000000.00000004.sdmp, rundll32.exe, 00000001.00000000.258771674.000000006D58B000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: NtSetInformationWorkerFactoryTpSetDefaultPoolStackInformationDosDateTimeToFileTimeSetCurrentDirectoryWHkOleRegisterObjectSetProgmanW
Source: LwNdQo4zIk.exe, 00000000.00000002.250562734.00000000030D0000.00000004.00001000.00020000.00000000.sdmp, Pyupydeoe.tmp.0.drBinary or memory string: #NtSetInformationWorkerFactoryTpSetDefaultPoolStackInformationDosDateTimeToFileTimeSetCurrentDirectoryWHkOleRegisterObjectSetProgmanWindowMicrosoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.ni.dllSystem.Collections.dllInkSeg.dll0123456789abcdefCNB_0336.DLLMicrosoft.Windows.Diagnosis.Commands.WriteDiagProgress.dllmsscp.dllOSProvider.dllapi-ms-win-core-localization-l1-1-0.dllmscorier.dll0123456789abcdef
Source: rundll32.exe, 00000001.00000002.760368357.000000006D58B000.00000004.00000001.01000000.00000004.sdmp, rundll32.exe, 00000001.00000000.258771674.000000006D58B000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: SetProgmanW
Source: LwNdQo4zIk.exe, 00000000.00000002.250562734.00000000030D0000.00000004.00001000.00020000.00000000.sdmp, Pyupydeoe.tmp.0.drBinary or memory string: SetProgmanWindow
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004ADA35 GetLocalTime,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception2
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Rundll32
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script22
Software Packing
LSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials3
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LwNdQo4zIk.exe49%VirustotalBrowse
LwNdQo4zIk.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp50%ReversingLabsWin32.Trojan.Lazy
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp64%VirustotalBrowse
SourceDetectionScannerLabelLinkDownload
0.2.LwNdQo4zIk.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
0.3.LwNdQo4zIk.exe.2380000.0.unpack100%AviraHEUR/AGEN.1215478Download File
0.2.LwNdQo4zIk.exe.2260e67.1.unpack100%AviraHEUR/AGEN.1215478Download File
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
IP
192.168.2.1
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:778226
Start date and time:2023-01-05 08:42:09 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 8m 36s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:LwNdQo4zIk.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal84.evad.winEXE@4/5@0/1
EGA Information:
  • Successful, ratio: 100%
HDC Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.20
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, watson.telemetry.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
08:43:03API Interceptor86x Sleep call for process: rundll32.exe modified
08:43:16API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.9238031503162372
Encrypted:false
SSDEEP:96:LPFHcXy6iX0iLoy1j95ax7JRFpXIW/a/z+HbHg/BQAS/YyNl4ttPMLUE+im2kMnj:LNcHiX0oXO5jed+C8/u7sZS274ItWc
MD5:1BFEB11058C8F0BB373CB6CF153A0778
SHA1:263132033BE2FBF13326D18014ED6CBA5679F552
SHA-256:694A8F25313033647A0C215339A032A3940384A34D0E7D447C59E36756EBEEEA
SHA-512:CDB59ECE2D4485EBD8222FE367BFDD6F1546421A09F44DA4F22E05512417ABF72660048006E577AF13B70A9AA18E176599FD0057E1C925E83B8D253A3441B0BB
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.7.4.1.0.5.8.8.4.8.3.2.6.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.7.4.1.0.5.8.9.3.7.3.9.0.4.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.b.1.7.9.b.1.-.a.3.0.0.-.4.a.2.d.-.8.0.1.7.-.5.1.d.4.1.d.1.0.b.b.f.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.2.8.f.3.c.0.e.-.d.1.9.6.-.4.c.4.2.-.8.c.4.3.-.5.6.6.6.5.e.d.f.b.c.f.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.6.2.0.-.0.0.0.1.-.0.0.1.f.-.e.6.7.1.-.4.f.c.7.2.4.2.1.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Thu Jan 5 16:43:08 2023, 0x1205a4 type
Category:dropped
Size (bytes):99428
