Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Roqwnrsun.exe

Overview

General Information

Sample Name:Roqwnrsun.exe
Analysis ID:800709
MD5:1d261c332666240f0713f05e3b92de0d
SHA1:7f95ea4fbb56c5286d9016a4bcd156ba0425f814
SHA256:dfa4b25bb9a1534192d30dc3f10acd6a72c21a36bfaecae14c5d7a22dff88fd5
Tags:exe
Infos:

Detection

AgentTesla, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected MSILDownloaderGeneric
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains method to dynamically call methods (often used by packers)
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Stores files to the Windows start menu directory
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Roqwnrsun.exe (PID: 1020 cmdline: C:\Users\user\Desktop\Roqwnrsun.exe MD5: 1D261C332666240F0713F05E3B92DE0D)
    • powershell.exe (PID: 6100 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 4024 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Roqwnrsun.exeSUSP_PE_Discord_Attachment_Oct21_1Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)Florian Roth (Nextron Systems)
  • 0xd9f:$x1: https://cdn.discordapp.com/attachments/
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exeSUSP_PE_Discord_Attachment_Oct21_1Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)Florian Roth (Nextron Systems)
  • 0xd9f:$x1: https://cdn.discordapp.com/attachments/
SourceRuleDescriptionAuthorStrings
00000000.00000002.322551472.0000000002D1C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.333301358.0000000005980000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      0000000C.00000002.518667553.00000000029C8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Roqwnrsun.exe.5980000.5.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.0.Roqwnrsun.exe.9e0000.0.unpackSUSP_PE_Discord_Attachment_Oct21_1Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)Florian Roth (Nextron Systems)
              • 0xd9f:$x1: https://cdn.discordapp.com/attachments/
              12.2.MSBuild.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.Roqwnrsun.exe.3ec6f58.3.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.2.Roqwnrsun.exe.3e26f38.4.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    No Sigma rule has matched
                    Timestamp:162.159.130.233192.168.2.3443497002022640 02/07/23-18:31:24.294252
                    SID:2022640
                    Source Port:443
                    Destination Port:49700
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.3132.226.247.7349703802039190 02/07/23-18:31:57.442136
                    SID:2039190
                    Source Port:49703
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:162.159.130.233192.168.2.3443497002017962 02/07/23-18:31:24.294252
                    SID:2017962
                    Source Port:443
                    Destination Port:49700
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Roqwnrsun.exeReversingLabs: Detection: 25%
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exeReversingLabs: Detection: 25%
                    Source: Roqwnrsun.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exeJoe Sandbox ML: detected
                    Source: 12.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                    Source: Roqwnrsun.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 162.159.130.233:443 -> 192.168.2.3:49700 version: TLS 1.2
                    Source: Roqwnrsun.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 05DBF8E8h

                    Networking

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Roqwnrsun.exe PID: 1020, type: MEMORYSTR
                    Source: TrafficSnort IDS: 2022640 ET TROJAN PE EXE or DLL Windows file download Text M2 162.159.130.233:443 -> 192.168.2.3:49700
                    Source: TrafficSnort IDS: 2017962 ET TROJAN PE EXE or DLL Windows file download disguised as ASCII 162.159.130.233:443 -> 192.168.2.3:49700
                    Source: TrafficSnort IDS: 2039190 ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.3:49703 -> 132.226.247.73:80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDNS query: name: checkip.dyndns.org
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDNS query: name: checkip.dyndns.org
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDNS query: name: checkip.dyndns.org
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDNS query: name: checkip.dyndns.org
                    Source: Yara matchFile source: 12.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Roqwnrsun.exe.3ec6f58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Roqwnrsun.exe.3e26f38.4.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: global trafficHTTP traffic detected: GET /attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.dat HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 162.159.130.233 162.159.130.233
                    Source: Joe Sandbox ViewIP Address: 162.159.130.233 162.159.130.233
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49681
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 34.104.35.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: unknownTCP traffic detected without corresponding DNS query: 41.63.96.128
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.211.5.146
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: unknownTCP traffic detected without corresponding DNS query: 41.63.96.128
                    Source: unknownTCP traffic detected without corresponding DNS query: 41.63.96.128
                    Source: unknownTCP traffic detected without corresponding DNS query: 41.63.96.128
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 41.63.96.128
                    Source: unknownTCP traffic detected without corresponding DNS query: 41.63.96.128
                    Source: unknownTCP traffic detected without corresponding DNS query: 8.238.190.126
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                    Source: MSBuild.exe, 0000000C.00000002.518667553.0000000002946000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                    Source: MSBuild.exe, 0000000C.00000002.518667553.0000000002946000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000C.00000002.518667553.0000000002939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: MSBuild.exe, 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: MSBuild.exe, 0000000C.00000002.518667553.0000000002939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                    Source: Roqwnrsun.exe, 00000000.00000002.321773447.000000000116D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: Roqwnrsun.exe, 00000000.00000002.322551472.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: MSBuild.exe, 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: Roqwnrsun.exe, nnnnn.exe.0.drString found in binary or memory: https://cdn.discordapp.com/attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.dat;Nqgcskpj
                    Source: Roqwnrsun.exe, 00000000.00000002.322551472.0000000002CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.datT
                    Source: Roqwnrsun.exe, 00000000.00000002.322551472.0000000002CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com4
                    Source: Roqwnrsun.exe, 00000000.00000003.256851369.0000000003CFA000.00000004.00000800.00020000.00000000.sdmp, Roqwnrsun.exe, 00000000.00000002.334516184.00000000066D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
                    Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
                    Source: global trafficHTTP traffic detected: GET /attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.dat HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 162.159.130.233:443 -> 192.168.2.3:49700 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: Roqwnrsun.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Roqwnrsun.exe, type: SAMPLEMatched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth (Nextron Systems), description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), score = , reference = Internal Research
                    Source: 0.0.Roqwnrsun.exe.9e0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth (Nextron Systems), description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), score = , reference = Internal Research
                    Source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exe, type: DROPPEDMatched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth (Nextron Systems), description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), score = , reference = Internal Research
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB4238
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB2400
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB1172
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB1F40
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB2002
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB18E3
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB1878
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02AB196C
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B53278
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B5D8C4
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B90ED8
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B968F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF29F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EFF2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF9A20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF9430
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EFDEE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF38E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF38D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF9A13
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF9420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF3ED7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_053725F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_053725E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05376780
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB19A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DBEBB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DBE330
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB7AF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB2618
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB1DAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB1978
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB9098
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB1BC1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB178C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB1B1E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB7AE3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DB66E6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC1968
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC1110
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC33E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC1958
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC10E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC5C1C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC6F60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC6F30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DFE5B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DFA011
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DF7314
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DF8360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DF5B28
                    Source: Roqwnrsun.exe, 00000000.00000002.322551472.0000000002D1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs Roqwnrsun.exe
                    Source: Roqwnrsun.exe, 00000000.00000002.322551472.0000000002D53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs Roqwnrsun.exe
                    Source: Roqwnrsun.exe, 00000000.00000003.256851369.0000000003CFA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNqgcskpjait.dll" vs Roqwnrsun.exe
                    Source: Roqwnrsun.exe, 00000000.00000002.334516184.00000000066D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNqgcskpjait.dll" vs Roqwnrsun.exe
                    Source: Roqwnrsun.exe, 00000000.00000002.331147836.0000000003EC6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs Roqwnrsun.exe
                    Source: Roqwnrsun.exe, 00000000.00000002.331147836.0000000003D87000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs Roqwnrsun.exe
                    Source: Roqwnrsun.exeReversingLabs: Detection: 25%
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile read: C:\Users\user\Desktop\Roqwnrsun.exeJump to behavior
                    Source: Roqwnrsun.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\Roqwnrsun.exe C:\Users\user\Desktop\Roqwnrsun.exe
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnnJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vctukmww.z1x.ps1Jump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/7@3/3
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: Roqwnrsun.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01
                    Source: 12.2.MSBuild.exe.400000.0.unpack, JUk7WtBUhRa8xZjn2XS/kLbaQXB8Rh0D1MYSQ7f.csCryptographic APIs: 'CreateDecryptor'
                    Source: 12.2.MSBuild.exe.400000.0.unpack, JUk7WtBUhRa8xZjn2XS/kLbaQXB8Rh0D1MYSQ7f.csCryptographic APIs: 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Roqwnrsun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Roqwnrsun.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 0.2.Roqwnrsun.exe.5980000.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.322551472.0000000002D1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.333301358.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Roqwnrsun.exe PID: 1020, type: MEMORYSTR
                    Source: Roqwnrsun.exe, u0008.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: nnnnn.exe.0.dr, u0008.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 0.0.Roqwnrsun.exe.9e0000.0.unpack, u0008.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 12.2.MSBuild.exe.400000.0.unpack, JUk7WtBUhRa8xZjn2XS/kLbaQXB8Rh0D1MYSQ7f.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[] { typeof(IntPtr), typeof(Type) })
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_02ABFB75 pushad ; retf
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B59755 push esp; retf
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B5D594 push ss; retf
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B5D594 push ss; retf
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeCode function: 0_2_06B5C82E push ds; retf
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EFC9F9 push 8BFFFFFFh; retf
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF745F push ds; retf
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_00EF6DE7 push ebp; ret
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_05DC21CC pushad ; retf
                    Source: 12.2.MSBuild.exe.400000.0.unpack, clkxfdb5d8M2PiGHDll/txmZnWz9M16vnLuatm.csHigh entropy of concatenated method names: '.cctor', 'pVgmD0p1bB', 'Cy7mR5TaTj', 'ScwmGR7qlY', 'aDgm0vh6oS', 'QwPmdHIy4m', 'NOtm9oXKVc', 'hA8mLZKfWA', 'A9FmkoUCGJ', 'HaImoJtT3g'
                    Source: 12.2.MSBuild.exe.400000.0.unpack, JUk7WtBUhRa8xZjn2XS/kLbaQXB8Rh0D1MYSQ7f.csHigh entropy of concatenated method names: '.cctor', 'sBPEwmXYrj', 'kc8Bge7oQo', 'wSiBsBJTfs', 'tfwBrdKoVe', 'fViBSPu2Ca', 'K17Bnxt7HX', 'H8UBImClmR', 'hwrByAVxsq', '.ctor'
                    Source: 12.2.MSBuild.exe.400000.0.unpack, lhLPBx4v0vKBmAAiQdZ/uaaRdc492fJpZmbZBeB.csHigh entropy of concatenated method names: '.cctor', 'MlI4LaQfHf', 'bcv4kBDktp', 'FWf4fFv0o7', 'xX94CFNJKl', 'Qk146nsxN7', 'DiV4AvCitp', 'G1E42ZnNSL', 'MiN4XC1ceS', 'A04XeJyQbtqZWfXigi1'
                    Source: 12.2.MSBuild.exe.400000.0.unpack, PkIumxJNxr5gP8Z1IIQ/NPpXLOJB91mbY6q7Rac.csHigh entropy of concatenated method names: '.cctor', 'fbhJi6gPdf', 'Y2LJ3Z5gW9', 'EHcJ15ZjUj', 'qLwJjsVQ5D', 'DDeJ8vTRRg', 'oXLJUPcQcL', 'RoxJgkDxiH', 'LY9JsYhFKr', 'L9rJrrpiUx'
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnnJump to behavior
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exeJump to behavior
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exe\:Zone.Identifier:$DATAJump to behavior
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -5534023222112862s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 1944Thread sleep count: 1815 > 30
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99857s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99702s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99592s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99446s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99277s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99160s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5036Thread sleep time: -99000s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 5252Thread sleep time: -30000s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exe TID: 2764Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3084Thread sleep time: -10145709240540247s >= -30000s
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeWindow / User API: threadDelayed 1815
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9510
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99857
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99702
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99592
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99446
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99277
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99160
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 99000
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: Roqwnrsun.exe, 00000000.00000002.321773447.0000000001153000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess token adjusted: Debug
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 454000
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 456000
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 750008
                    Source: 12.2.MSBuild.exe.400000.0.unpack, clkxfdb5d8M2PiGHDll/txmZnWz9M16vnLuatm.csReference to suspicious API methods: ('Buibw0xBtJ', 'MapVirtualKey@user32.dll')
                    Source: 12.2.MSBuild.exe.400000.0.unpack, JUk7WtBUhRa8xZjn2XS/kLbaQXB8Rh0D1MYSQ7f.csReference to suspicious API methods: ('EH0B6NL4BB', 'GetProcAddress@kernel32'), ('E2ABCVKGuT', 'LoadLibrary@kernel32')
                    Source: 12.2.MSBuild.exe.400000.0.unpack, lhLPBx4v0vKBmAAiQdZ/uaaRdc492fJpZmbZBeB.csReference to suspicious API methods: ('MlI4LaQfHf', 'LoadLibrary@kernel32.dll'), ('bcv4kBDktp', 'GetProcAddress@kernel32')
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: Base64 decoded start-sleep -seconds 20
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: Base64 decoded start-sleep -seconds 20
