Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:800803
MD5:04a988e37b8ea5facd28a7d42764f597
SHA1:1182f9d0de33e9363c7777f3f76d26c179a856e6
SHA256:7b734abb20157ca48892547a61f80013138e9659b0942895991a9ab49fdadf79
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Found evaded block containing many API calls
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 5856 cmdline: C:\Users\user\Desktop\file.exe MD5: 04A988E37B8EA5FACD28A7D42764F597)
    • file.exe (PID: 1720 cmdline: C:\Users\user\Desktop\file.exe MD5: 04A988E37B8EA5FACD28A7D42764F597)
      • explorer.exe (PID: 3320 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vhefigi (PID: 4520 cmdline: C:\Users\user\AppData\Roaming\vhefigi MD5: 04A988E37B8EA5FACD28A7D42764F597)
    • vhefigi (PID: 4556 cmdline: C:\Users\user\AppData\Roaming\vhefigi MD5: 04A988E37B8EA5FACD28A7D42764F597)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x60a4:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 5 entries
      SourceRuleDescriptionAuthorStrings
      0.2.file.exe.5815a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        11.2.vhefigi.7d15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          12.2.vhefigi.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            1.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: file.exeReversingLabs: Detection: 46%
              Source: file.exeVirustotal: Detection: 35%Perma Link
              Source: http://host-host-file8.com/URL Reputation: Label: malware
              Source: host-file-host6.comVirustotal: Detection: 17%Perma Link
              Source: host-host-file8.comVirustotal: Detection: 17%Perma Link
              Source: C:\Users\user\AppData\Roaming\vhefigiReversingLabs: Detection: 46%
              Source: C:\Users\user\AppData\Roaming\vhefigiVirustotal: Detection: 35%Perma Link
              Source: file.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\vhefigiJoe Sandbox ML: detected
              Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdb source: file.exe, vhefigi.2.dr
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdbx source: file.exe, vhefigi.2.dr

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeNetwork Connect: 185.246.221.63 80
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: Malware configuration extractorURLs: http://host-file-host6.com/
              Source: Malware configuration extractorURLs: http://host-host-file8.com/
              Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
              Source: Joe Sandbox ViewIP Address: 185.246.221.63 185.246.221.63
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uclahet.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 306Host: host-file-host6.com
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uclahet.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 306Host: host-file-host6.com
              Source: unknownDNS traffic detected: queries for: host-file-host6.com

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 0.2.file.exe.5815a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.vhefigi.7d15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.vhefigi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: vhefigi, 0000000B.00000002.387737312.00000000008BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000000.00000002.270582685.00000000005B6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000000.00000002.270582685.00000000005B6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041546C
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040B413
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411D60
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413E31
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412EE0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004122A4
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004127E8
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040B9DC appears 35 times
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
              Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: file.exeReversingLabs: Detection: 46%
              Source: file.exeVirustotal: Detection: 35%
              Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigi
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigi
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigi
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9DAC2C1E-7C5C-40eb-833B-323E85A1CE84}\InProcServer32
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\WER\ERC\statecache.lockJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/2
              Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CC0D2 CreateToolhelp32Snapshot,Module32First,
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdb source: file.exe, vhefigi.2.dr
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdbx source: file.exe, vhefigi.2.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 1.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Roaming\vhefigiUnpacked PE file: 12.2.vhefigi.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BA21 push ecx; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406EB0 push eax; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CCFD0 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CCFE5 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008D1E71 pushad ; iretd
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_004011D0 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_004011D7 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_004011EB push ebx; iretd
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004046F6 LoadLibraryA,GetProcAddress,VirtualProtect,
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vhefigiJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vhefigiJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vhefigi:Zone.Identifier read attributes | delete
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Windows\explorer.exe TID: 5944Thread sleep count: 389 > 30
              Source: C:\Windows\explorer.exe TID: 1316Thread sleep count: 340 > 30
              Source: C:\Windows\explorer.exe TID: 1316Thread sleep time: -34000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 5924Thread sleep count: 203 > 30