Entropy (8bit):1.6906140255429625
Encrypted:false
SSDEEP:384:aoicjB5LbBGIyA59HVt1L62vdK7NUar8N4T43BK2ui:aYVbBGTYtVfLRdK7No3BFu
MD5:50780291C9621B13A4FF8623A2BBE2BB
SHA1:5A73D82C6DBF3E863F6AC117D9DE94D8CAAC23A2
SHA-256:0C7A8AD55D77C57B7A192A76445261FFDDD8DD3896D429D08B878962E3246F2D
SHA-512:2836EAA3E4558D345BAA04D466A04CA9CC6CEBF35DEA0A513DE9BDEA27ECCA0A346BAD5A0F310C8B67D40A74A11DEFC9D8DAFDBE85279C92E56BD539C228D9C6
Malicious:false
Reputation:low
Preview:MDMP....... ..........c....................................$...............bD..........`.......8...........T...........0&..4^.......................!...................................................................U...........B......<"......GenuineIntelW...........T....... ......c.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):5888
Entropy (8bit):3.7191879909123386
Encrypted:false
SSDEEP:96:RtIU6o7r3GLt3inf06gY8QuSfGEapBCaM4Ur89bcnsfUN0m:Rrl7r3GLNif06gYTuS6Cprr89bcnsfUb
MD5:6ADF754C003723A03EE3A377256262C0
SHA1:10F5D103CACFDC38016B3A8D8CA16BEB0687476E
SHA-256:CAA6CF56E6C7847994B0CEB900043FEC303314BD9FAACEE1B16464656D5FD1C4
SHA-512:E620B88362E1B03905FEDF5C8670901D1E3BF2FCF317043BDD7646E7D8DC4E1B368F0E00B058DC71F0F56A33B7184D78D75654BBAF76C1E41F24F75FCC36B283
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.5.6.8.<./.P.i.d.>.......
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4616
Entropy (8bit):4.436378949362253
Encrypted:false
SSDEEP:48:cvIwSD8zsYJgtWI98W4kWgc8sqYjw8fm8M4JCdsTFMFK+q8/4FfySy4SrS6d:uITfeHW49grsqYBJxFbhFryDW6d
MD5:BD57B1779CA954969A44C07B14C99F29
SHA1:5EFB3672ACAB54E84E6D9CBFF14EE6F534631DC6
SHA-256:122D9C4B8656D30AB71091F342FA7A541AFF9B1822D6306404344BCEEEBB4C66
SHA-512:3726035D23C0F86A97513B3875AEAF9001F85615C85F963EFB2802C6A543EED535BC64E96E1BC374B3FB1486AB71D3AC7CEA2DFCF0D70AC626B0424E1E72BC70
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1854833" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
Process:C:\Users\user\Desktop\LwNdQo4zIk.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):803328
Entropy (8bit):6.89627808323015
Encrypted:false
SSDEEP:24576:l8Jr+SgWH5UB/VdYQ/N7WqpWaQxYZYBsFn:OJrSBYqLY
MD5:C50C2F17112B6C6B0892CB2C1F502108
SHA1:3DD1444384BF790F5AA90AE95EF7745FA4CFAF72
SHA-256:20DC61C5456EA5756F432AEBECF74660ACEBF5ACE0F7C8D1B360757ED79075D8
SHA-512:BFBFC3A13816A12E25C373F6739215B9DFF559FECFDF26C3358A452BDC833B6EAA64BBAE316F4B29B9E9CE802E9F50C66B533C8C3C1B372025A7F0B7D8B452F1
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 50%
  • Antivirus: Virustotal, Detection: 64%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e:..![.@![.@![.@.,.A&[.@.,.A [.@L..A"[.@![.@5[.@.D.@([.@...A [.@...A [.@...A [.@Rich![.@................PE..L.....c...........!.........................................................p............@.............................@.......<................................{......................................................@............................text...p........................... ..`.rdata..............................@..@.data...01.......2..................@....reloc...{.......|..................@..B........................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.853487844881012
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:LwNdQo4zIk.exe
File size:1034752
MD5:3ccd6b369eb1dde57d181e7550bd7268
SHA1:aee399e263c838570c00133feab275b81009e12a
SHA256:f5717aef9a4323816387603920b652a94ac0d9cedef36391cedd9cdcbfef7f60
SHA512:00bd3bb981e2a5bd4c30241025f352e9e528d76300e67fcdbe89ee9e12ecbba73b291aebd9b73f73a8aaa32e2a8b2d1b4d49796cdc11a1b891a313cf0a9dcc03
SSDEEP:24576:RFOWvM7bZBFpXlDpRjJ5JAXVm359Ov9UIrczuX:RguWRNpRjJPgAp9ucz
TLSH:B7251201329194A7C1CA6A3C4930E7F02D7FBCF29D7CE187EB643A1E9E706B14A55687
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................;.Y.......Z.......L.......................K.......[.......^.....Rich............................PE..L....7.b...