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeQueries volume information: C:\Users\user\Desktop\Roqwnrsun.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Roqwnrsun.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: 0000000C.00000002.518667553.00000000029C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: 0000000C.00000002.518667553.00000000029C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    Native API
                    11
                    Registry Run Keys / Startup Folder
                    311
                    Process Injection
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Ingress Tool Transfer
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    PowerShell
                    Boot or Logon Initialization Scripts11
                    Registry Run Keys / Startup Folder
                    11
                    Deobfuscate/Decode Files or Information
                    LSASS Memory13
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth11
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    Security Account Manager11
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration2
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)21
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer13
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Masquerading
                    LSA Secrets21
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common21
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items311
                    Process Injection
                    DCSync1
                    Remote System Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                    System Network Configuration Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 800709 Sample: Roqwnrsun.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 34 Snort IDS alert for network traffic 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Multi AV Scanner detection for dropped file 2->38 40 12 other signatures 2->40 7 Roqwnrsun.exe 15 7 2->7         started        process3 dnsIp4 26 cdn.discordapp.com 162.159.130.233, 443, 49700 CLOUDFLARENETUS United States 7->26 20 C:\Users\user\AppData\Roaming\...\nnnnn.exe, PE32 7->20 dropped 22 C:\Users\user\...\nnnnn.exe:Zone.Identifier, ASCII 7->22 dropped 24 C:\Users\user\AppData\...\Roqwnrsun.exe.log, ASCII 7->24 dropped 42 Creates an undocumented autostart registry key 7->42 44 Encrypted powershell cmdline option found 7->44 46 Writes to foreign memory regions 7->46 48 2 other signatures 7->48 12 MSBuild.exe 14 2 7->12         started        16 powershell.exe 16 7->16         started        file5 signatures6 process7 dnsIp8 28 checkip.dyndns.com 132.226.247.73, 49703, 80 UTMEMUS United States 12->28 30 checkip.dyndns.org 12->30 32 192.168.2.1 unknown unknown 12->32 50 May check the online IP address of the machine 12->50 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal ftp login credentials 12->54 56 Tries to harvest and steal browser information (history, passwords, etc) 12->56 18 conhost.exe 16->18         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Roqwnrsun.exe26%ReversingLabsWin32.Trojan.Woreflint
                    Roqwnrsun.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exe26%ReversingLabsWin32.Trojan.Woreflint
                    SourceDetectionScannerLabelLinkDownload
                    12.2.MSBuild.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://checkip.dyndns.org40%URL Reputationsafe
                    http://checkip.dyndns.org0%URL Reputationsafe
                    http://checkip.dyndns.org/0%URL Reputationsafe
                    http://checkip.dyndns.com0%URL Reputationsafe
                    https://cdn.discordapp.com40%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    cdn.discordapp.com
                    162.159.130.233
                    truefalse
                      high
                      checkip.dyndns.com
                      132.226.247.73
                      truetrue
                        unknown
                        checkip.dyndns.org
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/true
                          • URL Reputation: safe
                          unknown
                          https://cdn.discordapp.com/attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.datfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://checkip.dyndns.org4MSBuild.exe, 0000000C.00000002.518667553.0000000002939000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.orgMSBuild.exe, 0000000C.00000002.518667553.0000000002946000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000C.00000002.518667553.0000000002939000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.comMSBuild.exe, 0000000C.00000002.518667553.0000000002946000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/botMSBuild.exe, 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://cdn.discordapp.com/attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.datTRoqwnrsun.exe, 00000000.00000002.322551472.0000000002CD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRoqwnrsun.exe, 00000000.00000002.322551472.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://cdn.discordapp.com/attachments/1070680620281376791/1072431383370285086/Mmgvxnqm.dat;NqgcskpjRoqwnrsun.exe, nnnnn.exe.0.drfalse
                                    high
                                    https://www.newtonsoft.com/jsonschemaRoqwnrsun.exe, 00000000.00000003.256851369.0000000003CFA000.00000004.00000800.00020000.00000000.sdmp, Roqwnrsun.exe, 00000000.00000002.334516184.00000000066D0000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      https://cdn.discordapp.com4Roqwnrsun.exe, 00000000.00000002.322551472.0000000002CD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      162.159.130.233
                                      cdn.discordapp.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      132.226.247.73
                                      checkip.dyndns.comUnited States
                                      16989UTMEMUStrue
                                      IP
                                      192.168.2.1
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:800709
                                      Start date and time:2023-02-07 18:30:25 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 10m 13s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:15
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample file name:Roqwnrsun.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@6/7@3/3
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 94%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • TCP Packets have been reduced to 100
                                      • Excluded IPs from analysis (whitelisted): 23.211.4.90, 209.197.3.8
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu-bg-shim.trafficmanager.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: Roqwnrsun.exe
                                      TimeTypeDescription
                                      18:31:22API Interceptor9x Sleep call for process: Roqwnrsun.exe modified
                                      18:31:30API Interceptor42x Sleep call for process: powershell.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\Roqwnrsun.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1476
                                      Entropy (8bit):5.363352874313625
                                      Encrypted:false
                                      SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhwE4BKIE4oKFKHKoZAE4Kzr7UE4KdE4KBLWE4Ks:MxHKXwYHKhQnowHBtHoxHhAHKzvUHKdn
                                      MD5:C3FB06CD3D168BE14FE3E521130B9D12
                                      SHA1:57894248590FB01DDFA2041DD20759156F765948
                                      SHA-256:AC10A0553135ECCF30E8B3127C0C30B956038E5CE2FAD95B5916DD3708FBDA32
                                      SHA-512:D23917C715937C88A60B4002BCAC6E03214BEEFBBA87E53AAD482B5E84D953BE2C854F098063CCCA1741A8A40865F62E73259EA113BE7CC555FDA8299FCC0D5B
                                      Malicious:true
                                      Reputation:moderate, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Net.Http\86d45445dab86720724016051271f5f9\System.Net.Http.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.X
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):5829
                                      Entropy (8bit):4.8968676994158
                                      Encrypted:false
                                      SSDEEP:96:WCJ2Woe5o2k6Lm5emmXIGvgyg12jDs+un/iQLEYFjDaeWJ6KGcmXx9smyFRLcU6f:5xoe5oVsm5emd0gkjDt4iWN3yBGHh9s6
                                      MD5:36DE9155D6C265A1DE62A448F3B5B66E
                                      SHA1:02D21946CBDD01860A0DE38D7EEC6CDE3A964FC3
                                      SHA-256:8BA38D55AA8F1E4F959E7223FDF653ABB9BE5B8B5DE9D116604E1ABB371C1C87
                                      SHA-512:C734ADE161FB89472B1DF9B9F062F4A53E7010D3FF99EDC0BD564540A56BC35743625C50A00635C31D165A74DCDBB330FFB878C5919D7B267F6F33D2AAB328E7
                                      Malicious:false
                                      Preview:PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):16460
                                      Entropy (8bit):5.5559997954038085
                                      Encrypted:false
                                      SSDEEP:384:nte/1TzdH1SS1TC7nBSjn4ju1RiJ9gCSJ3uzp18Yv:MES1+zBo4S11Ccutv
                                      MD5:AC0F39AEF4ABDD421F9EE1762849D33B
                                      SHA1:7920C5517E675B34C5973F9ADBC46B693A8086BD
                                      SHA-256:7EDF014DAE3538D3E674D7A0769F7CE7F6D60F7EE3297B33963D79F8B5F3D8A9
                                      SHA-512:D57063AEF543902B2F296DDAA5CD5817EE52A3F016E4756444FF2B910DBED036A046201252B49C20C60D55AE43D965FD5D217AC7A0AE69F2E8D7C17B0CC53F91
                                      Malicious:false
                                      Preview:@...e...............................8.n..............@..........H...............<@.^.L."My...:'..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.............System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Users\user\Desktop\Roqwnrsun.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):6656
                                      Entropy (8bit):4.627314818643665
                                      Encrypted:false
                                      SSDEEP:96:JpG2OqkYgoVnGMDr0hZt2UJKtEk+Mx9JbFnU:1OfoVG5h1Kz+MrQ
                                      MD5:1D261C332666240F0713F05E3B92DE0D
                                      SHA1:7F95EA4FBB56C5286D9016A4BCD156BA0425F814
                                      SHA-256:DFA4B25BB9A1534192D30DC3F10ACD6A72C21A36BFAECAE14C5D7A22DFF88FD5
                                      SHA-512:1853CB78443C92E27A14F958D3A2F790B477F170868A6C25FBE5946A71CB4A5E41C129F949AF7320BF87A6F1EF0BA396A94AE183D534572C9956CF2D7DACD0D6
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: SUSP_PE_Discord_Attachment_Oct21_1, Description: Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\nnnnn\nnnnn.exe, Author: Florian Roth (Nextron Systems)
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 26%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3.c............................N/... ...@....@.. ....................................`................................../..J....@..(....................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc...(....@......................@..@.reloc.......`......................@..B................4/......H........#...............................................................0.............-.&(....+.&+.*....0............%9....-.&8.....,.8....+..+]r...p+`8e....-"&8f...8g....,.&8h....[.....+e.+i+".+...-.+.....[...o......(.......X...2......](....8....(....8....o....8.....8....o....8.....8......8.....8....&....X..-...-..9A....?E....*..*.88....................0..v....... ....%,..-..,.&...,.&+.(....+.&..+C.-.&+.+E+.+.+.+.+..-.&.%+.+..+..+.o....+.o....+..+..,..o......,.+.*s....8....
                                      Process:C:\Users\user\Desktop\Roqwnrsun.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):4.627314818643665
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:Roqwnrsun.exe
                                      File size:6656
                                      MD5:1d261c332666240f0713f05e3b92de0d
                                      SHA1:7f95ea4fbb56c5286d9016a4bcd156ba0425f814
                                      SHA256:dfa4b25bb9a1534192d30dc3f10acd6a72c21a36bfaecae14c5d7a22dff88fd5
                                      SHA512:1853cb78443c92e27a14f958d3a2f790b477f170868a6c25fbe5946a71cb4a5e41c129f949af7320bf87a6f1ef0ba396a94ae183d534572c9956cf2d7dacd0d6
                                      SSDEEP:96:JpG2OqkYgoVnGMDr0hZt2UJKtEk+Mx9JbFnU:1OfoVG5h1Kz+MrQ
                                      TLSH:D7D1B721A3998733ED764BFA98B363830338E7809D63CF5D58C4521F6C02B694F61BA0
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3.c............................N/... ...@....@.. ....................................`................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x402f4e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x63E233DC [Tue Feb 7 11:19:56 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2f040x4a.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x528.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xf540x1000False0.56689453125data5.3590882274556675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x40000x5280x600False0.3912760416666667data3.7761268130161816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x60000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0x405c0x2dcdata
                                      RT_MANIFEST0x43740x1b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (433), with no line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      162.159.130.233192.168.2.3443497002022640 02/07/23-18:31:24.294252TCP2022640ET TROJAN PE EXE or DLL Windows file download Text M244349700162.159.130.233192.168.2.3
                                      192.168.2.3132.226.247.7349703802039190 02/07/23-18:31:57.442136TCP2039190ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check4970380192.168.2.3132.226.247.73
                                      162.159.130.233192.168.2.3443497002017962 02/07/23-18:31:24.294252TCP2017962ET TROJAN PE EXE or DLL Windows file download disguised as ASCII44349700162.159.130.233192.168.2.3
                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 7, 2023 18:31:20.688244104 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.688311100 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.688489914 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.688791990 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.688813925 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.758440018 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.762222052 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.763124943 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.763166904 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.766772032 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.766803026 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.766918898 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.766944885 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.766990900 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.767009020 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.767235041 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.767260075 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.767363071 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.767386913 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.767574072 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.767599106 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.767687082 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.767714024 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.767901897 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.767920971 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.869976997 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.870095968 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.870280027 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.870414019 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.870443106 CET44349699204.79.197.200192.168.2.3
                                      Feb 7, 2023 18:31:20.870459080 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:20.870526075 CET49699443192.168.2.3204.79.197.200
                                      Feb 7, 2023 18:31:23.601237059 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:23.601295948 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:23.601392984 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:23.639513969 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:23.639579058 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:23.698740959 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:23.698944092 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:23.711602926 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:23.711630106 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:23.712198973 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:23.758083105 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.244970083 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.245013952 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294044971 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294210911 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294259071 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294302940 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294313908 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.294342041 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294364929 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.294450045 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.294509888 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.294523954 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298019886 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298125982 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298209906 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298218012 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.298268080 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298310041 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.298355103 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298423052 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.298432112 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298456907 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.298523903 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.299168110 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.299309015 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.299391031 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.299392939 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.299417973 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.299514055 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.299936056 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.300093889 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.300174952 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.300182104 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.300219059 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.300301075 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.300724030 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.300868988 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.300944090 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.300968885 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.301628113 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.301718950 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.301744938 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.301784039 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.301856995 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.301877975 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.311939001 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312016010 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312069893 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.312076092 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312103033 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312124968 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.312391996 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312443018 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.312446117 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312463045 CET44349700162.159.130.233192.168.2.3
                                      Feb 7, 2023 18:31:24.312506914 CET49700443192.168.2.3162.159.130.233
                                      Feb 7, 2023 18:31:24.312519073 CET44349700162.159.130.233192.168.2.3
                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 7, 2023 18:31:23.553014994 CET5892153192.168.2.38.8.8.8
                                      Feb 7, 2023 18:31:23.575284004 CET53589218.8.8.8192.168.2.3
                                      Feb 7, 2023 18:31:56.600816965 CET4997753192.168.2.38.8.8.8
                                      Feb 7, 2023 18:31:56.620296001 CET53499778.8.8.8192.168.2.3
                                      Feb 7, 2023 18:31:56.634592056 CET5784053192.168.2.38.8.8.8
                                      Feb 7, 2023 18:31:56.653799057 CET53578408.8.8.8192.168.2.3
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Feb 7, 2023 18:31:23.553014994 CET192.168.2.38.8.8.80xfdd0Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.600816965 CET192.168.2.38.8.8.80x9cf2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.634592056 CET192.168.2.38.8.8.80xea71Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Feb 7, 2023 18:31:23.575284004 CET8.8.8.8192.168.2.30xfdd0No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:23.575284004 CET8.8.8.8192.168.2.30xfdd0No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:23.575284004 CET8.8.8.8192.168.2.30xfdd0No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:23.575284004 CET8.8.8.8192.168.2.30xfdd0No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:23.575284004 CET8.8.8.8192.168.2.30xfdd0No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.620296001 CET8.8.8.8192.168.2.30x9cf2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.620296001 CET8.8.8.8192.168.2.30x9cf2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.620296001 CET8.8.8.8192.168.2.30x9cf2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.620296001 CET8.8.8.8192.168.2.30x9cf2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.620296001 CET8.8.8.8192.168.2.30x9cf2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.620296001 CET8.8.8.8192.168.2.30x9cf2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.653799057 CET8.8.8.8192.168.2.30xea71No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.653799057 CET8.8.8.8192.168.2.30xea71No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.653799057 CET8.8.8.8192.168.2.30xea71No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.653799057 CET8.8.8.8192.168.2.30xea71No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.653799057 CET8.8.8.8192.168.2.30xea71No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                      Feb 7, 2023 18:31:56.653799057 CET8.8.8.8192.168.2.30xea71No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                      • cdn.discordapp.com
                                      • checkip.dyndns.org

                                      Click to jump to process

                                      Target ID:0
                                      Start time:18:31:22
                                      Start date:07/02/2023
                                      Path:C:\Users\user\Desktop\Roqwnrsun.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\Roqwnrsun.exe
                                      Imagebase:0x9e0000
                                      File size:6656 bytes
                                      MD5 hash:1D261C332666240F0713F05E3B92DE0D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.322551472.0000000002D1C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.333301358.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:1
                                      Start time:18:31:27
                                      Start date:07/02/2023
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                                      Imagebase:0x1c0000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:2
                                      Start time:18:31:27
                                      Start date:07/02/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:12
                                      Start time:18:31:53
                                      Start date:07/02/2023
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                      Imagebase:0x570000
                                      File size:261728 bytes
                                      MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.518667553.00000000029C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000C.00000002.518667553.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:high

                                      No disassembly