              Source: C:\Windows\explorer.exe TID: 3588Thread sleep time: -60000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 1012Thread sleep count: 487 > 30
              Source: C:\Windows\explorer.exe TID: 1200Thread sleep count: 253 > 30
              Source: C:\Windows\explorer.exe TID: 1184Thread sleep count: 129 > 30
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 389
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 487
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 866
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 858
              Source: C:\Users\user\Desktop\file.exeEvaded block: after key decision
              Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformation
              Source: explorer.exe, 00000002.00000000.305414665.0000000007AFF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
              Source: explorer.exe, 00000002.00000000.305414665.0000000007B66000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000008
              Source: explorer.exe, 00000002.00000000.288276761.0000000005FAA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.305414665.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.286848877.0000000005EF4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.305414665.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}E2%d
              Source: explorer.exe, 00000002.00000000.286848877.0000000005F12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\AppData\Roaming\vhefigiSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040689F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004046F6 LoadLibraryA,GetProcAddress,VirtualProtect,
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CB9AF push dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess queried: DebugPort
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040689F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CAD1 SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040730B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041030E __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeFile created: vhefigi.2.drJump to dropped file
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeNetwork Connect: 185.246.221.63 80
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\AppData\Roaming\vhefigiSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\AppData\Roaming\vhefigiSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 4501930
              Source: C:\Users\user\AppData\Roaming\vhefigiThread created: unknown EIP: 4581930
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigi
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.286308744.00000000056F0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.305414665.0000000007B83000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.281543571.00000000004C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\file.exeCode function: GetComboBoxInfo,SetLastError,EnumTimeFormatsA,FindNextFileW,EnumCalendarInfoW,VerifyVersionInfoA,EnumTimeFormatsA,InterlockedDecrement,GetLongPathNameW,WaitForSingleObject,QueryMemoryResourceNotification,GetUserDefaultLangID,WritePrivateProfileStringA,AddRefActCtx,MoveFileWithProgressA,DeleteVolumeMountPointA,DeleteVolumeMountPointA,CreateActCtxA,EnumTimeFormatsA,_hwrite,SetHandleInformation,EnumResourceLanguagesA,CreateNamedPipeA,GetCurrentProcessId,GetComputerNameA,GetLocaleInfoW,HeapAlloc,GetModuleHandleW,SetVolumeMountPointW,FindResourceW,DeleteVolumeMountPointA,GetConsoleAliasesLengthA,LoadLibraryA,LoadLibraryA,GlobalFlags,WritePrivateProfileSectionA,GetConsoleAliasW,SetConsoleCursorInfo,GetProfileSectionA,LoadLibraryA,GetLastError,EndUpdateResourceA,GetModuleHandleW,FreeConsole,FindResourceW,SearchPathA,GetConsoleTitleA,OpenMutexW,GetUserDefaultLangID,InterlockedExchange,GetBinaryTypeW,GetCommandLineW,
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,DebugActiveProcessStop,WriteConsoleOutputAttribute,FreeUserPhysicalPages,GetProcessId,ReadConsoleInputA,WaitForMultipleObjects,LocalSize,CreateDirectoryExA,FindFirstVolumeMountPointW,WriteFile,ClearCommBreak,WriteConsoleInputA,FindActCtxSectionStringA,CreateFileA,
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404BB9 GetComboBoxInfo,SetLastError,EnumTimeFormatsA,FindNextFileW,EnumCalendarInfoW,VerifyVersionInfoA,EnumTimeFormatsA,InterlockedDecrement,GetLongPathNameW,WaitForSingleObject,QueryMemoryResourceNotification,GetUserDefaultLangID,WritePrivateProfileStringA,AddRefActCtx,MoveFileWithProgressA,DeleteVolumeMountPointA,DeleteVolumeMountPointA,CreateActCtxA,EnumTimeFormatsA,_hwrite,SetHandleInformation,EnumResourceLanguagesA,CreateNamedPipeA,GetCurrentProcessId,GetComputerNameA,GetLocaleInfoW,HeapAlloc,GetModuleHandleW,SetVolumeMountPointW,FindResourceW,DeleteVolumeMountPointA,GetConsoleAliasesLengthA,LoadLibraryA,LoadLibraryA,GlobalFlags,WritePrivateProfileSectionA,GetConsoleAliasW,SetConsoleCursorInfo,GetProfileSectionA,LoadLibraryA,GetLastError,EndUpdateResourceA,GetModuleHandleW,FreeConsole,FindResourceW,SearchPathA,GetConsoleTitleA,OpenMutexW,GetUserDefaultLangID,InterlockedExchange,GetBinaryTypeW,GetCommandLineW,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040D77B GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.file.exe.5815a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.vhefigi.7d15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.vhefigi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.file.exe.5815a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.vhefigi.7d15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.vhefigi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts3
              Native API
              1
              DLL Side-Loading
              313
              Process Injection
              11
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Exploitation for Client Execution
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              12
              Virtualization/Sandbox Evasion
              LSASS Memory321
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth2
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)313
              Process Injection
              Security Account Manager12
