Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL04AWB01173903102023PDF.scr.exe

Overview

General Information

Sample Name:DHL04AWB01173903102023PDF.scr.exe
Analysis ID:828071
MD5:1bf124cc783ff47a91ada4e6d4ac9e6b
SHA1:b78f2ffb785071ab785830cdd4cbc5f010b7480b
SHA256:494d5735144af171cc15708b37b491b74be1522494958e605ac348dd4897dcf9
Infos:

Detection

Remcos, GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Remcos RAT
Sigma detected: Remcos
Yara detected GuLoader
Installs a global keyboard hook
Drops PE files with a suspicious file extension
Tries to detect Any.run
Creates autostart registry keys with suspicious values (likely registry only malware)
Found potential ransomware demand text
Uses dynamic DNS services
Uses 32bit PE files
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000001.00000002.5987381198.0000000006C55000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: DHL04AWB01173903102023PDF.scr.exe PID: 3372JoeSecurity_RemcosYara detected Remcos RATJoe Security

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe, ProcessId: 3372, TargetFilename: C:\ProgramData\remcos\logs.dat
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: DHL04AWB01173903102023PDF.scr.exeVirustotal: Detection: 13%Perma Link
        Source: Yara matchFile source: 00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DHL04AWB01173903102023PDF.scr.exe PID: 3372, type: MEMORYSTR
        Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.11.20:49828 version: TLS 1.2
        Source: Binary string: mshtml.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmp
        Source: Binary string: D:\SCM\P4\depot\esw\projects\azure\Maglev\DesignerBranches\ezheng\newarch\Vista-AddOn\ExtArch\UI\BtTray\libs\x64\ContactsApi.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, ContactsApi.dll.1.dr, nseB51F.tmp.1.dr
        Source: Binary string: D:\Builds\149\N2\HO_MMC_g_2016_r_2016\Sources\AudioPluginMgr\plugins\DefConvertor\Release\DefConvertor.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029EC000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.dr
        Source: Binary string: mshtml.pdbUGP source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmp
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00402706 FindFirstFileW,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_0040572C CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_004061E0 FindFirstFileW,FindClose,

        Networking

        barindex
        Source: unknownDNS query: name: milliondollar23.duckdns.org
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
        Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
        Source: global trafficHTTP traffic detected: GET /attachments/503469199062990850/1085873812794523729/NxXRtUXfgqSkIuV181.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.comCache-Control: no-cache
        Source: global trafficTCP traffic: 192.168.11.20:49829 -> 79.134.225.111:3984
        Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
        Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
        Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
        Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
        Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
        Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
        Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000003.5959642741.00000000047A3000.00000004.00000020.00020000.00000000.sdmp, DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716826508.000000000479E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000003.5959642741.00000000047A3000.00000004.00000020.00020000.00000000.sdmp, DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716826508.000000000479E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
        Source: DHL04AWB01173903102023PDF.scr.exe, Chirming.scr.4.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://ocsp.thawte.com0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://s2.symcb.com0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://sv.symcb.com/sv.crt0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://sv.symcd.com0&
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000626000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://www.nero.com
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://www.symauth.com/cps0(
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: http://www.symauth.com/rpa00
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmp, DHL04AWB01173903102023PDF.scr.exe, 00000004.00000003.5959642741.00000000047A3000.00000004.00000020.00020000.00000000.sdmp, DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/503469199062990850/1085873812794523729/NxXRtUXfgqSkIuV181.bin
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/t
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
        Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
        Source: global trafficHTTP traffic detected: GET /attachments/503469199062990850/1085873812794523729/NxXRtUXfgqSkIuV181.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.comCache-Control: no-cache
        Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.11.20:49828 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00405290 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DHL04AWB01173903102023PDF.scr.exe PID: 3372, type: MEMORYSTR

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: __m2mep@?__global_unlock@?A0x27fb6efc@@$$FYA_NXZ
        Source: ContactsApi.dll.1.drString found in binary or memory: __m2mep@?__global_unlock@?A0x27fb6efc@@$$FYA_NXZ
        Source: nseB51F.tmp.1.drString found in binary or memory: __m2mep@?__global_unlock@?A0x27fb6efc@@$$FYA_NXZ
        Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Windows\resources\0409Jump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00404ACD
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_004064F2
        Source: msado25.tlb.1.drStatic PE information: No import functions for PE file found
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsado25.tlbj% vs DHL04AWB01173903102023PDF.scr.exe
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000000.5630222194.000000000044E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStoressters.exe` vs DHL04AWB01173903102023PDF.scr.exe
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDefConvertor.DLL vs DHL04AWB01173903102023PDF.scr.exe
