Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:780218
MD5:6822f46b691d856777852b1342f294e1
SHA1:b4d772d60fc363234da23b6fa02175ff89561193
SHA256:912a8d4711001972a4d2234a5b34998afb3feebc9e1a76e4a36257c4980e4e5f
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 1416 cmdline: C:\Users\user\Desktop\file.exe MD5: 6822F46B691D856777852B1342F294E1)
    • file.exe (PID: 5124 cmdline: C:\Users\user\Desktop\file.exe MD5: 6822F46B691D856777852B1342F294E1)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • iihhevv (PID: 6080 cmdline: C:\Users\user\AppData\Roaming\iihhevv MD5: 6822F46B691D856777852B1342F294E1)
    • iihhevv (PID: 4664 cmdline: C:\Users\user\AppData\Roaming\iihhevv MD5: 6822F46B691D856777852B1342F294E1)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x4c63:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      1.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0.2.file.exe.2c415a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          1.0.file.exe.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            1.0.file.exe.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              12.2.iihhevv.2d215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 5 entries
                No Sigma rule has matched
                Timestamp:192.168.2.6185.246.221.15449701802851815 01/08/23-16:16:29.767212
                SID:2851815
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: file.exeReversingLabs: Detection: 43%
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 17%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 17%Perma Link
                Source: C:\Users\user\AppData\Roaming\iihhevvReversingLabs: Detection: 43%
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\iihhevvJoe Sandbox ML: detected
                Source: 1.0.file.exe.400000.2.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.2.unpackAvira: Label: TR/Patched.Gen
                Source: 1.0.file.exe.400000.3.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.1.unpackAvira: Label: TR/Patched.Gen
                Source: 1.0.file.exe.400000.1.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.0.unpackAvira: Label: TR/Patched.Gen
                Source: 1.0.file.exe.400000.0.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.3.unpackAvira: Label: TR/Patched.Gen
                Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: VC:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr
                Source: Binary string: C:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.6:49701 -> 185.246.221.154:80
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
                Source: Joe Sandbox ViewIP Address: 185.246.221.154 185.246.221.154
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wavjaq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 280Host: host-file-host6.com
                Source: explorer.exe, 00000003.00000000.375571444.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.335063212.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.291326238.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.312089796.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.349980053.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.318245571.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.356672976.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wavjaq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 280Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c415a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.iihhevv.2d215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.iihhevv.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: iihhevv, 0000000C.00000002.440038517.0000000002D9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_0040180C Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401818 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401822 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401826 Sleep,NtTerminateProcess,
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401834 Sleep,NtTerminateProcess,
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: file.exeReversingLabs: Detection: 43%
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevv
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevv
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevv
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\iihhevvJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/2
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DAD349 CreateToolhelp32Snapshot,Module32First,
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: VC:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr
                Source: Binary string: C:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DB30E8 pushad ; iretd
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DAE25C push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DAE247 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_004011D0 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_004011D7 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_004011EB push ebx; iretd
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\iihhevvJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\iihhevvJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\iihhevv:Zone.Identifier read attributes | delete

                Malware Analysis System Evasion

                barindex
                Source: iihhevv, 0000000D.00000002.453932968.00000000006DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 5496Thread sleep count: 662 > 30
                Source: C:\Windows\explorer.exe TID: 5476Thread sleep count: 295 > 30