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Deobfuscate/Decode Files or Information
              NTDS3
              Process Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items1
              Software Packing
              DCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc Filesystem13
              System Information Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
              File Deletion
              /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 800803 Sample: file.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 32 Multi AV Scanner detection for domain / URL 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus detection for URL or domain 2->36 38 4 other signatures 2->38 7 file.exe 2->7         started        10 vhefigi 2->10         started        process3 signatures4 48 Detected unpacking (changes PE section rights) 7->48 12 file.exe 7->12         started        50 Multi AV Scanner detection for dropped file 10->50 52 Machine Learning detection for dropped file 10->52 15 vhefigi 10->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 3 8 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 185.246.221.63, 49722, 80 LVLT-10753US Germany 17->26 28 host-host-file8.com 17->28 30 192.168.2.1 unknown unknown 17->30 22 C:\Users\user\AppData\Roaming\vhefigi, PE32 17->22 dropped 24 C:\Users\user\...\vhefigi:Zone.Identifier, ASCII 17->24 dropped 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Benign windows process drops PE files 17->42 44 Deletes itself after installation 17->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->46 file9 signatures10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe46%ReversingLabsWin32.Ransomware.Stop
              file.exe36%VirustotalBrowse
              file.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\vhefigi100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\vhefigi46%ReversingLabsWin32.Ransomware.Stop
              C:\Users\user\AppData\Roaming\vhefigi36%VirustotalBrowse
              SourceDetectionScannerLabelLinkDownload
              12.2.vhefigi.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.file.exe.5815a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              11.2.vhefigi.7d15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              SourceDetectionScannerLabelLink
              host-file-host6.com18%VirustotalBrowse
              host-host-file8.com18%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://host-file-host6.com/0%URL Reputationsafe
              http://host-host-file8.com/100%URL Reputationmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              host-file-host6.com
              185.246.221.63
              truetrueunknown
              host-host-file8.com
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://host-file-host6.com/true
              • URL Reputation: safe
              unknown
              http://host-host-file8.com/true
              • URL Reputation: malware
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              185.246.221.63
              host-file-host6.comGermany
              10753LVLT-10753UStrue
              IP
              192.168.2.1
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:800803
              Start date and time:2023-02-07 20:03:12 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 31s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:14
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:file.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/2@4/2
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 99.8% (good quality ratio 91.6%)
              • Quality average: 71.9%
              • Quality standard deviation: 31.9%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, login.live.com, ctldl.windowsupdate.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              20:05:07API Interceptor475x Sleep call for process: explorer.exe modified
              20:05:41Task SchedulerRun new task: Firefox Default Browser Agent E85BC7988C711DBE path: C:\Users\user\AppData\Roaming\vhefigi
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):198144
              Entropy (8bit):7.034848311694385
              Encrypted:false
              SSDEEP:3072:BJoObqrFdq4LsfErWQ5vk/HqHA0KK1HYRkqPSM3Fa59NhVwgy:BJoDa4LXrxk/cA0/FYeSLFU9Ncg
              MD5:04A988E37B8EA5FACD28A7D42764F597
              SHA1:1182F9D0DE33E9363C7777F3F76D26C179A856E6
              SHA-256:7B734ABB20157CA48892547A61F80013138E9659B0942895991A9AB49FDADF79
              SHA-512:24519302727DCDBB5B020FEB1729980E0602409A205534B4577461E321C95A54A872026809C50C75D04B3B6C112D4E761381E11197F4AC11F106F0165779F252
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 46%
              • Antivirus: Virustotal, Detection: 36%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................B.s.....p.....f..............w...a.....q.....t....Rich...........PE..L...8}.a.....................<......or............@.........................................................................l...P...................................@...............................p9..@............................................text............................... ..`.data............6..................@....rsrc............ ..................@..@.reloc..n'.......(..................@..B................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.034848311694385
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:file.exe
              File size:198144
              MD5:04a988e37b8ea5facd28a7d42764f597
              SHA1:1182f9d0de33e9363c7777f3f76d26c179a856e6
              SHA256:7b734abb20157ca48892547a61f80013138e9659b0942895991a9ab49fdadf79
              SHA512:24519302727dcdbb5b020feb1729980e0602409a205534b4577461e321c95a54a872026809c50c75d04b3b6c112d4e761381e11197f4ac11f106f0165779f252
              SSDEEP:3072:BJoObqrFdq4LsfErWQ5vk/HqHA0KK1HYRkqPSM3Fa59NhVwgy:BJoDa4LXrxk/cA0/FYeSLFU9Ncg
              TLSH:DF14C0223980F372C06B25705874DBA53FFEB5309175895B7BA917AE4F302D2663A387
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................B.s.......p.......f.................w.....a.......q.......t.....Rich............PE..L...8}.a...................
              Icon Hash:70d0eeeacacaeadd
              Entrypoint:0x40726f
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x611A7D38 [Mon Aug 16 14:59:04 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:87e1f4e32d01d5a52e605f27fd138118
              Instruction
              call 00007F1340BE4E4Ch
              jmp 00007F1340BDE7BEh
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              mov ecx, dword ptr [esp+04h]
              test ecx, 00000003h
              je 00007F1340BDE966h
              mov al, byte ptr [ecx]
              add ecx, 01h
              test al, al
              je 00007F1340BDE990h
              test ecx, 00000003h
              jne 00007F1340BDE931h
              add eax, 00000000h
              lea esp, dword ptr [esp+00000000h]
              lea esp, dword ptr [esp+00000000h]
              mov eax, dword ptr [ecx]
              mov edx, 7EFEFEFFh
              add edx, eax
              xor eax, FFFFFFFFh
              xor eax, edx
              add ecx, 04h
              test eax, 81010100h
              je 00007F1340BDE92Ah
              mov eax, dword ptr [ecx-04h]
              test al, al
              je 00007F1340BDE974h
              test ah, ah
              je 00007F1340BDE966h
              test eax, 00FF0000h
              je 00007F1340BDE955h
              test eax, FF000000h
              je 00007F1340BDE944h
              jmp 00007F1340BDE90Fh
              lea eax, dword ptr [ecx-01h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-02h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-03h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-04h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              cmp ecx, dword ptr [0042C190h]
              jne 00007F1340BDE944h
              rep ret
              jmp 00007F1340BE4E3Ch
              push eax
              push dword ptr fs:[00000000h]
              lea eax, dword ptr [esp+0Ch]
              sub esp, dword ptr [esp+0Ch]
              push ebx
              push esi
              push edi
              mov dword ptr [eax], ebp
              mov ebp, eax
              mov eax, dword ptr [0042C190h]
              Programming Language:
              • [ASM] VS2008 build 21022
              • [ C ] VS2008 build 21022
              • [IMP] VS2005 build 50727
              • [C++] VS2008 build 21022
              • [RES] VS2008 build 21022
              • [LNK] VS2008 build 21022
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1876c0x50.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x15a0000x1ee8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x15c0000xf1c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x12400x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39700x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f4.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x1831a0x18400False0.5321560889175257data6.371835638411856IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x1a0000x13f2900x13600False0.9425277217741935data7.833380745851634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x15a0000x1ee80x2000False0.60888671875data5.786997654811944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x15c0000x276e0x2800False0.32099609375data3.3385866771832506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x15a1c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TibetanTibet
              RT_ICON0x15a1c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TibetanNepal
              RT_ICON0x15a1c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TibetanIndia
              RT_ICON0x15aa680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TibetanTibet
              RT_ICON0x15aa680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TibetanNepal
              RT_ICON0x15aa680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TibetanIndia
              RT_STRING0x15bd900x4edataTibetanTibet
              RT_STRING0x15bd900x4edataTibetanNepal
              RT_STRING0x15bd900x4edataTibetanIndia
              RT_STRING0x15bde00x50dataTibetanTibet
              RT_STRING0x15bde00x50dataTibetanNepal
              RT_STRING0x15bde00x50dataTibetanIndia
              RT_STRING0x15be300xb6dataTibetanTibet
              RT_STRING0x15be300xb6dataTibetanNepal
              RT_STRING0x15be300xb6dataTibetanIndia
              RT_GROUP_ICON0x15bb100x22dataTibetanTibet
              RT_GROUP_ICON0x15bb100x22dataTibetanNepal
              RT_GROUP_ICON0x15bb100x22dataTibetanIndia
              RT_VERSION0x15bb380x258data
              DLLImport
              KERNEL32.dllRequestWakeupLatency, CreateFileA, FindActCtxSectionStringA, WriteConsoleInputA, ClearCommBreak, WriteFile, FindFirstVolumeMountPointW, CreateDirectoryExA, LocalSize, WaitForMultipleObjects, ReadConsoleInputA, GetProcessId, FreeUserPhysicalPages, WriteConsoleOutputAttribute, DebugActiveProcessStop, GetLocaleInfoW, GetProcAddress, LocalAlloc, GetCommandLineW, GetBinaryTypeW, InterlockedExchange, OpenMutexW, GetConsoleTitleA, SearchPathA, FreeConsole, EndUpdateResourceA, GetLastError, GetProfileSectionA, SetConsoleCursorInfo, GetConsoleAliasW, CreateSemaphoreA, GlobalFlags, GetConsoleAliasesLengthA, FindResourceW, SetVolumeMountPointW, GetModuleHandleW, HeapAlloc, GetComputerNameA, GetCurrentProcessId, CreateNamedPipeA, EnumResourceLanguagesA, SetHandleInformation, _hwrite, CreateActCtxA, DeleteVolumeMountPointA, MoveFileWithProgressA, AddRefActCtx, WritePrivateProfileStringA, GetUserDefaultLangID, QueryMemoryResourceNotification, WaitForSingleObject, GetLongPathNameW, InterlockedDecrement, VerifyVersionInfoA, EnumCalendarInfoW, FindNextFileW, EnumTimeFormatsA, SetLastError, SetCriticalSectionSpinCount, WritePrivateProfileSectionA, LoadLibraryA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RaiseException, RtlUnwind, HeapFree, DeleteFileA, GetStartupInfoW, GetModuleHandleA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, InitializeCriticalSectionAndSpinCount, WideCharToMultiByte, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle
              USER32.dllGetComboBoxInfo
              GDI32.dllGetTextFaceW
              Language of compilation systemCountry where language is spokenMap
              TibetanTibet
              TibetanNepal
              TibetanIndia
              TimestampSource PortDest PortSource IPDest IP
              Feb 7, 2023 20:05:06.676763058 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.704660892 CET8049722185.246.221.63192.168.2.7
              Feb 7, 2023 20:05:06.704898119 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.705308914 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.705343962 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.741307020 CET8049722185.246.221.63192.168.2.7
              Feb 7, 2023 20:05:06.850627899 CET8049722185.246.221.63192.168.2.7
              Feb 7, 2023 20:05:06.850774050 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.852236986 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.880031109 CET8049722185.246.221.63192.168.2.7
              TimestampSource PortDest PortSource IPDest IP
              Feb 7, 2023 20:05:06.647430897 CET5100753192.168.2.78.8.8.8
              Feb 7, 2023 20:05:06.667443037 CET53510078.8.8.8192.168.2.7
              Feb 7, 2023 20:05:06.864218950 CET5051353192.168.2.78.8.8.8
              Feb 7, 2023 20:05:07.911704063 CET5051353192.168.2.78.8.8.8
              Feb 7, 2023 20:05:08.936582088 CET5051353192.168.2.78.8.8.8
              Feb 7, 2023 20:05:10.893774986 CET53505138.8.8.8192.168.2.7
              Feb 7, 2023 20:05:11.939722061 CET53505138.8.8.8192.168.2.7
              Feb 7, 2023 20:05:12.966223001 CET53505138.8.8.8192.168.2.7
              TimestampSource IPDest IPChecksumCodeType
              Feb 7, 2023 20:05:11.939827919 CET192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
              Feb 7, 2023 20:05:12.966365099 CET192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Feb 7, 2023 20:05:06.647430897 CET192.168.2.78.8.8.80x921eStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:06.864218950 CET192.168.2.78.8.8.80x19d6Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:07.911704063 CET192.168.2.78.8.8.80x19d6Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:08.936582088 CET192.168.2.78.8.8.80x19d6Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Feb 7, 2023 20:05:06.667443037 CET8.8.8.8192.168.2.70x921eNo error (0)host-file-host6.com185.246.221.63A (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:10.893774986 CET8.8.8.8192.168.2.70x19d6Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:11.939722061 CET8.8.8.8192.168.2.70x19d6Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:12.966223001 CET8.8.8.8192.168.2.70x19d6Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              • uclahet.com
                • host-file-host6.com

              Click to jump to process

              Target ID:0
              Start time:20:04:48
              Start date:07/02/2023
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.270582685.00000000005B6000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:1
              Start time:20:04:54
              Start date:07/02/2023
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:2
              Start time:20:05:00
              Start date:07/02/2023
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff75ed40000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:11
              Start time:20:05:41
              Start date:07/02/2023
              Path:C:\Users\user\AppData\Roaming\vhefigi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\vhefigi
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 46%, ReversingLabs
              • Detection: 36%, Virustotal, Browse
              Reputation:low

              Target ID:12
              Start time:20:05:49
              Start date:07/02/2023
              Path:C:\Users\user\AppData\Roaming\vhefigi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\vhefigi
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              Reputation:low

              No disassembly