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5982708695.0000000000409000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsado25.tlbj% vs DHL04AWB01173903102023PDF.scr.exe
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000000.5843482212.000000000044E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStoressters.exe` vs DHL04AWB01173903102023PDF.scr.exe
        Source: DHL04AWB01173903102023PDF.scr.exeBinary or memory string: OriginalFilenameStoressters.exe` vs DHL04AWB01173903102023PDF.scr.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeSection loaded: edgegdi.dll
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeSection loaded: edgegdi.dll
        Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: invalid certificate
        Source: DHL04AWB01173903102023PDF.scr.exeVirustotal: Detection: 13%
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile read: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeJump to behavior
        Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess created: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess created: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\NonhieraticalJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\AppData\Local\Temp\nseB51E.tmpJump to behavior
        Source: classification engineClassification label: mal96.rans.troj.spyw.evad.winEXE@3/13@10/2
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_0040206A CoCreateInstance,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00404587 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-TUJMU2
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile written: C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\Z_Custom2.iniJump to behavior
        Source: DHL04AWB01173903102023PDF.scr.exeStatic file information: File size 1211760 > 1048576
        Source: Binary string: mshtml.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmp
        Source: Binary string: D:\SCM\P4\depot\esw\projects\azure\Maglev\DesignerBranches\ezheng\newarch\Vista-AddOn\ExtArch\UI\BtTray\libs\x64\ContactsApi.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, ContactsApi.dll.1.dr, nseB51F.tmp.1.dr
        Source: Binary string: D:\Builds\149\N2\HO_MMC_g_2016_r_2016\Sources\AudioPluginMgr\plugins\DefConvertor\Release\DefConvertor.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029EC000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.dr
        Source: Binary string: mshtml.pdbUGP source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000001.00000002.5987381198.0000000006C55000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_10002D50 push eax; ret
        Source: ContactsApi.dll.1.drStatic PE information: section name: .nep
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00406207 GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: msado25.tlb.1.drStatic PE information: 0x8DBA1FD3 [Sun May 7 15:54:59 2045 UTC]

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scrJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dllJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scrJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\AppData\Local\Temp\nsbBACD.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlbJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dllJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Postkassernes C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scrJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Postkassernes C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scrJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce PostkassernesJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce PostkassernesJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce PostkassernesJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce PostkassernesJump to behavior
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe TID: 428Thread sleep count: 500 > 30
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe TID: 428Thread sleep time: -250000s >= -30000s
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeDropped PE file which has not been started: C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dllJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeDropped PE file which has not been started: C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlbJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeDropped PE file which has not been started: C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dllJump to dropped file
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeWindow / User API: threadDelayed 500
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeWindow / User API: foregroundWindowGot 804
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00402706 FindFirstFileW,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_0040572C CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_004061E0 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeAPI call chain: ExitProcess graph end node
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmp, DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.000000000478D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.6038796953.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00406207 GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess created: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716826508.000000000479E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerU2\
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716826508.000000000479E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716826508.000000000479E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2\
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716826508.000000000479E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerU2\:D
        Source: DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
        Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 1_2_00405EBF GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DHL04AWB01173903102023PDF.scr.exe PID: 3372, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DHL04AWB01173903102023PDF.scr.exe PID: 3372, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Native API
        11
        Registry Run Keys / Startup Folder
        12
        Process Injection
        111
        Masquerading
        11
        Input Capture
        11
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium11
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/Job1
        DLL Side-Loading
        11
        Registry Run Keys / Startup Folder
        11
        Virtualization/Sandbox Evasion
        LSASS Memory11
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        DLL Side-Loading
        12
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin Shares1
        Clipboard Data
        Automated Exfiltration1
        Ingress Tool Transfer
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer2
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Timestomp
        LSA Secrets3
        File and Directory Discovery
        SSHKeyloggingData Transfer Size Limits113
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        DLL Side-Loading
        Cached Domain Credentials3
        System Information Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        DHL04AWB01173903102023PDF.scr.exe13%VirustotalBrowse
        DHL04AWB01173903102023PDF.scr.exe8%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scr8%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsbBACD.tmp\System.dll0%ReversingLabs
        C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlb0%ReversingLabs
        C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dll0%ReversingLabs
        C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
        http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
        http://ocsp.thawte.com00%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%VirustotalBrowse
        http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%VirustotalBrowse
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        milliondollar23.duckdns.org
        79.134.225.111
        truetrue
          unknown
          cdn.discordapp.com
          162.159.129.233
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://cdn.discordapp.com/attachments/503469199062990850/1085873812794523729/NxXRtUXfgqSkIuV181.binfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdDHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drfalse
                high
                http://www.symauth.com/rpa00DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drfalse
                  high
                  http://ocsp.thawte.com0DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nero.comDHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drfalse
                    high
                    https://cdn.discordapp.com/tDHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdDHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://cdn.discordapp.com/DHL04AWB01173903102023PDF.scr.exe, 00000004.00000002.10716301559.0000000004728000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://nsis.sf.net/NSIS_ErrorErrorDHL04AWB01173903102023PDF.scr.exe, Chirming.scr.4.drfalse
                          high
                          http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTDDHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000626000.00000020.00000001.01000000.00000008.sdmpfalse
                            high
                            http://www.gopher.ftp://ftp.DHL04AWB01173903102023PDF.scr.exe, 00000004.00000001.5844146219.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.symauth.com/cps0(DHL04AWB01173903102023PDF.scr.exe, 00000001.00000002.5984634399.00000000029FF000.00000004.00000020.00020000.00000000.sdmp, APM_DefConvertor.dll.1.dr, nseB51F.tmp.1.drfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              162.159.129.233
                              cdn.discordapp.comUnited States
                              13335CLOUDFLARENETUSfalse
                              79.134.225.111
                              milliondollar23.duckdns.orgSwitzerland
                              6775FINK-TELECOM-SERVICESCHtrue
                              Joe Sandbox Version:37.0.0 Beryl
                              Analysis ID:828071
                              Start date and time:2023-03-16 18:14:07 +01:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 15m 6s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Number of analysed new started processes analysed:9
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample file name:DHL04AWB01173903102023PDF.scr.exe
                              Detection:MAL
                              Classification:mal96.rans.troj.spyw.evad.winEXE@3/13@10/2
                              EGA Information:
                              • Successful, ratio: 50%
                              HDC Information:
                              • Successful, ratio: 85% (good quality ratio 83.6%)
                              • Quality average: 87.3%
                              • Quality standard deviation: 22%
                              HCA Information:
                              • Successful, ratio: 85%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Exclude process from analysis (whitelisted): dllhost.exe, UserOOBEBroker.exe, backgroundTaskHost.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 40.126.32.73, 40.126.32.69, 40.126.32.132, 20.190.160.13, 20.190.160.15, 40.126.32.75, 40.126.32.137, 20.190.160.21
                              • Excluded domains from analysis (whitelisted): prdv6a.aadg.msidentity.com, wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, tile-service.weather.microsoft.com, www.tm.lg.prod.aadmsa.akadns.net, www.tm.v6.a.prd.aadg.akadns.net, login.msa.msidentity.com
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              18:16:31AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Postkassernes C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scr
                              18:16:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Postkassernes C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scr
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):234
                              Entropy (8bit):3.3531832298967457
                              Encrypted:false
                              SSDEEP:6:Kl/lxUlnGljqb5YcIeeDAlS1gWAAe5q1gWAv:Kl/lScRUecTWFe5BW+
                              MD5:78A66B0B692F4C1BCEC736DD3C0CFF22
                              SHA1:EB0F85954BEC9D32CF53F875B8C0BFCB432C8444
                              SHA-256:B9153E8889C6C361BD2255890E48C7CC31DAD18E1136873A3FDFF67BF50A01AA
                              SHA-512:DF533E6C2696022AC4C318E3A5D970D7716CB485011802E722D56740F9A082C57A79CCE1516264B7307FB789DCE425A6FFEF9E13F279B2397D13CA8236B8D530
                              Malicious:true
                              Reputation:low
                              Preview:....[.2.0.2.3./.0.3./.1.6. .1.8.:.1.6.:.3.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Category:dropped
                              Size (bytes):1211760
                              Entropy (8bit):7.9924781293877105
                              Encrypted:true
                              SSDEEP:24576:7RNsMRW/uL9M7e36FgHRcMSbA22c91uwozF2KDQcvhNfSf7a09Xe+bUe:c4suGm6SxcD2SczF2aQcffSDb99
                              MD5:1BF124CC783FF47A91ADA4E6D4AC9E6B
                              SHA1:B78F2FFB785071AB785830CDD4CBC5F010B7480B
                              SHA-256:494D5735144AF171CC15708B37B491B74BE1522494958E605AC348DD4897DCF9
                              SHA-512:B5E35FDA41AEDB7C40961098745153EFA13470D065AC2CFB343C542011ED58869494770615DB8A7E4B64B77AC6DD2DE4F1CFD1403EFECEEE8425993BDF66670B
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 8%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....e.Q.................`...*.......3.......p....@..........................`...............................................t......................hs...............................................................p...............................text....^.......`.................. ..`.rdata..T....p.......d..............@..@.data................x..............@....ndata...@...............................rsrc................~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):11264
                              Entropy (8bit):5.774411073650885
                              Encrypted:false
                              SSDEEP:192:eB2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsE+:3S62Gw947ExuGDI7J8EF7KIE
                              MD5:BE2621A78A13A56CF09E00DD98488360
                              SHA1:75F0539DC6AF200A07CDB056CDDDDEC595C6CFD2
                              SHA-256:852047023BA0CAE91C7A43365878613CFB4E64E36FF98C460E113D5088D68EF5
                              SHA-512:B80CF1F678E6885276B9A1BFD9227374B2EB9E38BB20446D52EBE2C3DBA89764AA50CB4D49DF51A974478F3364B5DBCBC5B4A16DC8F1123B40C89C01725BE3D1
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....e.Q...........!................9'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..@....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1831716
                              Entropy (8bit):7.308492575684153
                              Encrypted:false
                              SSDEEP:49152:lf4WAQduqXBweZG32poHRS2tQuWikK9jM3:lJAQlnANE2tQTaM3
                              MD5:9B4D8ABA094C64270F7878FAE618AC65
                              SHA1:FA3D773625A7FE13C127925856A2B015C986E598
                              SHA-256:CB136F81690F426D253696166DE342FF05A1C1F3C0C780BBE800A06396424751
                              SHA-512:87EBE9A0C8BD59D98236943710F7A739AEE413FD8B198F1F92479434819423857252B6D160AB42A0EE8B976AAE3972185E2CC467FB9842AFEB9BF3C3D7577B73
                              Malicious:false
                              Reputation:low
                              Preview:.3......,........................!.......2.......3..............................................w...........-.J.............................................................................................................................................................................G...X...............j...............................................................................................................................f.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):202342
                              Entropy (8bit):7.5372236610693095
                              Encrypted:false
                              SSDEEP:3072:YTz6SobCaMo6ljmx23UrLpvJvOc9CuKjrDee/jKOVox2EcIHuysfzFC64:w6SPaMo6l4XvOZ5rDtKOVoQrF0
                              MD5:E2901A2B3EFA6BB00F2AD1D4AD963F52
                              SHA1:1F2C771CEAE379DF9FA7FA1FA5E4ABC36638A42E
                              SHA-256:FEFA0B1539475BF0ED224A8D9934FD4558DD0B1297FB661DAB776ABC96C333FF
                              SHA-512:DA39BCB8E8C2BD79160B33A7767C58CC7CE204B56005B16AF6825DD6E25612D4C08E2C69A2DF288EC6635A24E740C23C5842E5DA3C08BDCCE9FC677D456C9B5E
                              Malicious:false
                              Preview:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):45170
                              Entropy (8bit):3.7626877360483184
                              Encrypted:false
                              SSDEEP:384:wBMdoEQYh/Iq7rwSM+jNyql218nyeEJFFCEeFe73c3+AC+mviFuqOtSS0uK3l/:wadoAr7s1+jNyqr6FFweIT0h0/
                              MD5:AC05652AF93A583226FD118E23D3652F
                              SHA1:DA5BB4AE245369888D1AF981AF6785FAE21C7BC9
                              SHA-256:54E26FC4F586B39C4CCB6655735E8AA03AD31498EFD0119AB8406258D5561627
                              SHA-512:2C24F1CBD45D5B06DF0A187793E02DA4F085E6E03CF1A697416F3F0B34FE4E96ECFCFD4E25DA3288383B98E1BC112A2418EFF5EA8E69BFBF153F28A20A687BF2
                              Malicious:false
                              Preview:..[.S.y.s.t.e.m.].....L.a.n.g.I.d. .=. .L.A.N.G._.Y.I.,. .S.U.B.L.A.N.G._.D.E.F.A.U.L.T.....G.u.i.d.P.r.o.f.i.l.e.=.{.4.0.9.C.8.3.7.6.-.0.0.7.B.-.4.3.5.7.-.A.E.8.E.-.2.6.3.1.6.E.E.3.F.B.0.D.}.....D.e.s.c.r.i.p.t.i.o.n.=.".Y.i. .I.n.p.u.t. .M.e.t.h.o.d.".....D.i.s.p.l.a.y. .D.e.s.c.r.i.p.t.i.o.n.=.".@.%.p.r.o.g.r.a.m.F.i.l.e.s.%.\.W.i.n.d.o.w.s. .N.T.\.T.a.b.l.e.T.e.x.t.S.e.r.v.i.c.e.\.T.a.b.l.e.T.e.x.t.S.e.r.v.i.c.e...d.l.l.,.-.1.6.".....I.c.o.n.I.n.d.e.x.=.I.C.O.N._.Y.I.........[.C.o.n.f.i.g.u.r.a.t.i.o.n.].....S.h.o.w.I.n.c.r.e.m.e.n.t.a.l.C.a.n.d.i.d.a.t.e.I.m.m.e.d.i.a.t.e.l.y.=.1.....R.e.a.d.i.n.g.W.i.n.d.o.w...W.i.d.t.h.=.3.....F.o.n.t.F.a.c.e.N.a.m.e.=.M.i.c.r.o.s.o.f.t. .Y.i. .B.a.i.t.i.....F.o.n.t.S.i.z.e.=.1.4.........[.P.r.e.s.e.r.v.e.d.K.e.y.].....G.u.i.d.I.m.e.M.o.d.e.=.{.9.8.2.1.3.4.9.4.-.3.6.7.A.-.4.8.5.5.-.9.0.A.1.-.9.7.D.9.1.7.E.3.E.C.3.D.}.....K.e.y.D.e.f.i.n.e.I.m.e.M.o.d.e.=.V.K._.S.H.I.F.T.,. .T.F._.M.O.D._.O.N._.K.E.Y.U.P._.S.H.I.F.T._.O.N.L.Y.....D.e.s.c.r.i.p.t.
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:Generic INItialization configuration [allData0]
                              Category:dropped
                              Size (bytes):6221
                              Entropy (8bit):4.623864089058378
                              Encrypted:false
                              SSDEEP:96:KGz5QTZR5ATsj5sjc9sjnljnDQcaufEjnOAvtDAvVY:BzmTZbAojyjnjljspu8jXvtMvVY
                              MD5:CA003CF1D99CDF717768E88DD64BB84C
                              SHA1:A0326E46EA68C4649DD6645368B43922B6126FF6
                              SHA-256:44100D5F41FE4CDDD1D77EF7124FEC4F8071E5A1678339ACE0DA3DD7E826EF2F
                              SHA-512:94D1EB659C22A3614F250C79D1C957876A617158BE538E35E906F12E68C6E12CCBE9C364D1F1C18D280F72FD7958D753348C056CAF320B6843EC3873B59C9926
                              Malicious:false
                              Preview:[Config]..modeIndex=1..allIndex=1..wasdIndex=0..qwerIndex=0..fourIndex=0..syncIndex=0....[allData0]..ColorR=255..ColorG=0..ColorB=0..Color2R=0..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=0..TemperatureH=0..TemperatureL=0..StrobingRandom=0....[allData1]..ColorR=8..ColorG=255..ColorB=240..Color2R=255..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=0..TemperatureH=0..TemperatureL=0..StrobingRandom=0....[allData2]..ColorR=255..ColorG=0..ColorB=0..Color2R=0..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=0..TemperatureH=0..TemperatureL=0..StrobingRandom=0....[allData3]..ColorR=0..ColorG=0..ColorB=0..Color2R=0..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=3..TemperatureH=0..Tempe
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                              Category:dropped
                              Size (bytes):69632
                              Entropy (8bit):4.63717105728589
                              Encrypted:false
                              SSDEEP:768:5U0SzA63tPY1AcbERQzuahkbzM7hX2O4HvypROPzMiibjUsqK0M49uo:5OU63tPY114RX3M7MvPy/OPz/CF09F
                              MD5:299DBB927B6390C6B925757DD5B2B7FF
                              SHA1:FFCE563E42AF7B1086CB5AE92014801B2C66DC0C
                              SHA-256:D9D2BD64DE6176B31A4E704D7E5D08FA9BB75A6A8AC007A61C4DF38F6FA82262
                              SHA-512:E88F9DA34960BC13C27F2B236A28410AC8B71619D8175103D0BD5E7F03F395F773BCDF399E805D2150BECF2EE107147287D6FE0C00BD41AC591F868E62296347
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<..R...R...R......R..P...R.Rich..R.PE..d................." .........................................................0.......Z....`.......................................................... ..................................8............................................................................rdata..............................@..@.rsrc........ ......................@..@................T...8...8...................$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01..... .......rsrc$02.... .....A..R...)h.s.V.2..d.v.9...............................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, components 3
                              Category:dropped
                              Size (bytes):7968
                              Entropy (8bit):7.906040167483731
                              Encrypted:false
                              SSDEEP:192:oXRXorJ1fquj4/Ms9hHCQyTscIhlMN58ZB5oEx5/U8qn8kyx:KRoqu0ksEIhCOjZU8M8kM
                              MD5:162F6BB32D6D5AC380A80DA07C13E213
                              SHA1:7985EAC367E0B19CC0E30B24399A37663E8436F6
                              SHA-256:686310A1A5B8BB4D4EAA316FC0A3970EE878CC39F75E8C68F49ED51A5AD562DF
                              SHA-512:F4DC70FB483303906CA8C4D5AE404653C7B761BEB38B3DC88ABDEBED4B28A85F3A02F6E2E1E5D28A1625F09A8EEA7A66F12959AA12E98733023CE5908B9FF199
                              Malicious:false
                              Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..5...l...K.4.....t{.k..........^SD'...g....H.7.......d....=.....RmQ..{.x.. .mj....|Z.m'.|;<l.ykc...j.0X.h...f.O,..M.K.>.xG.......K..sZ...H|U.j.Z...y?,.m.n.[...l...J.(..QUG...(...z_....#....Ys=....?......>....?.}.;.V..@7.*.5..-.O...o.\F.....v.........~)...c}.O.....}b.%.........>a..Z.di.l.cH|.a
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:ASCII text, with very long lines (57606), with no line terminators
                              Category:dropped
                              Size (bytes):57606
                              Entropy (8bit):2.670628012232385
                              Encrypted:false
                              SSDEEP:768:Ip+EachJRWeyBP/QmazA5Bnh+QuGkvrOYKT2Rrt6UptqyBcerao1CEzSkNu8R2QP:uquzgxiGXNyHlqgdeo1CtNQP
                              MD5:1EE3EA9EB5F7142B93FE99689B2038A6
                              SHA1:AB0D94BDBDC97EEA61B226010584C12D9AED43EA
                              SHA-256:67D1985FCBEB4E6FB84785F6304B3CB63A9326B328921E04CCFD50539825FDB7
                              SHA-512:BBC7EAEA47011BB96FD26ADB3B71F981AE20FDACCF1A72BAFE96EC8E3071AD29AE052B279465FA700B3AD327DC2EA97408B52FD5A0D73B716F21FCD500D30B67
                              Malicious:false
                              Preview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
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):251376
                              Entropy (8bit):5.684541726348285
                              Encrypted:false
                              SSDEEP:3072:njOJemjvYiYtrWTovAYYYlDvNYXzMgv9/PuMKISOe1sWQuCyY+2JHfYavRkRYI1N:n+6v671nuMKRv1sHyaJ/YavRkRYIBYA1
                              MD5:B44ED270A186763E1DA753AA39553B68
                              SHA1:10390F85EA5DB841A8BC70E8ED931A5D34026BE8
                              SHA-256:E24E9B9C79199B66B9F847F1E07A2769B82CB7FCCA98E5B53F28B481EEBCABD8
                              SHA-512:0BF049851CBD5D29221E7C721F15E58286C030023A9BF66E88A5EE6D4D940F89CBBFB8A4E0376382472940450D631E7E3D0162C871443CA12169DFED4E7C91B5
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......43..pR..pR..pR..y*^.qR..y*N.xR....sR....}R....xR..pR..-S....wR......JR..pR..dR......zR......oR......qR......qR..pRJ.qR......qR..RichpR..................PE..L...L..V...........!......................................................................@..........................P.......A...................................+......8...........................@...@............................................text............................... ..`.rdata..=A.......B..................@..@.data...D....`.......F..............@....rsrc............ ...V..............@..@.reloc...G.......H...v..............@..B........................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):384128
                              Entropy (8bit):5.921054568677329
                              Encrypted:false
                              SSDEEP:6144:zJteC/kw/VKk3g6ZK5RoyPAzv2B9NAlYRuKJOllo:zreCsO3g6QRoyPAw6eRh
                              MD5:7E49C04017D860D5EE299FFB104203DF