                Source: C:\Windows\explorer.exe TID: 5484Thread sleep count: 307 > 30
                Source: C:\Windows\explorer.exe TID: 5484Thread sleep time: -30700s >= -30000s
                Source: C:\Windows\explorer.exe TID: 2980Thread sleep count: 486 > 30
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 662
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 486
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformation
                Source: explorer.exe, 00000003.00000000.336772992.00000000045B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000003.00000000.310501814.00000000081DD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000^
                Source: explorer.exe, 00000003.00000000.363530032.0000000006710000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                Source: explorer.exe, 00000003.00000000.344790577.0000000008304000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000003.00000000.344698254.00000000082B2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                Source: explorer.exe, 00000003.00000000.310942909.0000000008269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>&

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\iihhevvSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DACC26 push dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess queried: DebugPort

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: iihhevv.3.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\iihhevvSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\iihhevvSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 4E61930
                Source: C:\Users\user\AppData\Roaming\iihhevvThread created: unknown EIP: 4A41930
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevv
                Source: explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.335391872.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.293910023.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
                Source: explorer.exe, 00000003.00000000.304764006.0000000005D90000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.374808503.000000000835D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000003.00000000.335063212.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.291326238.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.335391872.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.293910023.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C0C7 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c415a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.iihhevv.2d215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.iihhevv.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c415a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.iihhevv.2d215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.iihhevv.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                312
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium2
                Non-Application Layer Protocol
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory411
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)312
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Hidden Files and Directories
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Software Packing
                Cached Domain Credentials4
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 780218 Sample: file.exe Startdate: 08/01/2023 Architecture: WINDOWS Score: 100 32 Snort IDS alert for network traffic 2->32 34 Multi AV Scanner detection for domain / URL 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 6 other signatures 2->38 7 file.exe 2->7         started        9 iihhevv 2->9         started        process3 signatures4 12 file.exe 7->12         started        48 Multi AV Scanner detection for dropped file 9->48 50 Machine Learning detection for dropped file 9->50 15 iihhevv 9->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 185.246.221.154, 49701, 80 LVLT-10753US Germany 17->26 28 host-host-file8.com 17->28 30 192.168.2.1 unknown unknown 17->30 22 C:\Users\user\AppData\Roaming\iihhevv, PE32 17->22 dropped 24 C:\Users\user\...\iihhevv:Zone.Identifier, ASCII 17->24 dropped 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Benign windows process drops PE files 17->42 44 Deletes itself after installation 17->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->46 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe44%ReversingLabsWin32.Trojan.MintZard
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\iihhevv100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\iihhevv44%ReversingLabsWin32.Trojan.MintZard
                SourceDetectionScannerLabelLinkDownload
                12.2.iihhevv.2d215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.2.iihhevv.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.2.unpack100%AviraTR/Patched.GenDownload File
                13.0.iihhevv.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.2.unpack100%AviraTR/Patched.GenDownload File
                1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.3.unpack100%AviraTR/Patched.GenDownload File
                0.2.file.exe.2c415a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.1.unpack100%AviraTR/Patched.GenDownload File
                1.0.file.exe.400000.1.unpack100%AviraTR/Patched.GenDownload File
                1.0.file.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.0.unpack100%AviraTR/Patched.GenDownload File
                1.0.file.exe.400000.0.unpack100%AviraTR/Patched.GenDownload File
                13.0.iihhevv.400000.3.unpack100%AviraTR/Patched.GenDownload File
                13.0.iihhevv.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com18%VirustotalBrowse
                host-host-file8.com18%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                185.246.221.154
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000000.375571444.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.335063212.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.291326238.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.312089796.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.349980053.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.318245571.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.356672976.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.246.221.154
                  host-file-host6.comGermany
                  10753LVLT-10753UStrue
                  IP
                  192.168.2.1
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:780218
                  Start date and time:2023-01-08 16:14:20 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 59s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:file.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:15
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@6/2@4/2
                  EGA Information:
                  • Successful, ratio: 75%
                  HDC Information:
                  • Successful, ratio: 64.2% (good quality ratio 54.5%)
                  • Quality average: 46.4%
                  • Quality standard deviation: 27.9%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                  • Execution Graph export aborted for target file.exe, PID 1416 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  16:16:29Task SchedulerRun new task: Firefox Default Browser Agent 922C23768694F6CB path: C:\Users\user\AppData\Roaming\iihhevv
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):270848
                  Entropy (8bit):6.5739942117768715
                  Encrypted:false
                  SSDEEP:3072:cXhXAmIhRLjEwlw57XEpyq5KqU8rZizWpb/Z/oKGIcJxIApxOE6idlUZNTKXWPrk:Yx2Lj27XuyGDZnRRHox36aaOuN
                  MD5:6822F46B691D856777852B1342F294E1
                  SHA1:B4D772D60FC363234DA23B6FA02175FF89561193
                  SHA-256:912A8D4711001972A4D2234A5B34998AFB3FEEBC9E1A76E4A36257C4980E4E5F
                  SHA-512:F101C484B300BD08966DD307CD6DE7C4156D7DD69F5F64E92AED189D8BDFD2A74836DE897F8A1B2B05A685287CDA0F1DFC2EEB0A3C979F8A6F51ADE78AD322F8
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 44%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u...............................x`.........1.....................Rich....................PE..L...0.Aa.................z...ry......_............@...........................z.....{........................................}..P.....y.`........................... ................................C..@............................................text...fx.......z.................. ..`.data....xw..........~..............@....rsrc...`.....y.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.5739942117768715
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:file.exe
                  File size:270848
                  MD5:6822f46b691d856777852b1342f294e1
                  SHA1:b4d772d60fc363234da23b6fa02175ff89561193
                  SHA256:912a8d4711001972a4d2234a5b34998afb3feebc9e1a76e4a36257c4980e4e5f
                  SHA512:f101c484b300bd08966dd307cd6de7c4156d7dd69f5f64e92aed189d8bdfd2a74836de897f8a1b2b05a685287cda0f1dfc2eeb0a3c979f8a6f51ade78ad322f8
                  SSDEEP:3072:cXhXAmIhRLjEwlw57XEpyq5KqU8rZizWpb/Z/oKGIcJxIApxOE6idlUZNTKXWPrk:Yx2Lj27XuyGDZnRRHox36aaOuN
                  TLSH:A1449C317692FC72C5D6053069549AF4EFBEBC639A20998327773A2F6E702D0523271B
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u......................................x`.........1...........................Rich....................PE..L...0.Aa...........
                  Icon Hash:9062e098c6e73144
                  Entrypoint:0x405fbf
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x6141B130 [Wed Sep 15 08:39:12 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:b49d1773872141620d6e88f1989600b7
                  Instruction
                  call 00007FE0E8E55A98h
                  jmp 00007FE0E8E4F80Eh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  push esi
                  mov esi, ecx
                  mov byte ptr [esi+0Ch], 00000000h
                  test eax, eax
                  jne 00007FE0E8E4F9F5h
                  call 00007FE0E8E55775h
                  mov dword ptr [esi+08h], eax
                  mov ecx, dword ptr [eax+6Ch]
                  mov dword ptr [esi], ecx
                  mov ecx, dword ptr [eax+68h]
                  mov dword ptr [esi+04h], ecx
                  mov ecx, dword ptr [esi]
                  cmp ecx, dword ptr [0042A358h]
                  je 00007FE0E8E4F9A4h
                  mov ecx, dword ptr [0042A274h]
                  test dword ptr [eax+70h], ecx
                  jne 00007FE0E8E4F999h
                  call 00007FE0E8E564ABh
                  mov dword ptr [esi], eax
                  mov eax, dword ptr [esi+04h]
                  cmp eax, dword ptr [0042A178h]
                  je 00007FE0E8E4F9A8h
                  mov eax, dword ptr [esi+08h]
                  mov ecx, dword ptr [0042A274h]
                  test dword ptr [eax+70h], ecx
                  jne 00007FE0E8E4F99Ah
                  call 00007FE0E8E55D1Fh
                  mov dword ptr [esi+04h], eax
                  mov eax, dword ptr [esi+08h]
                  test byte ptr [eax+70h], 00000002h
                  jne 00007FE0E8E4F9A6h
                  or dword ptr [eax+70h], 02h
                  mov byte ptr [esi+0Ch], 00000001h
                  jmp 00007FE0E8E4F99Ch
                  mov ecx, dword ptr [eax]
                  mov dword ptr [esi], ecx
                  mov eax, dword ptr [eax+04h]
                  mov dword ptr [esi+04h], eax
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  sub esp, 10h
                  push esi
                  push dword ptr [ebp+0Ch]
                  lea ecx, dword ptr [ebp-10h]
                  call 00007FE0E8E4F8FAh
                  mov esi, dword ptr [ebp+08h]
                  movsx eax, byte ptr [esi]
                  push eax
                  call 00007FE0E8E56753h
                  cmp eax, 65h
                  jmp 00007FE0E8E4F99Eh
                  inc esi
                  movzx eax, byte ptr [esi]
                  push eax
                  call 00007FE0E8E564FCh
                  test eax, eax
                  pop ecx
                  jne 00007FE0E8E4F983h
                  movsx eax, byte ptr [esi]
                  Programming Language:
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [C++] VS2008 build 21022
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x17dec0x50.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x27910000x18460.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43b80x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x178660x17a00False0.5363239914021164OpenPGP Public Key6.401558907932897IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x190000x27778f40x11e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x27910000x184600x18600False0.4745592948717949data5.255240516516851IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  AFX_DIALOG_LAYOUT0x27a6b580x2data
                  AFX_DIALOG_LAYOUT0x27a6b500x2data
                  AFX_DIALOG_LAYOUT0x27a6b600x2data
                  AFX_DIALOG_LAYOUT0x27a6b680x2data
                  AFX_DIALOG_LAYOUT0x27a6b700x2data
                  RT_CURSOR0x27a6b780x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
                  RT_CURSOR0x27a6cc00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
                  RT_CURSOR0x27a6df00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
                  RT_CURSOR0x27a6ee00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                  RT_CURSOR0x27a7fb80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                  RT_ICON0x27919e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishVenezuela
                  RT_ICON0x27920a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishVenezuela
                  RT_ICON0x27926100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishVenezuela
                  RT_ICON0x27936b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishVenezuela
                  RT_ICON0x2793b600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishVenezuela
                  RT_ICON0x2794a080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishVenezuela
                  RT_ICON0x27952b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishVenezuela
                  RT_ICON0x27959780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishVenezuela
                  RT_ICON0x2795ee00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SpanishVenezuela
                  RT_ICON0x27984880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SpanishVenezuela
                  RT_ICON0x27995300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SpanishVenezuela
                  RT_ICON0x2799eb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SpanishVenezuela
                  RT_ICON0x279a3980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishVenezuela
                  RT_ICON0x279b2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishVenezuela
                  RT_ICON0x279b9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishVenezuela
                  RT_ICON0x279be700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishVenezuela
                  RT_ICON0x279e4180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishVenezuela
                  RT_ICON0x279f4c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishVenezuela
                  RT_ICON0x279fe480x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishVenezuela
                  RT_ICON0x27a03180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a11c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a1a680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a21300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a26980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SpanishVenezuela
                  RT_ICON0x27a4c400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SpanishVenezuela
                  RT_ICON0x27a5ce80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SpanishVenezuela
                  RT_ICON0x27a66700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SpanishVenezuela
                  RT_STRING0x27a89c80x38cdataSpanishVenezuela
                  RT_STRING0x27a8d580x53cdataSpanishVenezuela
                  RT_STRING0x27a92980x1c8dataSpanishVenezuela
                  RT_GROUP_CURSOR0x27a6ca80x14data
                  RT_GROUP_CURSOR0x27a88600x14data
                  RT_GROUP_CURSOR0x27a7f880x30data
                  RT_GROUP_ICON0x279a3200x76dataSpanishVenezuela
                  RT_GROUP_ICON0x2793b200x3edataSpanishVenezuela
                  RT_GROUP_ICON0x27a02b00x68dataSpanishVenezuela
                  RT_GROUP_ICON0x27a6ad80x76dataSpanishVenezuela
                  RT_VERSION0x27a88780x150data
                  DLLImport
                  KERNEL32.dllGetModuleHandleA, CreateDirectoryExA, ReadConsoleInputA, GetTempPathW, GetCurrentDirectoryW, RemoveDirectoryW, OutputDebugStringA, GetProcAddress, LocalAlloc, GetBinaryTypeW, SearchPathA, VerifyVersionInfoA, GetProcessPriorityBoost, EndUpdateResourceW, FindNextFileW, FindFirstVolumeW, LocalFree, GlobalFlags, UpdateResourceW, CreateActCtxA, CopyFileW, InterlockedExchangeAdd, GetConsoleAliasW, VerSetConditionMask, CreateMutexA, DeactivateActCtx, GetDiskFreeSpaceA, MoveFileW, GetLogicalDriveStringsA, ResetEvent, MoveFileExW, CreateMailslotA, WriteConsoleInputA, QueryDosDeviceW, InterlockedDecrement, EnumTimeFormatsW, lstrcatW, FindFirstFileA, FreeEnvironmentStringsA, SetErrorMode, GetTickCount, SetLastError, AllocateUserPhysicalPages, GetPrivateProfileStructA, CopyFileExA, MoveFileWithProgressA, LoadLibraryA, GetLastError, DeleteFileA, GetStartupInfoW, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, HeapCreate, VirtualFree, HeapFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException, VirtualAlloc, HeapReAlloc, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile, HeapSize, CloseHandle, CreateFileA
                  GDI32.dllGetTextFaceA
                  WINHTTP.dllWinHttpWriteData
                  Language of compilation systemCountry where language is spokenMap
                  SpanishVenezuela
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  192.168.2.6185.246.221.15449701802851815 01/08/23-16:16:29.767212TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184970180192.168.2.6185.246.221.154
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 8, 2023 16:16:29.739099026 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.766792059 CET8049701185.246.221.154192.168.2.6
                  Jan 8, 2023 16:16:29.766920090 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.767211914 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.767230988 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.794193029 CET8049701185.246.221.154192.168.2.6
                  Jan 8, 2023 16:16:29.883445024 CET8049701185.246.221.154192.168.2.6
                  Jan 8, 2023 16:16:29.883548975 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.887500048 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.914516926 CET8049701185.246.221.154192.168.2.6
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 8, 2023 16:16:29.712198019 CET5320353192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:29.732367992 CET53532038.8.8.8192.168.2.6
                  Jan 8, 2023 16:16:29.955971956 CET5310753192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:30.945806980 CET5310753192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:32.171495914 CET5310753192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:33.983520031 CET53531078.8.8.8192.168.2.6
                  Jan 8, 2023 16:16:35.964303017 CET53531078.8.8.8192.168.2.6
                  Jan 8, 2023 16:16:36.202774048 CET53531078.8.8.8192.168.2.6
                  TimestampSource IPDest IPChecksumCodeType
                  Jan 8, 2023 16:16:35.964509010 CET192.168.2.68.8.8.8cff9(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jan 8, 2023 16:16:29.712198019 CET192.168.2.68.8.8.80x43e5Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:29.955971956 CET192.168.2.68.8.8.80x6b76Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:30.945806980 CET192.168.2.68.8.8.80x6b76Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:32.171495914 CET192.168.2.68.8.8.80x6b76Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 8, 2023 16:16:29.732367992 CET8.8.8.8192.168.2.60x43e5No error (0)host-file-host6.com185.246.221.154A (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:33.983520031 CET8.8.8.8192.168.2.60x6b76Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:35.964303017 CET8.8.8.8192.168.2.60x6b76Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:36.202774048 CET8.8.8.8192.168.2.60x6b76Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  • wavjaq.org
                    • host-file-host6.com

                  Click to jump to process

                  Target ID:0
                  Start time:16:15:16
                  Start date:08/01/2023
                  Path:C:\Users\user\Desktop\file.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\file.exe
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:16:15:24
                  Start date:08/01/2023
                  Path:C:\Users\user\Desktop\file.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\file.exe
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:3
                  Start time:16:15:33
                  Start date:08/01/2023
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff647860000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:high

                  Target ID:12
                  Start time:16:16:29
                  Start date:08/01/2023
                  Path:C:\Users\user\AppData\Roaming\iihhevv
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\iihhevv
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 44%, ReversingLabs
                  Reputation:low

                  Target ID:13
                  Start time:16:16:42
                  Start date:08/01/2023
                  Path:C:\Users\user\AppData\Roaming\iihhevv
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\iihhevv
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  No disassembly