Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Stub.exe

Overview

General Information

Sample Name:Stub.exe
Analysis ID:778238
MD5:da5c4dbbc80ca5da70237ef8bc281476
SHA1:c6689884e4bf3360fceacbdaff09d211cef3a49d
SHA256:4981bda443713f5cecb9df4d163cd62f1bd038cb897895bb2f81015796676371
Tags:AsyncRATexe
Infos:

Detection

AsyncRAT
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Yara detected AsyncRAT
Snort IDS alert for network traffic
Yara detected Generic Downloader
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Creates a window with clipboard capturing capabilities
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • Stub.exe (PID: 5484 cmdline: C:\Users\user\Desktop\Stub.exe MD5: DA5C4DBBC80CA5DA70237EF8BC281476)
  • cleanup
{"Server": "egrh.linkpc.net", "Port": "5505", "Version": "| Edit 3LOSH RAT", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "true"}
SourceRuleDescriptionAuthorStrings
Stub.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Stub.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Stub.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xd0e6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      Stub.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xd054:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xec38:$a2: Stub.exe
      • 0xecc8:$a2: Stub.exe
      • 0x940c:$a3: get_ActivatePong
      • 0xd26c:$a4: vmware
      • 0xd0e4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0xa49d:$a6: get_SslClient
      SourceRuleDescriptionAuthorStrings
      dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x3ea:$x1: AsyncRAT
      • 0x428:$x1: AsyncRAT
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xa7bb:$x1: AsyncRAT
      • 0xa7f9:$x1: AsyncRAT
      00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x5a7:$x1: AsyncRAT
      • 0x5e5:$x1: AsyncRAT
      00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x5a7:$x1: AsyncRAT
      • 0x5e5:$x1: AsyncRAT
      00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xcee6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        0.0.Stub.exe.50000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.Stub.exe.50000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.0.Stub.exe.50000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xd0e6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            0.0.Stub.exe.50000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xd054:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xec38:$a2: Stub.exe
            • 0xecc8:$a2: Stub.exe
            • 0x940c:$a3: get_ActivatePong
            • 0xd26c:$a4: vmware
            • 0xd0e4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0xa49d:$a6: get_SslClient
            No Sigma rule has matched
            Timestamp:142.202.240.108192.168.2.35505496892030673 01/05/23-09:16:11.192042
            SID:2030673
            Source Port:5505
            Destination Port:49689
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:142.202.240.108192.168.2.35505496892035595 01/05/23-09:16:11.192042
            SID:2035595
            Source Port:5505
            Destination Port:49689
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Stub.exeAvira: detected
            Source: Stub.exeJoe Sandbox ML: detected
            Source: 0.0.Stub.exe.50000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "egrh.linkpc.net", "Port": "5505", "Version": "| Edit 3LOSH RAT", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "true"}
            Source: Stub.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Stub.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2035595 ET TROJAN Generic AsyncRAT Style SSL Cert 142.202.240.108:5505 -> 192.168.2.3:49689
            Source: TrafficSnort IDS: 2030673 ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server) 142.202.240.108:5505 -> 192.168.2.3:49689
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Malware configuration extractorURLs: egrh.linkpc.net
            Source: global trafficTCP traffic: 192.168.2.3:49689 -> 142.202.240.108:5505
            Source: Stub.exe, 00000000.00000002.510490105.00000000049AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: Stub.exe, 00000000.00000003.256955733.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
            Source: Stub.exe, 00000000.00000003.256955733.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, Stub.exe, 00000000.00000003.257540314.00000000006A9000.00000004.00000020.00020000.00000000.sdmp, Stub.exe, 00000000.00000003.257743735.00000000006A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/G
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: Stub.exe, 00000000.00000003.257368805.00000000049B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab33
            Source: Stub.exe, 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: unknownDNS traffic detected: queries for: egrh.linkpc.net

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Stub.exeWindow created: window name: CLIPBRDWNDCLASS

            System Summary

            barindex
            Source: Stub.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Stub.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000003.384798750.000000000061D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000003.432092160.0000000000631000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Stub.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Stub.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Stub.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000003.384798750.000000000061D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000003.432092160.0000000000631000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Stub.exe, 00000000.00000002.510626345.0000000004BE9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Stub.exe
            Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_0098C51C
            Source: Stub.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Stub.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: Stub.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Stub.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\Stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: Stub.exe, eGlSQbxmQMrQhm/plUQqHPHKqQ.csBase64 encoded string: 'laukwBCTjYRoqHFCmAt9kjzyfCkFf18LOnFD55PbbIYaigees0liP+EQECnHEGgsV/dSMIxuUxZJha8SsnKbpA==', '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', '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
            Source: 0.0.Stub.exe.50000.0.unpack, eGlSQbxmQMrQhm/plUQqHPHKqQ.csBase64 encoded string: 'laukwBCTjYRoqHFCmAt9kjzyfCkFf18LOnFD55PbbIYaigees0liP+EQECnHEGgsV/dSMIxuUxZJha8SsnKbpA==', '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', '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
            Source: C:\Users\user\Desktop\Stub.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
            Source: classification engineClassification label: mal92.troj.evad.winEXE@1/2@1/1
            Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Stub.exe, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: Stub.exe, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.Stub.exe.50000.0.unpack, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.Stub.exe.50000.0.unpack, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: Stub.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Stub.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Stub.exe, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: fbPMNBgcthZje System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: Stub.exe, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: QCOFEyuSJQQB System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: Stub.exe, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: CeqMJMrYMRORV System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.Stub.exe.50000.0.unpack, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: fbPMNBgcthZje System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.Stub.exe.50000.0.unpack, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: QCOFEyuSJQQB System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.Stub.exe.50000.0.unpack, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: CeqMJMrYMRORV System.Reflection.Assembly System.AppDomain::Load(System.Byte[])

            Boot Survival

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Stub.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: Stub.exeBinary or memory string: SBIEDLL.DLLM\B(BC1|[13])[A-ZA-HJ-NP-Z0-9]{26,45}\B
            Source: C:\Users\user\Desktop\Stub.exeWindow / User API: threadDelayed 9730
            Source: C:\Users\user\Desktop\Stub.exe TID: 5740Thread sleep time: -30000s >= -30000s
            Source: C:\Users\user\Desktop\Stub.exe TID: 6036Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\Stub.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\Stub.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\Stub.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\Stub.exeFile Volume queried: C:\ FullSizeInformation
            Source: Stub.exeBinary or memory string: vmware
            Source: Stub.exe, 00000000.00000002.511377724.0000000005DD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWM
            Source: Stub.exe, 00000000.00000002.511377724.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.510401327.000000000497F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Stub.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\Stub.exeMemory allocated: page read and write | page guard
            Source: Stub.exe, 00000000.00000002.508379142.000000000257D000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.508407256.0000000002588000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.508461952.00000000025AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Users\user\Desktop\Stub.exe VolumeInformation
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\Stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: Stub.exe, 00000000.00000002.510401327.000000000497F000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000003.259928413.0000000005EC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\Stub.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            1
            Process Injection
            1
            Disable or Modify Tools
            OS Credential Dumping1
            Query Registry
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts1
            Scheduled Task/Job
            Boot or Logon Initialization Scripts1
            Scheduled Task/Job
            21
            Virtualization/Sandbox Evasion
            LSASS Memory121
            Security Software Discovery
            Remote Desktop Protocol1
            Clipboard Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Process Injection
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Obfuscated Files or Information
            NTDS21
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureScheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
            Software Packing
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
            Remote System Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Stub.exe100%AviraTR/Dropper.Gen
            Stub.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            0.0.Stub.exe.50000.0.unpack100%AviraTR/Dropper.GenDownload File
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            egrh.linkpc.net
            142.202.240.108
            truefalse
              high
              windowsupdatebg.s.llnwi.net
              41.63.96.128
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                egrh.linkpc.netfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameStub.exe, 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    142.202.240.108
                    egrh.linkpc.netReserved
                    143151GSERVERSUSfalse
                    Joe Sandbox Version:36.0.0 Rainbow Opal
                    Analysis ID:778238
                    Start date and time:2023-01-05 09:15:14 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 4m 55s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:Stub.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal92.troj.evad.winEXE@1/2@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • TCP Packets have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 8.238.88.254, 8.238.85.126, 8.253.207.121, 8.248.113.254, 8.238.85.254, 209.197.3.8, 93.184.221.240
                    • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: Stub.exe
                    TimeTypeDescription
                    09:16:12API Interceptor2x Sleep call for process: Stub.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\Stub.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62932 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                    Category:dropped
                    Size (bytes):62932
                    Entropy (8bit):7.9958071285043335
                    Encrypted:true
                    SSDEEP:1536:pvl2gmukMiArbge/oKIxf+Q9yNJLaRCfIElhUuDz:pvl2gmZhpehIxfJsJLawfIElhUu3
                    MD5:FC4666CBCA561E864E7FDF883A9E6661
                    SHA1:2F8D6094C7A34BF12EA0BBF0D51EE9C5BB7939A5
                    SHA-256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B
                    SHA-512:C71F54B571E01F247F072BE4BBEBDF5D8410B67EB79A61E7E0D9853FE857AB9BD12F53E6AF3394B935560178107291FC4BE351B27DEB388EBA90BA949633D57D
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:MSCF............,...................I.................oU.s .authroot.stl......5..CK..8U[...q.yL;sf!d.D..."2."C...2....RRRHnT...\...!2.)QQ*2..nN.\7.....lgYk;.^.....}..h4.....Kc.cG.q.tY..Drg<..G.D....c.qnx..G.......r.8.....w...;.Q6..o.xf:f..:NL[.`..]I.@ ,W..J..Qf.z9.<.../.D.p:0R...#..I,.%.+."...B.n)...[Y=.,0...R.#..G5..2..]........$p..3.M.O...._L.......g.....?=.J..!...G~.#.J:.Wj.........9(:..g.8,.o.b...3..C..t.7L=..+~%pc...%..b(.q.......F.'...@~P .6CA.(d.Z~..6....=.).9......A........p...Gy....7U.L....S...^.R.T.p...R..:.hr./..8...a&p.l(....g.3a)...[.M..v.......g,.U..l.F..._kJv.4.rG.{.K.6.X.rz.8.r..&..G.j..p".z...L...EUX.......;...Y.................j}..FrT.,J3.d?T.T}Q..hn.?.4F...~K...........'...c...X,.v..yk..0._.j|.(.q4k1....^b..6...z..\9'}.%.*...S.[..D.k....J.../D$.#..O.o~%S.9u....|61.........~....Q+.w.e....7}..:.....^.p.mKm._9v......'.3T..bY3..9a..p.'1..Lx.O.g..J5w+.r..K.R.P.....E0bf*r...c..;...`.j...i.;y.C..#|L.e.(.....w.X'...z../.-...c.......
                    Process:C:\Users\user\Desktop\Stub.exe
                    File Type:data
                    Category:modified
                    Size (bytes):328
                    Entropy (8bit):3.1786749463541457
                    Encrypted:false
                    SSDEEP:6:kK3dh+qz7ksN+SkQlPlEGYRMY9z+4KlDA3RUe+OGNglcy:fTUkPlE99SNxAhUefblcy
                    MD5:2E0F10B259BAF2EE99431DF49C886A0B
                    SHA1:0708B9E03DE5A9A7637F4461D840EDC9E4414A6A
                    SHA-256:1333401AA1A0F6D497C63B5B1D1E01F2595FD0380CB2A984102A65E6B26B6023
                    SHA-512:76C6D7BDF682AEAB9104A81F0BE7E92EA452A68F4AC13741380DF10BCF878DC35895E16FAADD62C7437B41647A457E7E56C4FBDBF0E3EA6F1505D11BAAE0CD59
                    Malicious:false
                    Reputation:low
                    Preview:p...... ...........i)!..(....................................................... .........g.%.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.a.1.6.7.1.3.2.5.4.d.9.1.:.0."...
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.627060592579058
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Stub.exe
                    File size:62464
                    MD5:da5c4dbbc80ca5da70237ef8bc281476
                    SHA1:c6689884e4bf3360fceacbdaff09d211cef3a49d
                    SHA256:4981bda443713f5cecb9df4d163cd62f1bd038cb897895bb2f81015796676371
                    SHA512:40210ddddaae84fa45d758831491cc3b609c3194862f8fad8938e713fa5033eaf473c44bb0bc345ea46fc302264f5628b6793339bf0cb5f2aea2c316a0c115f4
                    SSDEEP:1536:+/KCnABwEttYQuT68QKzWbVSDRDZLbxx:+/KrBwEttYm8BabVSjLVx
                    TLSH:EE532B043BE9C129F1BE8F709DF376444AB9F1677906DA0E1CD451DA0622BC68A427EF
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c............................^.... ... ....@.. .......................`............@................................
                    Icon Hash:00828e8e8686b000
                    Entrypoint:0x41075e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x633700E3 [Fri Sep 30 14:44:51 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1070c0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x7ff.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xe7640xe800False0.5357623922413793data5.673338999412451IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x120000x7ff0x800False0.41650390625data4.884866150337139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x140000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_VERSION0x120a00x2ccdata
                    RT_MANIFEST0x1236c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    142.202.240.108192.168.2.35505496892030673 01/05/23-09:16:11.192042TCP2030673ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)550549689142.202.240.108192.168.2.3
                    142.202.240.108192.168.2.35505496892035595 01/05/23-09:16:11.192042TCP2035595ET TROJAN Generic AsyncRAT Style SSL Cert550549689142.202.240.108192.168.2.3
                    TimestampSource PortDest PortSource IPDest IP
                    Jan 5, 2023 09:16:10.446110964 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:10.608800888 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:10.609150887 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:11.019267082 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:11.192042112 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:11.192109108 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:11.192358017 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:11.211710930 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:11.376323938 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:11.420284033 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:14.210656881 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:14.413397074 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:14.413630962 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:14.616478920 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:24.083786011 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:24.287956953 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:24.288218021 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:24.450222969 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:24.499444008 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:24.660866022 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:24.702743053 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:25.105531931 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:25.319370985 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:25.319547892 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:25.522351980 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:33.945424080 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:34.147113085 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:34.147206068 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:34.309361935 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:34.359613895 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:34.520828962 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:34.556056976 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:34.771938086 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:34.774681091 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:34.990674973 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:37.736253977 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:37.781907082 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:37.943053961 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:37.985011101 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:43.769193888 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:43.974895954 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:43.975084066 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:44.137037039 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:44.188657999 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:44.349960089 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:44.367060900 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:44.568764925 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:44.568924904 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:44.771676064 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:53.594084978 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:53.802622080 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:53.802706003 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:53.964433908 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:54.017430067 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:54.178270102 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:54.220592976 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:54.596527100 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:54.802869081 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:16:54.803147078 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:16:55.005819082 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:03.475423098 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:03.677582026 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:03.677704096 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:03.840008974 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:03.893325090 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:04.054852962 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:04.086241007 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:04.302668095 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:04.305140018 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:04.521357059 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:07.741579056 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:07.784228086 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:07.945435047 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:08.003063917 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:13.312128067 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:13.521106005 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:13.521403074 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:13.684165955 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:13.737871885 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:13.899128914 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:13.941026926 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:14.171483040 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:14.380517960 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:14.382247925 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:14.599172115 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:23.155992031 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:23.380219936 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:23.380513906 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:23.543056965 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:23.598146915 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:23.759288073 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:23.776537895 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:23.989550114 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:23.989643097 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:24.192562103 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:33.781151056 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:33.989244938 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:33.989427090 CET496895505192.168.2.3142.202.240.108
                    Jan 5, 2023 09:17:34.164716005 CET550549689142.202.240.108192.168.2.3
                    Jan 5, 2023 09:17:34.208254099 CET496895505192.168.2.3142.202.240.108
                    TimestampSource PortDest PortSource IPDest IP
                    Jan 5, 2023 09:16:10.250736952 CET5986953192.168.2.38.8.8.8
                    Jan 5, 2023 09:16:10.373781919 CET53598698.8.8.8192.168.2.3
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jan 5, 2023 09:16:10.250736952 CET192.168.2.38.8.8.80xd24cStandard query (0)egrh.linkpc.netA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jan 5, 2023 09:16:10.373781919 CET8.8.8.8192.168.2.30xd24cNo error (0)egrh.linkpc.net142.202.240.108A (IP address)IN (0x0001)false
                    Jan 5, 2023 09:16:23.498951912 CET8.8.8.8192.168.2.30x2082No error (0)windowsupdatebg.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)false
                    Jan 5, 2023 09:16:23.973170042 CET8.8.8.8192.168.2.30x96f9No error (0)windowsupdatebg.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)false
                    No statistics
                    Target ID:0
                    Start time:09:16:03
                    Start date:05/01/2023
                    Path:C:\Users\user\Desktop\Stub.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\Stub.exe
                    Imagebase:0x50000
                    File size:62464 bytes
                    MD5 hash:DA5C4DBBC80CA5DA70237EF8BC281476
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.384798750.000000000061D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.432092160.0000000000631000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low

                    No disassembly