                              SHA1:DDF55616BDABC91EB801CE14A45ACDAD2142B78F
                              SHA-256:1AC6E64459440B6EFB03FC256E24BCCBBC512CF6E7DCD85DD3C45E1CA7584176
                              SHA-512:EC125C3CD1EDE0F4C24915BC39EA641F58F1D78048E0CCB631F249839440218B02706CC8ACA785DA2B3993EDBABEFB433BF19BA29A9F1EDFB6ACACBDDC0A4F50
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........p...p...p....j..p...?...p.......p.......p.......p...p...p.......p.......p.......p..Rich.p..........................PE..d....=.N.........." ..... ..........L........................................@............@.......................................................... ..........@............0......`E...............................................@..............|E..H............text............................... ..`.nep......... ...................... ..`.rdata..v....@.......$..............@..@.data....<..........................@....pdata..@...........................@..@.rsrc........ ......................@..@.reloc..`....0......................@..B................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, components 3
                              Category:dropped
                              Size (bytes):782753
                              Entropy (8bit):7.972739118836816
                              Encrypted:false
                              SSDEEP:12288:1xE6g9kiViGNq+W6nQNIDO0tVGb34eaR6fUnMlkTFztQywzV0jyB4Dl9l+qfkwPN:7E6G3VibpHIdebodR6jlKFtQVUv+iP8S
                              MD5:E269DECCAC13CF01A0377872E79BC676
                              SHA1:54D196FDE9529310F9E5A3EBA6548DAB4F179542
                              SHA-256:255874E0A6A5CA862CBAE5C783D582729B343C70C5697062D7F1E587F15F25EC
                              SHA-512:08ADAD38BE3472CF8814C40F99D6DCFDA313C2FED765B872AA30C0995B027F2BEDABF75DB625F3C40F003A8EFC3F41169CBA4AF706EC637018DEEF02EC92F6CC
                              Malicious:false
                              Preview:......JFIF.....`.`.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):7.9924781293877105
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:DHL04AWB01173903102023PDF.scr.exe
                              File size:1211760
                              MD5:1bf124cc783ff47a91ada4e6d4ac9e6b
                              SHA1:b78f2ffb785071ab785830cdd4cbc5f010b7480b
                              SHA256:494d5735144af171cc15708b37b491b74be1522494958e605ac348dd4897dcf9
                              SHA512:b5e35fda41aedb7c40961098745153efa13470d065ac2cfb343c542011ed58869494770615db8a7e4b64b77ac6dd2de4f1cfd1403efeceee8425993bdf66670b
                              SSDEEP:24576:7RNsMRW/uL9M7e36FgHRcMSbA22c91uwozF2KDQcvhNfSf7a09Xe+bUe:c4suGm6SxcD2SczF2aQcffSDb99
                              TLSH:214533D212E2B0B3D690D93B5D5D6E7EE173D60014B2274B7340A8AE6F38165AB1F374
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....e.Q.................`...*.......3.......p....@
                              Icon Hash:74f0d0c0ccd4f0c4
                              Entrypoint:0x40331c
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x519965DC [Sun May 19 23:53:00 2013 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:17b7d61bda0f7478e36d9ce3d4170680
                              Signature Valid:false
                              Signature Issuer:E=inertnesses@Forbetoning20.En, OU="Falskspillere Unrelinquishable ", O=Inalterableness, L=Montague, S=Texas, C=US
                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                              Error Number:-2146762487
                              Not Before, Not After
                              • 10/07/2022 06:04:55 09/07/2025 06:04:55
                              Subject Chain
                              • E=inertnesses@Forbetoning20.En, OU="Falskspillere Unrelinquishable ", O=Inalterableness, L=Montague, S=Texas, C=US
                              Version:3
                              Thumbprint MD5:B6296BD55FD696653A6ECFD645239E12
                              Thumbprint SHA-1:7B9D3A3205DB42A6F338C423028B131EDDD4F064
                              Thumbprint SHA-256:F7E0D7AFE23FD9E15D7B7C6CB47B4662581AE209B91E9046AE6A7AAFDC37720B
                              Serial:04D25D90CEF83AEC304DC1F83B1B5CCF54893695
                              Instruction
                              sub esp, 000002D4h
                              push ebx
                              push ebp
                              push esi
                              push edi
                              push 00000020h
                              xor ebp, ebp
                              pop esi
                              mov dword ptr [esp+18h], ebp
                              mov dword ptr [esp+10h], 00409230h
                              mov dword ptr [esp+14h], ebp
                              call dword ptr [00407034h]
                              push 00008001h
                              call dword ptr [004070BCh]
                              push ebp
                              call dword ptr [004072ACh]
                              push 00000008h
                              mov dword ptr [00429298h], eax
                              call 00007F3C8C223C0Dh
                              mov dword ptr [004291E4h], eax
                              push ebp
                              lea eax, dword ptr [esp+34h]
                              push 000002B4h
                              push eax
                              push ebp
                              push 00420690h
                              call dword ptr [0040717Ch]
                              push 0040937Ch
                              push 004281E0h
                              call 00007F3C8C223878h
                              call dword ptr [00407134h]
                              mov ebx, 00434000h
                              push eax
                              push ebx
                              call 00007F3C8C223866h
                              push ebp
                              call dword ptr [0040710Ch]
                              cmp word ptr [00434000h], 0022h
                              mov dword ptr [004291E0h], eax
                              mov eax, ebx
                              jne 00007F3C8C220D6Ah
                              push 00000022h
                              mov eax, 00434002h
                              pop esi
                              push esi
                              push eax
                              call 00007F3C8C2232D4h
                              push eax
                              call dword ptr [00407240h]
                              mov dword ptr [esp+1Ch], eax
                              jmp 00007F3C8C220E29h
                              push 00000020h
                              pop edx
                              cmp cx, dx
                              jne 00007F3C8C220D69h
                              inc eax
                              inc eax
                              cmp word ptr [eax], dx
                              je 00007F3C8C220D5Bh
                              add word ptr [eax], 0000h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x7fc0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x1273680xa08
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x5e1c0x6000False0.6542561848958334data6.407290112650426IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x70000x13540x1400False0.43046875data5.037834422880877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x90000x202d80x600False0.47265625data3.7587363087821926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x2a0000x240000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x4e0000x7fc00x8000False0.949371337890625data7.7369782578420665IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x4e1d80x7562PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                              RT_DIALOG0x557400x100dataEnglishUnited States
                              RT_DIALOG0x558400xf8dataEnglishUnited States
                              RT_DIALOG0x559380x60dataEnglishUnited States
                              RT_GROUP_ICON0x559980x14dataEnglishUnited States
                              RT_VERSION0x559b00x25cdataEnglishUnited States
                              RT_MANIFEST0x55c100x3b0XML 1.0 document, ASCII text, with very long lines (944), with no line terminatorsEnglishUnited States
                              DLLImport
                              KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, MultiByteToWideChar, FindClose, MulDiv, ReadFile, WriteFile, lstrlenA, WideCharToMultiByte
                              USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                              SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                              ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                              ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                              VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 16, 2023 18:16:32.855799913 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:32.855892897 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:32.856173992 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:32.892891884 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:32.892925024 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:32.923475981 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:32.923746109 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:32.998830080 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:32.999624014 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:32.999752045 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.002515078 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.044373989 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149128914 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149300098 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149307966 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.149344921 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149530888 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.149555922 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149621964 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149730921 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.149741888 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149755955 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149817944 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149876118 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.149877071 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.149928093 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.149954081 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150018930 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150023937 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150115013 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150151014 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150216103 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150234938 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150258064 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150312901 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150312901 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150335073 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150351048 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150408983 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150420904 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150563002 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150618076 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150651932 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150770903 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150845051 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.150863886 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.150959969 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.151051044 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.151061058 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.151249886 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.158143044 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158267975 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158310890 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.158346891 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158502102 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158526897 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.158559084 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158675909 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158715963 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.158751011 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158859968 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.158864021 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158893108 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.158914089 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159070969 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159224987 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159241915 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.159450054 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159468889 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.159490108 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.159651995 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.159673929 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159687996 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.159722090 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159722090 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.159960032 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.160126925 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.160279036 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.160310030 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.160330057 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.160459995 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.160495043 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.160514116 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.160682917 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.161186934 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.161312103 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.161365032 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.161365032 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.161395073 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.161439896 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.161452055 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.161452055 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.161679029 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.161689043 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.161859989 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.167423964 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.167570114 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.167570114 CET49828443192.168.11.20162.159.129.233
                              Mar 16, 2023 18:16:33.167584896 CET44349828162.159.129.233192.168.11.20
                              Mar 16, 2023 18:16:33.167656898 CET44349828162.159.129.233192.168.11.20
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 16, 2023 18:16:32.845144033 CET5126953192.168.11.209.9.9.9
                              Mar 16, 2023 18:16:32.848450899 CET53512699.9.9.9192.168.11.20
                              Mar 16, 2023 18:16:33.308228970 CET6329553192.168.11.209.9.9.9
                              Mar 16, 2023 18:16:33.572099924 CET53632959.9.9.9192.168.11.20
                              Mar 16, 2023 18:17:35.652198076 CET5178853192.168.11.209.9.9.9
                              Mar 16, 2023 18:17:35.834234953 CET53517889.9.9.9192.168.11.20
                              Mar 16, 2023 18:18:36.607264996 CET5592553192.168.11.209.9.9.9
                              Mar 16, 2023 18:18:36.712701082 CET53559259.9.9.9192.168.11.20
                              Mar 16, 2023 18:19:37.093964100 CET6427053192.168.11.209.9.9.9
                              Mar 16, 2023 18:19:37.198772907 CET53642709.9.9.9192.168.11.20
                              Mar 16, 2023 18:20:37.471440077 CET6262853192.168.11.209.9.9.9
                              Mar 16, 2023 18:20:38.486324072 CET6262853192.168.11.201.1.1.1
                              Mar 16, 2023 18:20:38.593599081 CET53626281.1.1.1192.168.11.20
                              Mar 16, 2023 18:21:47.112127066 CET5885353192.168.11.201.1.1.1
                              Mar 16, 2023 18:21:47.225806952 CET53588531.1.1.1192.168.11.20
                              Mar 16, 2023 18:22:52.644807100 CET5353253192.168.11.201.1.1.1
                              Mar 16, 2023 18:22:52.755912066 CET53535321.1.1.1192.168.11.20
                              Mar 16, 2023 18:23:53.178380013 CET5231553192.168.11.201.1.1.1
                              Mar 16, 2023 18:23:53.289233923 CET53523151.1.1.1192.168.11.20
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Mar 16, 2023 18:16:32.845144033 CET192.168.11.209.9.9.90x6e97Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:16:33.308228970 CET192.168.11.209.9.9.90x43c7Standard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:17:35.652198076 CET192.168.11.209.9.9.90x8dddStandard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:18:36.607264996 CET192.168.11.209.9.9.90x750bStandard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:19:37.093964100 CET192.168.11.209.9.9.90x2197Standard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:20:37.471440077 CET192.168.11.209.9.9.90xccb6Standard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:20:38.486324072 CET192.168.11.201.1.1.10xccb6Standard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:21:47.112127066 CET192.168.11.201.1.1.10xcb7eStandard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:22:52.644807100 CET192.168.11.201.1.1.10xb589Standard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              Mar 16, 2023 18:23:53.178380013 CET192.168.11.201.1.1.10x286Standard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Mar 16, 2023 18:16:32.848450899 CET9.9.9.9192.168.11.200x6e97No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:16:32.848450899 CET9.9.9.9192.168.11.200x6e97No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:16:32.848450899 CET9.9.9.9192.168.11.200x6e97No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:16:32.848450899 CET9.9.9.9192.168.11.200x6e97No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:16:32.848450899 CET9.9.9.9192.168.11.200x6e97No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:16:33.572099924 CET9.9.9.9192.168.11.200x43c7No error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:17:35.834234953 CET9.9.9.9192.168.11.200x8dddNo error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:18:36.712701082 CET9.9.9.9192.168.11.200x750bNo error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:19:37.198772907 CET9.9.9.9192.168.11.200x2197No error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:20:38.593599081 CET1.1.1.1192.168.11.200xccb6No error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:21:47.225806952 CET1.1.1.1192.168.11.200xcb7eNo error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:22:52.755912066 CET1.1.1.1192.168.11.200xb589No error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              Mar 16, 2023 18:23:53.289233923 CET1.1.1.1192.168.11.200x286No error (0)milliondollar23.duckdns.org79.134.225.111A (IP address)IN (0x0001)false
                              • cdn.discordapp.com

                              Click to jump to process

                              Target ID:1
                              Start time:18:16:00
                              Start date:16/03/2023
                              Path:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              Imagebase:0x400000
                              File size:1211760 bytes
                              MD5 hash:1BF124CC783FF47A91ADA4E6D4AC9E6B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.5987381198.0000000006C55000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:4
                              Start time:18:16:21
                              Start date:16/03/2023
                              Path:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
                              Imagebase:0x400000
                              File size:1211760 bytes
                              MD5 hash:1BF124CC783FF47A91ADA4E6D4AC9E6B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.10716301559.0000000004772000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              No disassembly