Icon Hash:9062e090c6e73144
Entrypoint:0x40600e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x620337B3 [Wed Feb 9 03:40:35 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:7bca87c7309353055aed194207c93e99
Instruction
call 00007FB8E8AE26A9h
jmp 00007FB8E8ADCFCEh
int3
int3
int3
int3
int3
int3
int3
int3
mov edx, dword ptr [esp+0Ch]
mov ecx, dword ptr [esp+04h]
test edx, edx
je 00007FB8E8ADD1BBh
xor eax, eax
mov al, byte ptr [esp+08h]
test al, al
jne 00007FB8E8ADD168h
cmp edx, 00000100h
jc 00007FB8E8ADD160h
cmp dword ptr [0050CFACh], 00000000h
je 00007FB8E8ADD157h
jmp 00007FB8E8AE275Dh
push edi
mov edi, ecx
cmp edx, 04h
jc 00007FB8E8ADD183h
neg ecx
and ecx, 03h
je 00007FB8E8ADD15Eh
sub edx, ecx
mov byte ptr [edi], al
add edi, 01h
sub ecx, 01h
jne 00007FB8E8ADD148h
mov ecx, eax
shl eax, 08h
add eax, ecx
mov ecx, eax
shl eax, 10h
add eax, ecx
mov ecx, edx
and edx, 03h
shr ecx, 02h
je 00007FB8E8ADD158h
rep stosd
test edx, edx
je 00007FB8E8ADD15Ch
mov byte ptr [edi], al
add edi, 01h
sub edx, 01h
jne 00007FB8E8ADD148h
mov eax, dword ptr [esp+08h]
pop edi
ret
mov eax, dword ptr [esp+04h]
ret
int3
int3
int3
int3
int3
int3
push ebp
mov ebp, esp
push edi
push esi
mov esi, dword ptr [ebp+0Ch]
mov ecx, dword ptr [ebp+10h]
mov edi, dword ptr [ebp+08h]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007FB8E8ADD15Ah
cmp edi, eax
jc 00007FB8E8ADD2FAh
cmp ecx, 00000100h
jc 00007FB8E8ADD171h
cmp dword ptr [0050CFACh], 00000000h
je 00007FB8E8ADD168h
push edi
push esi
and edi, 0Fh
Programming Language:
  • [ASM] VS2008 build 21022
  • [ C ] VS2008 build 21022
  • [IMP] VS2005 build 50727
  • [C++] VS2008 build 21022
  • [RES] VS2008 build 21022
  • [LNK] VS2008 build 21022
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x16dec0x3c.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x10d0000xbcb0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43a00x40.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x168500x16a00False0.5431198204419889data6.3410785244090935IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x180000xf4fb40xd9e00False0.9918356461560528data7.991407419226785IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x10d0000xbcb00xbe00False0.38569078947368424data4.2370546659086274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
AFX_DIALOG_LAYOUT0x1160a00x2data
AFX_DIALOG_LAYOUT0x1160980x2data
AFX_DIALOG_LAYOUT0x1160a80x2data
AFX_DIALOG_LAYOUT0x1160b00x2data
AFX_DIALOG_LAYOUT0x1160b80x2data
RT_CURSOR0x1160c00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
RT_CURSOR0x1162080x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
RT_CURSOR0x1163380xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
RT_CURSOR0x1164280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
RT_CURSOR0x1175000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
RT_ICON0x10d6e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SerbianItaly
RT_ICON0x10dda80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SerbianItaly
RT_ICON0x10e3100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SerbianItaly
RT_ICON0x10f3b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SerbianItaly
RT_ICON0x10f8600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSerbianItaly
RT_ICON0x1107080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSerbianItaly
RT_ICON0x110fb00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSerbianItaly
RT_ICON0x1116780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSerbianItaly
RT_ICON0x111be00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SerbianItaly
RT_ICON0x1141880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SerbianItaly
RT_ICON0x1152300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SerbianItaly
RT_ICON0x115bb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SerbianItaly
RT_STRING0x117f180xeadataSerbianItaly
RT_STRING0x1180080x348dataSerbianItaly
RT_STRING0x1183500x682dataSerbianItaly
RT_STRING0x1189d80x2d8dataSerbianItaly
RT_GROUP_CURSOR0x1161f00x14data
RT_GROUP_CURSOR0x117da80x14data
RT_GROUP_CURSOR0x1174d00x30data
RT_GROUP_ICON0x1160200x76dataSerbianItaly
RT_GROUP_ICON0x10f8200x3edataSerbianItaly
RT_VERSION0x117dc00x154Encore not stripped - version 79
DLLImport
KERNEL32.dllGetConsoleAliasW, GetModuleHandleW, CreateDirectoryExW, ReadConsoleInputW, GetTempPathW, GetSystemDirectoryW, RemoveDirectoryW, OutputDebugStringA, GetProcAddress, LocalAlloc, GetBinaryTypeA, SearchPathA, VerifyVersionInfoA, SetProcessPriorityBoost, EndUpdateResourceA, FindNextFileW, FindFirstVolumeA, LocalShrink, GlobalFlags, _llseek, UpdateResourceA, CreateActCtxW, CopyFileW, AddConsoleAliasW, CreateMutexA, GetCurrentActCtx, GetDiskFreeSpaceA, MoveFileW, GetLogicalDriveStringsA, SetEvent, MoveFileExA, CreateMailslotA, WriteConsoleInputA, TerminateThread, GetCurrentProcess, RtlCaptureContext, InterlockedCompareExchange, GetFileTime, lstrcatA, FindFirstFileW, FreeEnvironmentStringsA, SetErrorMode, InterlockedExchangeAdd, MoveFileWithProgressA, GetTickCount, SetLastError, GetPrivateProfileStructW, VerSetConditionMask, LoadLibraryA, GetLastError, DeleteFileA, GetStartupInfoW, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleA, HeapFree, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException, VirtualAlloc, HeapReAlloc, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile, HeapSize, CloseHandle, CreateFileA
GDI32.dllSetBrushOrgEx
Language of compilation systemCountry where language is spokenMap
SerbianItaly
No network behavior found

Click to jump to process

Target ID:0
Start time:08:42:57
Start date:05/01/2023
Path:C:\Users\user\Desktop\LwNdQo4zIk.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\LwNdQo4zIk.exe
Imagebase:0x400000
File size:1034752 bytes
MD5 hash:3CCD6B369EB1DDE57D181E7550BD7268
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Yara matches:
  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.249983417.000000000217D000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.250162242.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
Reputation:low

Target ID:1
Start time:08:43:03
Start date:05/01/2023
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Imagebase:0x1020000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:3
Start time:08:43:07
Start date:05/01/2023
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 960
Imagebase:0xc90000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly