Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:791306
MD5:209dca1a9633807b9cf36d6447f972da
SHA1:c4235ac91cd8e3c0e70ede54e43f857709f00859
SHA256:2004da2c60d73a66c6feffe50f130483750da799b90a78c76da90f61208101e6
Tags:exe
Infos:

Detection

Nymaim
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Obfuscated command line found
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Contains functionality to launch a program with higher privileges
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 408 cmdline: C:\Users\user\Desktop\file.exe MD5: 209DCA1A9633807B9CF36D6447F972DA)
    • file.tmp (PID: 3600 cmdline: "C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmp" /SL5="$4025C,1578849,54272,C:\Users\user\Desktop\file.exe" MD5: D76329B30DB65F61D55B20F36B56DA26)
      • finalrecovery.exe (PID: 6024 cmdline: "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" MD5: 04947B1020E31A5F5A6E41FD279B4E74)
        • wEQg8.exe (PID: 5996 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 68 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 3092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 1336 cmdline: taskkill /im "finalrecovery.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.12.253.56", "45.12.253.72", "45.12.253.98", "45.12.253.75"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.322664682.00000000019A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000002.00000002.321983093.0000000000400000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.finalrecovery.exe.19a0000.3.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
        2.2.finalrecovery.exe.400000.1.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          2.2.finalrecovery.exe.19a0000.3.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            2.2.finalrecovery.exe.400000.1.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              No Sigma rule has matched
              Timestamp:45.12.253.72192.168.2.380497022852925 01/25/23-10:17:06.150578
              SID:2852925
              Source Port:80
              Destination Port:49702
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\wEQg8.exeReversingLabs: Detection: 60%
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeJoe Sandbox ML: detected
              Source: 1.2.file.tmp.400000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 0.2.file.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 0.3.file.exe.23c75c8.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 1.0.file.tmp.4b375c.3.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 0.3.file.exe.21db608.3.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 1.2.file.tmp.4b375c.3.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 2.2.finalrecovery.exe.19a0000.3.raw.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.12.253.56", "45.12.253.72", "45.12.253.98", "45.12.253.75"]}
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_0045C524 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045C524
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_0045C5D8 ArcFourCrypt,1_2_0045C5D8
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_0045C5F0 ArcFourCrypt,1_2_0045C5F0
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,2_2_00403770

              Compliance

              barindex
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeUnpacked PE file: 2.2.finalrecovery.exe.400000.1.unpack
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_00473B80 FindFirstFileA,FindNextFileA,FindClose,1_2_00473B80
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_00451DC0 FindFirstFileA,GetLastError,1_2_00451DC0
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_004963A0 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004963A0
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_00463080 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463080
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_004634FC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004634FC
              Source: C:\Users\user\AppData\Local\Temp\is-P0SS2.tmp\file.tmpCode function: 1_2_00461AF4 FindFirstFileA,FindNextFileA,FindClose,1_2_00461AF4
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,2_2_00404490
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00423DAD FindFirstFileExW,2_2_00423DAD
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10007E39 FindFirstFileExW,2_2_10007E39

              Networking

              barindex
              Source: TrafficSnort IDS: 2852925 ETPRO TROJAN GCleaner Downloader - Payload Response 45.12.253.72:80 -> 192.168.2.3:49702
              Source: Malware configuration extractorIPs: 45.12.253.56
              Source: Malware configuration extractorIPs: 45.12.253.72
              Source: Malware configuration extractorIPs: 45.12.253.98
              Source: Malware configuration extractorIPs: 45.12.253.75
              Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
              Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
              Source: Joe Sandbox ViewIP Address: 45.12.253.72 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001746000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001746000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000002.322403889.0000000001771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinte
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001746000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinteY
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinteeF
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/puk.php
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/stuk.php
              Source: finalrecovery.exe, 00000002.00000002.322403889.0000000001771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/stuk.php2N
              Source: finalrecovery.exe, 00000002.00000003.262404075.000000000179B000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.317221588.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000002.322403889.0000000001746000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.311035551.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.304961528.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.280683373.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.268319049.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.292827662.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.298815858.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.286801187.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.274580019.000000000179D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.75/dll.php
              Source: finalrecovery.exe, 00000002.00000003.311035551.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.304961528.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.298815858.000000000179D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.75/dll.phpK
              Source: finalrecovery.exe, 00000002.00000003.262404075.000000000179B000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.317221588.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.311035551.000000000179D000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.304961528.000000000179D000.00000004.00000020.00