Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LwNdQo4zIk.exe

Overview

General Information

Sample Name:LwNdQo4zIk.exe
Analysis ID:778226
MD5:3ccd6b369eb1dde57d181e7550bd7268
SHA1:aee399e263c838570c00133feab275b81009e12a
SHA256:f5717aef9a4323816387603920b652a94ac0d9cedef36391cedd9cdcbfef7f60
Tags:32exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Drops PE files
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • LwNdQo4zIk.exe (PID: 1792 cmdline: C:\Users\user\Desktop\LwNdQo4zIk.exe MD5: 3CCD6B369EB1DDE57D181E7550BD7268)
    • rundll32.exe (PID: 5472 cmdline: "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LwNdQo4zIk.exeVirustotal: Detection: 49%Perma Link
Source: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpReversingLabs: Detection: 50%
Source: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpVirustotal: Detection: 64%Perma Link
Source: LwNdQo4zIk.exeJoe Sandbox ML: detected
Source: 0.2.LwNdQo4zIk.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A7759 CryptAcquireContextA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB9D1 CryptDeriveKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B01AF CryptExportKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B035E CryptDestroyKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B056E CryptReleaseContext,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA67F CryptAcquireContextA,CryptAcquireContextA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AF6E3 CryptExportKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA75C CryptEncrypt,CryptEncrypt,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA7D8 CryptDestroyKey,CryptDestroyKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA80E CryptReleaseContext,CryptReleaseContext,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA9DE CryptBinaryToStringA,CryptBinaryToStringA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C2A13 CryptBinaryToStringA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AFA91 CryptExportKey,CryptExportKey,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A5B70 CryptBinaryToStringA,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AEB1B CryptGenKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96B6D8 CryptHashData,LoadLibraryW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D979484 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D980486 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D980CD9 CryptDestroyKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D987CD1 CryptReleaseContext,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D99140C CryptDeriveKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D97279D HttpSendRequestW,CryptReleaseContext,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D973F01 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D968F2B CryptDeriveKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9D9750 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D98AF62 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9646B5 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D972EF8 GetProcAddress,CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9EC13D CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96C080 CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D97E812 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D989035 CryptReleaseContext,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D980283 CryptReleaseContext,GetProcAddress,GetProcAddress,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D987ADA CryptDeriveKey,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96EAE5 CryptGetHashParam,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D98321F CryptHashData,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D971A58 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9B6A70 CryptEncrypt,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96CA64 CryptEncrypt,

Compliance

barindex
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack
Source: LwNdQo4zIk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
Source: Binary string: C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: Binary string: >h6C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B7085 InternetReadFile,

System Summary

barindex
Source: 00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: LwNdQo4zIk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004FA0B0
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B4115
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB2C2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C13A5
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004DE3A7
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A067F
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004DD9E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D99213A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9A822C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96CA64
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp 20DC61C5456EA5756F432AEBECF74660ACEBF5ACE0F7C8D1B360757ED79075D8
Source: LwNdQo4zIk.exeStatic PE information: Section: .data ZLIB complexity 0.9918356461560528
Source: LwNdQo4zIk.exeVirustotal: Detection: 49%
Source: LwNdQo4zIk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B1333 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: unknownProcess created: C:\Users\user\Desktop\LwNdQo4zIk.exe C:\Users\user\Desktop\LwNdQo4zIk.exe
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile created: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpJump to behavior
Source: classification engineClassification label: mal84.evad.winEXE@3/1@0/0
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
Source: LwNdQo4zIk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: Binary string: >h6C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F7054 push 004E123Eh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F0321 push 004ED2FBh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D6483 push 0046B803h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D85D5 push 004C899Fh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004EB75E push 004D3CB3h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A7759 push dword ptr [004FCE43h]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004EA92F push 004DAC2Fh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F59CA push 004B1D5Fh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB9D1 push 0046C15Ah; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046FE63 push 00469E02h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C8FA2 push 004ADFCDh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C8FA2 push 004B29F4h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00491044 push 0046B803h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F3042 push 004BACA2h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0047E048 push 004F3C92h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A5057 push 004A4A45h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AC057 push 004A024Ch; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00494069 push 0046CDFCh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0049B068 push 0046CDFCh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046D063 push 0046AD57h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0049806C push dword ptr [004FC7DBh]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C5069 push 004ADFCDh; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046F07F push dword ptr [004FD207h]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0047B07B push 00469E02h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D300B push dword ptr [004FD567h]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00480001 push dword ptr [004FC7DBh]; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004CD000 push 004A0557h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B8005 push 004AC2A1h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00474016 push 0046C15Ah; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B701A push 004F3C92h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D1013 push 004B06B3h; ret
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile created: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeAPI coverage: 9.2 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.4 %
Source: rundll32.exe, 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: NtSetInformationWorkerFactoryTpSetDefaultPoolStackInformationDosDateTimeToFileTimeSetCurrentDirectoryWHkOleRegisterObjectSetProgmanW
Source: LwNdQo4zIk.exe, 00000000.00000002.309915707.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, Pyupydeoe.tmp.0.drBinary or memory string: #NtSetInformationWorkerFactoryTpSetDefaultPoolStackInformationDosDateTimeToFileTimeSetCurrentDirectoryWHkOleRegisterObjectSetProgmanWindowMicrosoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.ni.dllSystem.Collections.dllInkSeg.dll0123456789abcdefCNB_0336.DLLMicrosoft.Windows.Diagnosis.Commands.WriteDiagProgress.dllmsscp.dllOSProvider.dllapi-ms-win-core-localization-l1-1-0.dllmscorier.dll0123456789abcdef
Source: rundll32.exe, 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: SetProgmanW
Source: LwNdQo4zIk.exe, 00000000.00000002.309915707.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, Pyupydeoe.tmp.0.drBinary or memory string: SetProgmanWindow
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004ADA35 GetLocalTime,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception2
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts22
Software Packing
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LwNdQo4zIk.exe49%VirustotalBrowse
LwNdQo4zIk.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp50%ReversingLabsWin32.Trojan.Lazy
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp64%VirustotalBrowse
SourceDetectionScannerLabelLinkDownload
0.2.LwNdQo4zIk.exe.2330e67.1.unpack100%AviraHEUR/AGEN.1215478Download File
0.2.LwNdQo4zIk.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
0.3.LwNdQo4zIk.exe.2450000.0.unpack100%AviraHEUR/AGEN.1215478Download File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:778226
Start date and time:2023-01-05 08:51:27 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 21s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:LwNdQo4zIk.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal84.evad.winEXE@3/1@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\LwNdQo4zIk.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):803328
Entropy (8bit):6.89627808323015
Encrypted:false
SSDEEP:24576:l8Jr+SgWH5UB/VdYQ/N7WqpWaQxYZYBsFn:OJrSBYqLY
MD5:C50C2F17112B6C6B0892CB2C1F502108
SHA1:3DD1444384BF790F5AA90AE95EF7745FA4CFAF72
SHA-256:20DC61C5456EA5756F432AEBECF74660ACEBF5ACE0F7C8D1B360757ED79075D8
SHA-512:BFBFC3A13816A12E25C373F6739215B9DFF559FECFDF26C3358A452BDC833B6EAA64BBAE316F4B29B9E9CE802E9F50C66B533C8C3C1B372025A7F0B7D8B452F1
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 50%
  • Antivirus: Virustotal, Detection: 64%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e:..![.@![.@![.@.,.A&[.@.,.A [.@L..A"[.@![.@5[.@.D.@([.@...A [.@...A [.@...A [.@Rich![.@................PE..L.....c...........!.........................................................p............@.............................@.......<................................{......................................................@............................text...p........................... ..`.rdata..............................@..@.data...01.......2..................@....reloc...{.......|..................@..B........................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.853487844881012
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:LwNdQo4zIk.exe
File size:1034752
MD5:3ccd6b369eb1dde57d181e7550bd7268
SHA1:aee399e263c838570c00133feab275b81009e12a
SHA256:f5717aef9a4323816387603920b652a94ac0d9cedef36391cedd9cdcbfef7f60
SHA512:00bd3bb981e2a5bd4c30241025f352e9e528d76300e67fcdbe89ee9e12ecbba73b291aebd9b73f73a8aaa32e2a8b2d1b4d49796cdc11a1b891a313cf0a9dcc03
SSDEEP:24576:RFOWvM7bZBFpXlDpRjJ5JAXVm359Ov9UIrczuX:RguWRNpRjJPgAp9ucz
TLSH:B7251201329194A7C1CA6A3C4930E7F02D7FBCF29D7CE187EB643A1E9E706B14A55687
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................;.Y.......Z.......L.......................K.......[.......^.....Rich............................PE..L....7.b...
Icon Hash:9062e090c6e73144
Entrypoint:0x40600e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x620337B3 [Wed Feb 9 03:40:35 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:7bca87c7309353055aed194207c93e99
Instruction
call 00007F9A3C5343C9h
jmp 00007F9A3C52ECEEh
int3
int3
int3
int3
int3
int3
int3
int3
mov edx, dword ptr [esp+0Ch]
mov ecx, dword ptr [esp+04h]
test edx, edx
je 00007F9A3C52EEDBh
xor eax, eax
mov al, byte ptr [esp+08h]
test al, al
jne 00007F9A3C52EE88h
cmp edx, 00000100h
jc 00007F9A3C52EE80h
cmp dword ptr [0050CFACh], 00000000h
je 00007F9A3C52EE77h
jmp 00007F9A3C53447Dh
push edi
mov edi, ecx
cmp edx, 04h
jc 00007F9A3C52EEA3h
neg ecx
and ecx, 03h
je 00007F9A3C52EE7Eh
sub edx, ecx
mov byte ptr [edi], al
add edi, 01h
sub ecx, 01h
jne 00007F9A3C52EE68h
mov ecx, eax
shl eax, 08h
add eax, ecx
mov ecx, eax
shl eax, 10h
add eax, ecx
mov ecx, edx
and edx, 03h
shr ecx, 02h
je 00007F9A3C52EE78h
rep stosd
test edx, edx
je 00007F9A3C52EE7Ch
mov byte ptr [edi], al
add edi, 01h
sub edx, 01h
jne 00007F9A3C52EE68h
mov eax, dword ptr [esp+08h]
pop edi
ret
mov eax, dword ptr [esp+04h]
ret
int3
int3
int3
int3
int3
int3
push ebp
mov ebp, esp
push edi
push esi
mov esi, dword ptr [ebp+0Ch]
mov ecx, dword ptr [ebp+10h]
mov edi, dword ptr [ebp+08h]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007F9A3C52EE7Ah
cmp edi, eax
jc 00007F9A3C52F01Ah
cmp ecx, 00000100h
jc 00007F9A3C52EE91h
cmp dword ptr [0050CFACh], 00000000h
je 00007F9A3C52EE88h
push edi
push esi
and edi, 0Fh
Programming Language:
  • [ASM] VS2008 build 21022
  • [ C ] VS2008 build 21022
  • [IMP] VS2005 build 50727
  • [C++] VS2008 build 21022
  • [RES] VS2008 build 21022
  • [LNK] VS2008 build 21022
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x16dec0x3c.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x10d0000xbcb0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43a00x40.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x168500x16a00False0.5431198204419889data6.3410785244090935IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x180000xf4fb40xd9e00False0.9918356461560528data7.991407419226785IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x10d0000xbcb00xbe00False0.38569078947368424data4.2370546659086274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
AFX_DIALOG_LAYOUT0x1160a00x2data
AFX_DIALOG_LAYOUT0x1160980x2data
AFX_DIALOG_LAYOUT0x1160a80x2data
AFX_DIALOG_LAYOUT0x1160b00x2data
AFX_DIALOG_LAYOUT0x1160b80x2data
RT_CURSOR0x1160c00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
RT_CURSOR0x1162080x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
RT_CURSOR0x1163380xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
RT_CURSOR0x1164280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
RT_CURSOR0x1175000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
RT_ICON0x10d6e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SerbianItaly
RT_ICON0x10dda80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SerbianItaly
RT_ICON0x10e3100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SerbianItaly
RT_ICON0x10f3b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SerbianItaly
RT_ICON0x10f8600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSerbianItaly
RT_ICON0x1107080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSerbianItaly
RT_ICON0x110fb00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSerbianItaly
RT_ICON0x1116780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSerbianItaly
RT_ICON0x111be00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SerbianItaly
RT_ICON0x1141880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SerbianItaly
RT_ICON0x1152300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SerbianItaly
RT_ICON0x115bb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SerbianItaly
RT_STRING0x117f180xeadataSerbianItaly
RT_STRING0x1180080x348dataSerbianItaly
RT_STRING0x1183500x682dataSerbianItaly
RT_STRING0x1189d80x2d8dataSerbianItaly
RT_GROUP_CURSOR0x1161f00x14data
RT_GROUP_CURSOR0x117da80x14data
RT_GROUP_CURSOR0x1174d00x30data
RT_GROUP_ICON0x1160200x76dataSerbianItaly
RT_GROUP_ICON0x10f8200x3edataSerbianItaly
RT_VERSION0x117dc00x154Encore not stripped - version 79
DLLImport
KERNEL32.dllGetConsoleAliasW, GetModuleHandleW, CreateDirectoryExW, ReadConsoleInputW, GetTempPathW, GetSystemDirectoryW, RemoveDirectoryW, OutputDebugStringA, GetProcAddress, LocalAlloc, GetBinaryTypeA, SearchPathA, VerifyVersionInfoA, SetProcessPriorityBoost, EndUpdateResourceA, FindNextFileW, FindFirstVolumeA, LocalShrink, GlobalFlags, _llseek, UpdateResourceA, CreateActCtxW, CopyFileW, AddConsoleAliasW, CreateMutexA, GetCurrentActCtx, GetDiskFreeSpaceA, MoveFileW, GetLogicalDriveStringsA, SetEvent, MoveFileExA, CreateMailslotA, WriteConsoleInputA, TerminateThread, GetCurrentProcess, RtlCaptureContext, InterlockedCompareExchange, GetFileTime, lstrcatA, FindFirstFileW, FreeEnvironmentStringsA, SetErrorMode, InterlockedExchangeAdd, MoveFileWithProgressA, GetTickCount, SetLastError, GetPrivateProfileStructW, VerSetConditionMask, LoadLibraryA, GetLastError, DeleteFileA, GetStartupInfoW, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleA, HeapFree, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException, VirtualAlloc, HeapReAlloc, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile, HeapSize, CloseHandle, CreateFileA
GDI32.dllSetBrushOrgEx
Language of compilation systemCountry where language is spokenMap
SerbianItaly
No network behavior found

Click to jump to process

Target ID:0
Start time:08:52:18
Start date:05/01/2023
Path:C:\Users\user\Desktop\LwNdQo4zIk.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\LwNdQo4zIk.exe
Imagebase:0x400000
File size:1034752 bytes
MD5 hash:3CCD6B369EB1DDE57D181E7550BD7268
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Yara matches:
  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
Reputation:low

Target ID:1
Start time:08:52:23
Start date:05/01/2023
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Imagebase:0xa0000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly