Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rechung-R1663322504.exe

Overview

General Information

Sample Name:Rechung-R1663322504.exe
Analysis ID:829392
MD5:11b5b208de7a85b46104a0597c5da7dc
SHA1:c578bc317e666159cbfc191cb4e50de2de03ab79
SHA256:0a80ba418f561098477e18cc42ddfc31796b2be3166ff6c99967b98388fe4826
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected BrowserPasswordDump
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
May check the online IP address of the machine
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Enables debug privileges
AV process strings found (often used to terminate AV products)
Found inlined nop instructions (likely shell or obfuscated code)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
PE / OLE file has an invalid certificate
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • Rechung-R1663322504.exe (PID: 6340 cmdline: C:\Users\user\Desktop\Rechung-R1663322504.exe MD5: 11B5B208DE7A85B46104A0597C5DA7DC)
    • CasPol.exe (PID: 6560 cmdline: C:\Users\user\Desktop\Rechung-R1663322504.exe MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
    • CasPol.exe (PID: 3312 cmdline: C:\Users\user\Desktop\Rechung-R1663322504.exe MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
    • CasPol.exe (PID: 5220 cmdline: C:\Users\user\Desktop\Rechung-R1663322504.exe MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
      • conhost.exe (PID: 5764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • dw20.exe (PID: 9028 cmdline: dw20.exe -x -s 2584 MD5: 89106D4D0BA99F770EAFE946EA81BB65)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmpHKTL_NET_GUID_BrowserPassDetects c# red/black-team tools via typelibguidArnim Rupp (https://github.com/ruppde)
  • 0x35a3:$typelibguid0: 3cb59871-0dce-453b-857a-2d1e515b0b66
00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
    00000007.00000002.52540526737.0000000034E8C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
      00000007.00000002.52560446262.0000000036F71000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
        00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          7.2.CasPol.exe.37520000.3.unpackHKTL_NET_GUID_BrowserPassDetects c# red/black-team tools via typelibguidArnim Rupp (https://github.com/ruppde)
          • 0x17a3:$typelibguid0: 3cb59871-0dce-453b-857a-2d1e515b0b66
          7.2.CasPol.exe.37520000.3.unpackJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
            7.2.CasPol.exe.37520000.3.raw.unpackHKTL_NET_GUID_BrowserPassDetects c# red/black-team tools via typelibguidArnim Rupp (https://github.com/ruppde)
            • 0x35a3:$typelibguid0: 3cb59871-0dce-453b-857a-2d1e515b0b66
            7.2.CasPol.exe.37520000.3.raw.unpackJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
              No Sigma rule has matched
              Timestamp:192.168.11.20158.101.44.24249845802039190 03/18/23-05:38:08.943594
              SID:2039190
              Source Port:49845
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Rechung-R1663322504.exeReversingLabs: Detection: 30%
              Source: Rechung-R1663322504.exeVirustotal: Detection: 37%Perma Link
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_370F1C22 CryptUnprotectData,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_370F1BF9 CryptUnprotectData,
              Source: Rechung-R1663322504.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
              Source: unknownHTTPS traffic detected: 142.250.184.206:443 -> 192.168.11.20:49843 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.217.16.129:443 -> 192.168.11.20:49844 version: TLS 1.2
              Source: Rechung-R1663322504.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: D:\Development\Releases\Json\Working\Src\Newtonsoft.Json\bin\Release\DotNet20\7d562147-cd91-4fc9-8abf-f0e85d79adad\Newtonsoft.Json.Net20.pdb source: CasPol.exe, 00000007.00000002.52546988980.0000000035EB7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034EBB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.0000000035F86000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52561889914.0000000037600000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\Users\C L A Y\Desktop\BrowserPass-master\BrowserPass\obj\Debug\BrowserPass.pdb source: CasPol.exe, 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: -Cl#"costura.browserpass.pdb.compressed source: CasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\C L A Y\Desktop\BrowserPass-master\BrowserPass\obj\Debug\BrowserPass.pdbPUjU \U_CorDllMainmscoree.dll source: CasPol.exe, 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: -Cl-,costura.newtonsoft.json.net20.pdb.compressed,)Cl| source: CasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00402862 FindFirstFileW,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_004065A2 FindFirstFileW,FindClose,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer Shortcuts
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2C109h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2AB79h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D23F79h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D20769h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D24C69h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2B869h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D29171h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D22599h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D23289h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D22E39h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D23B29h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2A729h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D28459h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D21459h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D29E61h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D22149h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D21CF9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D229E9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2B419h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D24819h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D20319h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D28D21h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D21009h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D29A11h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D20BB9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2BCB9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D295C1h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D218A9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2A2DAh
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D236D9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D2AFC9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D243C9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 00D288D1h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2DF29h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2F4B9h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F22971h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F223E3h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then mov esp, ebp
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then mov esp, ebp
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2DBCDh
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2E379h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F22971h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2FD59h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2F909h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2F069h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F22971h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2EC19h
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4x nop then jmp 36F2E7C9h

              Networking

              barindex
              Source: TrafficSnort IDS: 2039190 ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.11.20:49845 -> 158.101.44.242:80
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-l HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eu361v7891419i1as1r1dl2nqlomasvu/1679114250000/12853136832670220481/*/1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-l?e=download&uuid=687b7ba6-caf7-4f82-8267-8cb96e77380a HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-04-c4-docs.googleusercontent.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
              Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: Rechung-R1663322504.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
              Source: Rechung-R1663322504.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
              Source: Rechung-R1663322504.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
              Source: CasPol.exe, 00000007.00000003.52341294724.000000000429A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52522416612.00000000042B3000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52345673392.00000000042B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: CasPol.exe, 00000007.00000003.52341294724.000000000429A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52345673392.00000000042AE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52522416612.00000000042AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: CasPol.exe, 00000007.00000003.52345673392.0000000004296000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
              Source: CasPol.exe, 00000007.00000002.52560446262.0000000036F51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
              Source: CasPol.exe, 00000007.00000002.52560446262.0000000036F51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
              Source: CasPol.exe, 00000007.00000002.52561889914.0000000037600000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
              Source: Rechung-R1663322504.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: Rechung-R1663322504.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
              Source: Rechung-R1663322504.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
              Source: Rechung-R1663322504.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
              Source: Rechung-R1663322504.exeString found in binary or memory: http://subca.ocsp-certum.com01
              Source: Rechung-R1663322504.exeString found in binary or memory: http://subca.ocsp-certum.com02
              Source: Rechung-R1663322504.exeString found in binary or memory: http://subca.ocsp-certum.com05
              Source: Amcache.hve.LOG1.9.dr, Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
              Source: Rechung-R1663322504.exeString found in binary or memory: http://www.certum.pl/CPS0
              Source: CasPol.exe, 00000007.00000002.52522416612.0000000004268000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52345673392.00000000042C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-04-c4-docs.googleusercontent.com/
              Source: CasPol.exe, 00000007.00000002.52522416612.00000000042E0000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52341294724.00000000042E4000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52345673392.00000000042E1000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52522416612.0000000004283000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-04-c4-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eu361v78
              Source: CasPol.exe, 00000007.00000002.52522416612.000000000422B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
              Source: CasPol.exe, 00000007.00000002.52522416612.0000000004268000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52537250560.0000000033B30000.00000004.00001000.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52522416612.000000000422B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-l
              Source: CasPol.exe, 00000007.00000002.52522416612.0000000004268000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-lf0
              Source: CasPol.exe, 00000007.00000002.52522416612.000000000422B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-lha
              Source: CasPol.exe, 00000007.00000002.52522416612.0000000004268000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-ltsvcs
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034EBB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E3B000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034EBB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E3B000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.0000000036246000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.000000003625C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034EB1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034EBB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E3B000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
              Source: CasPol.exe, 00000007.00000002.52546988980.0000000036246000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.000000003625C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/P
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034EBB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E3B000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.0000000036246000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.000000003625C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
              Source: CasPol.exe, 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
              Source: unknownDNS traffic detected: queries for: drive.google.com
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_34B6A09A recv,
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-l HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eu361v7891419i1as1r1dl2nqlomasvu/1679114250000/12853136832670220481/*/1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-l?e=download&uuid=687b7ba6-caf7-4f82-8267-8cb96e77380a HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-04-c4-docs.googleusercontent.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 142.250.184.206:443 -> 192.168.11.20:49843 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.217.16.129:443 -> 192.168.11.20:49844 version: TLS 1.2
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
              Source: Rechung-R1663322504.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 7.2.CasPol.exe.37520000.3.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_BrowserPass date = 2020-12-28, author = Arnim Rupp (https://github.com/ruppde), description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/jabiel/BrowserPass, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 7.2.CasPol.exe.37520000.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_BrowserPass date = 2020-12-28, author = Arnim Rupp (https://github.com/ruppde), description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/jabiel/BrowserPass, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_BrowserPass date = 2020-12-28, author = Arnim Rupp (https://github.com/ruppde), description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/jabiel/BrowserPass, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2584
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile created: C:\Windows\SysWOW64\ArbejdsglderneJump to behavior
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00404C3F
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D25C78
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D26778
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D27460
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2BE60
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D24E10
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2A8D0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D23CD0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D22FD0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D204C0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D249C0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2B5C0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2A8C0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D28EC8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D23CCE
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D222F0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D215F0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D263FA
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D222E2
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D22FE0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D22B90
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D21E9E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D23880
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2A480
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D22B80
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D281B0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D211B0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D249B0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D29BB8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D28EB9
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D204BE
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2B5BE
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D211A0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D21EA0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D281A0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D29BA9
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D20D50
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D21A50
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2BE55
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D29759
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D22740
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D21A4E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2B170
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D24570
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D20070
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D28A76
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D28A78
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2387E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2A47E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D20D60
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2B161
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2456A
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D29768
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D25C68
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D26769
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D20910
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2BA10
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D24110
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D20011
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2AD16
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D29318
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D28619
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D26400
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D21600
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D20906
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2BA0B
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D29309
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D22732
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2A030
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D23430
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2AD20
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D24120
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2A020
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D2342B
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_00D28628
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F212E8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F296A0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F22C83
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2DC70
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2F200
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F265C8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2212B
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F264D0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2CED0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2E0C0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F29ECB
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F25EA0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F214A8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2FAAE
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F29690
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F25E9E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F25A79
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2F650
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F26C19
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2B408
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2ABF3
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2B3F8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2C3E8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2C3DA
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2EDB0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F265B7
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2E961
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2BD40
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2BD30
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2E510
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2910F
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_34B6A67E NtQuerySystemInformation,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_34B6A64D NtQuerySystemInformation,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeSection loaded: edgegdi.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: edgegdi.dll
              Source: Rechung-R1663322504.exeStatic PE information: invalid certificate
              Source: Rechung-R1663322504.exeReversingLabs: Detection: 30%
              Source: Rechung-R1663322504.exeVirustotal: Detection: 37%
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile read: C:\Users\user\Desktop\Rechung-R1663322504.exeJump to behavior
              Source: Rechung-R1663322504.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\Rechung-R1663322504.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2584
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2584
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_34B6A502 AdjustTokenPrivileges,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_34B6A4CB AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile created: C:\Users\user\SocialdirektrerJump to behavior
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile created: C:\Users\user\AppData\Local\Temp\nsxF7C5.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/15@3/3
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_004020FE CoCreateInstance,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_004046C3 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ffc00a26ff38e37b47b2c75f92b48929\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5764:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5764:304:WilStaging_02
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile written: C:\Windows\assembly\Desktop.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
              Source: Rechung-R1663322504.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: D:\Development\Releases\Json\Working\Src\Newtonsoft.Json\bin\Release\DotNet20\7d562147-cd91-4fc9-8abf-f0e85d79adad\Newtonsoft.Json.Net20.pdb source: CasPol.exe, 00000007.00000002.52546988980.0000000035EB7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52540526737.0000000034EBB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52546988980.0000000035F86000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52561889914.0000000037600000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\Users\C L A Y\Desktop\BrowserPass-master\BrowserPass\obj\Debug\BrowserPass.pdb source: CasPol.exe, 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: -Cl#"costura.browserpass.pdb.compressed source: CasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\C L A Y\Desktop\BrowserPass-master\BrowserPass\obj\Debug\BrowserPass.pdbPUjU \U_CorDllMainmscoree.dll source: CasPol.exe, 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: -Cl-,costura.newtonsoft.json.net20.pdb.compressed,)Cl| source: CasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000001.00000002.52371090291.000000000690B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A8BC82 pushfd ; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A8BEFE push EC8D5275h; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A88800 push eax; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A87879 pushad ; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A8104B push es; ret
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A80DBC push es; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A877CD push edi; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A89B29 push esi; retf
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_3_00A8A162 pushad ; retf 0029h
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_10002DE0 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2FAA2 push esp; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2203B push ebp; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F22013 push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F22011 push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21FE8 push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F2C3DA push 36F2C3BDh; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21FC1 push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21F99 push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21D47 push edx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21D4B push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21D4F push ebx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F22121 push edi; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 7_2_36F21D01 push ecx; ret
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile created: C:\Users\user\AppData\Local\Temp\nsiF853.tmp\AdvSplash.dllJump to dropped file
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile created: C:\Users\user\AppData\Local\Temp\nsiF853.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Program Files\qga\qga.exe
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
              Source: Rechung-R1663322504.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
              Source: Rechung-R1663322504.exe, 00000001.00000002.52369801898.0000000000A7F000.00000004.00000020.00020000.00000000.sdmp, Rechung-R1663322504.exe, 00000001.00000003.52267232301.0000000000A7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE1
              Source: Rechung-R1663322504.exe, Rechung-R1663322504.exe, 00000001.00000002.52369801898.0000000000A7F000.00000004.00000020.00020000.00000000.sdmp, Rechung-R1663322504.exe, 00000001.00000003.52267232301.0000000000A7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00402862 FindFirstFileW,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_004065A2 FindFirstFileW,FindClose,
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeSystem information queried: ModuleInformation
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer Shortcuts
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
              Source: CasPol.exe, 00000007.00000002.52522416612.000000000422B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52522416612.0000000004283000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Rechung-R1663322504.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
              Source: Rechung-R1663322504.exe, 00000001.00000002.52369801898.0000000000A7F000.00000004.00000020.00020000.00000000.sdmp, Rechung-R1663322504.exe, 00000001.00000003.52267232301.0000000000A7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe1
              Source: Rechung-R1663322504.exe, Rechung-R1663322504.exe, 00000001.00000002.52369801898.0000000000A7F000.00000004.00000020.00020000.00000000.sdmp, Rechung-R1663322504.exe, 00000001.00000003.52267232301.0000000000A7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
              Source: Rechung-R1663322504.exe, 00000001.00000002.52425335519.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00406937 GetTickCount,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe base: 1100000
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Users\user\Desktop\Rechung-R1663322504.exe
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2584
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\Rechung-R1663322504.exeCode function: 1_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
              Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.2107.4-0\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 7.2.CasPol.exe.37520000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.CasPol.exe.37520000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.52540526737.0000000034E8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.52560446262.0000000036F71000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 5220, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 5220, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 7.2.CasPol.exe.37520000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.CasPol.exe.37520000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.52540526737.0000000034E8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.52560446262.0000000036F71000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 5220, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              11
              Masquerading
              2
              OS Credential Dumping
              211
              Security Software Discovery
              Remote Services1
              Email Collection
              Exfiltration Over Other Network Medium21
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              System Shutdown/Reboot
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
              Process Injection
              1
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth2
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)1
              DLL Side-Loading
              1
              Disable or Modify Tools
              Security Account Manager1
              System Network Configuration Discovery
              SMB/Windows Admin Shares2
              Data from Local System
              Automated Exfiltration2
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Access Token Manipulation
              NTDS4
              File and Directory Discovery
              Distributed Component Object Model1
              Clipboard Data
              Scheduled Transfer13
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
              Process Injection
              LSA Secrets16
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 829392 Sample: Rechung-R1663322504.exe Startdate: 18/03/2023 Architecture: WINDOWS Score: 100 28 checkip.dyndns.org 2->28 30 checkip.dyndns.com 2->30 32 3 other IPs or domains 2->32 40 Snort IDS alert for network traffic 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected BrowserPasswordDump 2->44 46 3 other signatures 2->46 8 Rechung-R1663322504.exe 2 35 2->8         started        signatures3 process4 file5 24 C:\Users\user\AppData\Local\...\System.dll, PE32 8->24 dropped 26 C:\Users\user\AppData\Local\...\AdvSplash.dll, PE32 8->26 dropped 48 Writes to foreign memory regions 8->48 50 Tries to detect Any.run 8->50 12 CasPol.exe 15 13 8->12         started        16 CasPol.exe 8->16         started        18 CasPol.exe 8->18         started        signatures6 process7 dnsIp8 34 checkip.dyndns.com 158.101.44.242, 49845, 80 ORACLE-BMC-31898US United States 12->34 36 drive.google.com 142.250.184.206, 443, 49843 GOOGLEUS United States 12->36 38 googlehosted.l.googleusercontent.com 172.217.16.129, 443, 49844 GOOGLEUS United States 12->38 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal ftp login credentials 12->54 56 Tries to harvest and steal browser information (history, passwords, etc) 12->56 58 Tries to detect Any.run 12->58 20 dw20.exe 22 12 12->20         started        22 conhost.exe 12->22         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Rechung-R1663322504.exe31%ReversingLabsWin32.Trojan.Tnega
              Rechung-R1663322504.exe38%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nsiF853.tmp\AdvSplash.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsiF853.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              SourceDetectionScannerLabelLink
              checkip.dyndns.com0%VirustotalBrowse
              checkip.dyndns.org0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://subca.ocsp-certum.com010%Avira URL Cloudsafe
              http://checkip.dyndns.org/0%Avira URL Cloudsafe
              http://subca.ocsp-certum.com050%Avira URL Cloudsafe
              http://go.microsoft.0%Avira URL Cloudsafe
              http://subca.ocsp-certum.com020%Avira URL Cloudsafe
              http://go.microsoft.0%VirustotalBrowse
              http://checkip.dyndns.org0%Avira URL Cloudsafe
              http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
              http://checkip.dyndns.org/0%VirustotalBrowse
              http://james.newtonking.com/projects/json0%Avira URL Cloudsafe
              http://crl.micros0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              drive.google.com
              142.250.184.206
              truefalse
                high
                googlehosted.l.googleusercontent.com
                172.217.16.129
                truefalse
                  high
                  checkip.dyndns.com
                  158.101.44.242
                  truetrueunknown
                  doc-04-c4-docs.googleusercontent.com
                  unknown
                  unknownfalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/true
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://doc-04-c4-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eu361v7891419i1as1r1dl2nqlomasvu/1679114250000/12853136832670220481/*/1RhzoPq21Mbz1UprqcH2DXnwFIoRgz7-l?e=download&uuid=687b7ba6-caf7-4f82-8267-8cb96e77380afalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://doc-04-c4-docs.googleusercontent.com/CasPol.exe, 00000007.00000002.52522416612.0000000004268000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52345673392.00000000042C5000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.certum.pl/ctsca2021.crl0oRechung-R1663322504.exefalse
                          high
                          http://repository.certum.pl/ctnca.cer09Rechung-R1663322504.exefalse
                            high
                            https://doc-04-c4-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eu361v78CasPol.exe, 00000007.00000002.52522416612.00000000042E0000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52341294724.00000000042E4000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000003.52345673392.00000000042E1000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.52522416612.0000000004283000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://repository.certum.pl/ctsca2021.cer0Rechung-R1663322504.exefalse
                                high
                                http://crl.certum.pl/ctnca.crl0kRechung-R1663322504.exefalse
                                  high
                                  http://subca.ocsp-certum.com05Rechung-R1663322504.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://drive.google.com/CasPol.exe, 00000007.00000002.52522416612.000000000422B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://subca.ocsp-certum.com02Rechung-R1663322504.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://subca.ocsp-certum.com01Rechung-R1663322504.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://crl.certum.pl/ctnca2.crl0lRechung-R1663322504.exefalse
                                      high
                                      http://repository.certum.pl/ctnca2.cer09Rechung-R1663322504.exefalse
                                        high
                                        https://support.google.com/chrome/?p=plugin_flashCasPol.exe, 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://go.microsoft.CasPol.exe, 00000007.00000002.52560446262.0000000036F51000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://upx.sf.netAmcache.hve.LOG1.9.dr, Amcache.hve.9.drfalse
                                            high
                                            http://checkip.dyndns.orgCasPol.exe, 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://nsis.sf.net/NSIS_ErrorErrorRechung-R1663322504.exefalse
                                              high
                                              http://go.microsoft.LinkId=42127CasPol.exe, 00000007.00000002.52560446262.0000000036F51000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://www.certum.pl/CPS0Rechung-R1663322504.exefalse
                                                high
                                                http://james.newtonking.com/projects/jsonCasPol.exe, 00000007.00000002.52561889914.0000000037600000.00000004.08000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.microsCasPol.exe, 00000007.00000003.52345673392.0000000004296000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                172.217.16.129
                                                googlehosted.l.googleusercontent.comUnited States
                                                15169GOOGLEUSfalse
                                                158.101.44.242
                                                checkip.dyndns.comUnited States
                                                31898ORACLE-BMC-31898UStrue
                                                142.250.184.206
                                                drive.google.comUnited States
                                                15169GOOGLEUSfalse
                                                Joe Sandbox Version:37.0.0 Beryl
                                                Analysis ID:829392
                                                Start date and time:2023-03-18 05:35:01 +01:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 10m 14s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                Number of analysed new started processes analysed:11
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample file name:Rechung-R1663322504.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@10/15@3/3
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:
                                                • Successful, ratio: 62.6% (good quality ratio 61%)
                                                • Quality average: 88%
                                                • Quality standard deviation: 22.1%
                                                HCA Information:
                                                • Successful, ratio: 94%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                • Stop behavior analysis, all processes terminated
                                                • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe, svchost.exe
                                                • TCP Packets have been reduced to 100
                                                • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                                • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wdcp.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                No simulations
                                                No context
                                                No context
                                                No context
                                                No context
                                                No context
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.2686160289713344
                                                Encrypted:false
                                                SSDEEP:192:MCTLeARl7CaUaX+AMWZm9AsrMThITlui1EXuvc4Du76lfAIO82S:FeAR+aOaTMxxDu76lfAIO82
                                                MD5:EB6A187691ECB171BB92C9F8E305FD41
                                                SHA1:9BF86D62729502A98EF78F098BB6361B93D3F193
                                                SHA-256:EC8E0F9FC991A71C6669456807F0CD410DC40AD42C6CFDBB2D85041CF8EE476D
                                                SHA-512:F785180408E5E7AC0BEEA41BCA28C93E23143D08BB8C72585CC9755C76B08CD0EB9BD7CE8D721A2BD5B7828358E0DC3446EC53924E0B0810766B71CF95FF6FDE
                                                Malicious:false
                                                Reputation:low
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.3.5.9.1.4.9.4.6.6.7.4.2.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.3.5.9.1.4.9.5.0.1.1.1.0.7.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.c.6.1.3.c.7.-.d.2.3.f.-.4.7.4.9.-.9.f.0.8.-.8.2.9.c.c.3.a.3.e.2.d.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.c.a.s.p.o.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.4.-.0.0.0.1.-.0.0.1.5.-.c.7.5.4.-.c.5.c.d.5.b.5.9.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.7.9.1.2.9.a.f.7.e.f.a.4.6.2.4.4.d.a.0.6.7.6.6.0.7.2.4.2.f.0.a.6.b.7.e.1.2.e.7.8.!.C.a.s.P.o.l...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.9././.1.0././.2.5.:.0.8.:.5.1.:.3.4.!.2.4.3.b.5.!.C.a.s.P.o.l...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):7620
                                                Entropy (8bit):3.6992698079997943
                                                Encrypted:false
                                                SSDEEP:192:R9l7lZNiWR6IhaL26Ynq6PgmfmFPXp1Qd1fYQm:R9lnNi46IIK6Yq6PgmfqTQff2
                                                MD5:CA48408075A231F52A067DA8CD11513C
                                                SHA1:025231FF1257DEAE25771552FE42E23D301AC397
                                                SHA-256:BC5EC16382F87B2F16A3AFBEB91E1DDD715E80C1D79B016BB3132A464A3AF2A6
                                                SHA-512:8C83A69466BE06D962E5760CDE9ACCC65A63355F2E71EC077F779E5CCFDAA2871928FF06045E4B193E6F4E71FE720FEF3B2B94D28E5647413707BEB8BF7EB27E
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.0.<./.P.i.
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4730
                                                Entropy (8bit):4.477930624054625
                                                Encrypted:false
                                                SSDEEP:48:cvIwwtl8zsYBe702I7VFJ5WS2Cfjkas3rm8M4JFKf6TF2FhO+q8wFvLB8wkd:uILfYI7GySPfIJFKEFgOtFjB8wkd
                                                MD5:3B2723FA6E50F304DAB44C852B06D6A3
                                                SHA1:584FDF4AC4D9CEED31871A830D69D8E3DE05FDC5
                                                SHA-256:58E37D2FBD32637D9BC03C469D6C1A071C6B09275AEC10F56FF20655397AD323
                                                SHA-512:C56613AD635C55E65DED3A7E109E3DF1865DD75824694AA03D56CD1A2CC4C82DD8C0D725220131FF211AE3F21049D0E305092964287063D226FB79606F2E52EB
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222057140" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):6144
                                                Entropy (8bit):4.496995234059773
                                                Encrypted:false
                                                SSDEEP:96:1IUNaXnnXyEIPtXvZhr5RwiULuxDtJ1+wolpE:1Ix3XyEwXvZh1RwnLUDtf+I
                                                MD5:E8B67A37FB41D54A7EDA453309D45D97
                                                SHA1:96BE9BF7A988D9CEA06150D57CD1DE19F1FEC19E
                                                SHA-256:2AD232BCCF4CA06CF13475AF87B510C5788AA790785FD50509BE483AFC0E0BCF
                                                SHA-512:20EFFAE18EEBB2DF90D3186A281FA9233A97998F226F7ADEAD0784FBC787FEEE419973962F8369D8822C1BBCDFB6E7948D9CA6086C9CF90190C8AB3EC97F4C38
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................`$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):11776
                                                Entropy (8bit):5.659384359264642
                                                Encrypted:false
                                                SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                                                MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                                                SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                                                SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                                                SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                Category:dropped
                                                Size (bytes):1280
                                                Entropy (8bit):3.1309064191027343
                                                Encrypted:false
                                                SSDEEP:12:8wl0dsXUCV/tz0/CSLwrHj4/3BVYG02D23ddQ9k1MJsW+AdpiUz6AwCNfBf4t2Yi:8mrWLgD4/BV02De69kqy+pbWAZjJT
                                                MD5:4196863E92696387150E600E60EFC6FB
                                                SHA1:EB522598123ACA565CD764787F652CCAA18132CA
                                                SHA-256:9EE412852B59929D0F10D8647FC2F25A79C7F216578159A43B175BA544FFB4B5
                                                SHA-512:268236CF45F17B2D88517E753960243ECD7F402BE0D9E985929418A86D0A396C840475E8C8470A370FB894A2749A2DD2E752D54F497436B138DF76F09978694A
                                                Malicious:false
                                                Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....t.1...........Printer Shortcuts.T............................................P.r.i.n.t.e.r. .S.h.o.r.t.c.u.t.s... .t.2...........Genoptagelsen.Phi.T............................................G.e.n.o.p.t.a.g.e.l.s.e.n...P.h.i... ...G...\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.P.r.i.n.t.e.r. .S.h.o.r.t.c.u.t.s.\.G.e.n.o.p.t.a.g.e.l
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, components 3
                                                Category:dropped
                                                Size (bytes):10534
                                                Entropy (8bit):7.884822059718216
                                                Encrypted:false
                                                SSDEEP:192:oXRZxdt62XpqRigPYtY0CfKTQlh5NKW6F5oJxfskCjGmXa6Pbplv26Zzkq:KRfdt62X+XoElh/KW6ifskEGeaIp9zkq
                                                MD5:A4530760E13B17372AE0D8CB48F66D0D
                                                SHA1:AA21564FA3A847E59402B62D3F600DDA5046A926
                                                SHA-256:F37F7A75DC27903EA88D1A3912DFB9123CA217E2467EB6D5DC966F60DC7F9DB7
                                                SHA-512:E42C32B412CD4AA560EFED98050F4B2F858190EA8BF56A81311F24C6F0751E2E397F624777E759BC80B1D34BF0AA9ECF6356E26D553D22E503A53CEF76797D43
                                                Malicious:false
                                                Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..9...k....X.....&.2.Z.......k~I.....e...J...}..<..M..8..........".../...O.u...........5.h...71]ZZ......v..Yc...<.i'..m2_..>..#...K...,.qq.^<2|D.V...j..ae.0Mu.^K..#k..3<."FV$HV.)..vmG..H........z.\..#......3_..Wo.g.>.o..........|...V.}.Ho.]...q#..W667Z`..)..l._E'.....+\.w..K....O.o..5......4O..~.
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:ASCII text, with very long lines (35012), with no line terminators
                                                Category:dropped
                                                Size (bytes):35012
                                                Entropy (8bit):2.713079331895783
                                                Encrypted:false
                                                SSDEEP:768:YOYEtjBKsUje7ciMsO9Z/mAXEEEJu+am7Iuxsr6mPpHOEEEEESW0ymwpTiq:d4/98AEMRNPpHrViq
                                                MD5:F75A78EE11492D9F9146075023D485D3
                                                SHA1:772AE864C11AE2C45834F681EFDF662BBD28268B
                                                SHA-256:5916C8773319EA24B225C76FE361D360360CE03E1F61E2E86387514A185BDAF9
                                                SHA-512:BB2D74E9F7D7F02E682E302B115C280C886F4E99789F4E5A198E7B2E973FFBE788559140CC2625EE8F754831497E67038CA327196EC14370968B47828863BD0D
                                                Malicious:false
                                                Preview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
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):225168
                                                Entropy (8bit):7.3676127973119225
                                                Encrypted:false
                                                SSDEEP:3072:NOUzxidFkCI6+rXNfJEow2a5KTa49D1bdzeDZ/7SkPtnWpA2Or1/nD9kS/fmi:s9dFrI6ifJLwV0/9Jd4RSYtWpBanD9kG
                                                MD5:BAFC11E1543369B58D7852857D986EFA
                                                SHA1:A00AD13ECA7F98C1CBBC7AE32151D3878DD2BBB0
                                                SHA-256:F8D1014289006D2ACCAB3D5A1C36CD867B4D6BEC50781365175B4FF8323A5E81
                                                SHA-512:69883FDF36A90C35625D74BF7FE5808AFD1F88314EF60FAB7785C443BD992F72656BB727E3E44503266BECC28A48E0BAF7DF70A6C5CAA10D2B2DFED28C07AA02
                                                Malicious:false
                                                Preview:.................................t..cc..................dd.@@.rr..ZZ.====........vvvvv.""...i..SS...........((.v........dd...............K.................m.................OO..........@@...................00._.............XX...EE..$$.HHHHHH...............................m...................................................nn...........oo.....hhh.................__.............^.7........#.....1..-.......H...J.........???........|..>.^.W.......................H..^^^^^^..???.CCC..n.........nnn.xx................;..................E.....&&&&..............hhh....W............................?.ss....B.b....III.......#...............q........................Q.s...#.........%...nn.EE..............||.......................___...........p......R.88.........................$..........LL......k........................I...''.pp.....:.aa.......]..............&.....jj..`.JJ................................//....e...^^^^^^^^^^^....2.p..........I..................$......oo...............E..............
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                Category:dropped
                                                Size (bytes):183
                                                Entropy (8bit):6.337608034945541
                                                Encrypted:false
                                                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllTV00EDgZ1uP6he3LFIY8roNQh/e9OuTB+Mg1J7d:6v/lhPysY0EeDyLiRroCh/0B+v1MC1jp
                                                MD5:293D1D4F18C3A918A44FAD289715E950
                                                SHA1:BD92A45835DD693FE8D0B72F296FE0134D46B876
                                                SHA-256:553F673950BE4DE71377A297050888D0BE5A997DB334781994C3265EDA30C7B3
                                                SHA-512:E62D45E30997EB18EB3C45BC1574C75462DC4CC36144D4E529F917B6091ADD14F91779F5C428458CEA129EF37B27FDDBBCEA8E5005563DC2AABCB370BEDF2E8C
                                                Malicious:false
                                                Preview:.PNG........IHDR................a....sBIT....|.d....nIDAT8.....0...wp(.....,....J.A[.O....i.4..x d..F.(.N.$ .su.w.C.~..XyZ.|.....k....z`../..aA.<.>....j.. ...=....z....IEND.B`.
                                                Process:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8934
                                                Entropy (8bit):4.259244159879149
                                                Encrypted:false
                                                SSDEEP:192:ia3g0F7SHayJ5vKVEB3Bxg5GteGIxpWNMll39oWvt/i4drxJ4MrZEXSW:iWg0zyJlKVEB3A6SM2mWvt/i4dtJ4MNO
                                                MD5:71D42ABE45803AC9C3DA5FCACF9CC59C
                                                SHA1:98A1049906972ABB480ABAF1F5658C1B8C10F27C
                                                SHA-256:78F5CB9345AB258CF745EAA90D44C7A7A73D3FE06EA182B1298A989135FFA11F
                                                SHA-512:A0096575D6F911CC2600DAC93D6FD7AA8D9E2F9F71A92571A76996FB4C47BDB714BBA453C862B3F42CC5F4BAAF2AED1DFF3C9D6F84A3E2053FF2037C56AB85A5
                                                Malicious:false
                                                Preview:.;!@Lang2@!UTF-8!..; 4.09 : Gabriel Stojanoski..;..;..;..;..;..;..;..;..;..;..0..7-Zip..Macedonian..............401....................&....&....&...................&.........440.... &........ .&............................&........&........&...................... ....... ...... .. ........?..500..&..........&.......&........&.........&........&.......540..&.............. &.............. &........&........&.......&.............&....... .......&........ .......&.........&...... ................&....... .............&.................&.................... .................... ..........&........600............ &................ ...
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):2359296
                                                Entropy (8bit):4.229686725490386
                                                Encrypted:false
                                                SSDEEP:24576:o8pJ5yNYJkymnjNS1O2k5cTBagmcnYJA:o8pJ5yNYJkymnjNQA5mBagmcnYJA
                                                MD5:327F109CCA4114DE4FE63066D46805A7
                                                SHA1:3798C39C38008FB918DCB98DF7DC3C54EC4B17C5
                                                SHA-256:9D4022C4B5D40785C0B700F710E7F9FBFD14BDAAE9613FE4ACCCDF6BF253BD65
                                                SHA-512:EF221FA284132C8638A02BDE73FE05AAF6FBD9F32073947FFD5D9B4680B979DD7BADD816B121BACC6BA53081623163C41DA0CF7C7B9419E5C8C51ECE839CF165
                                                Malicious:false
                                                Preview:regf........5.#.^................... ....P .....\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm...OY..............................................................................................................................................................................................................................................................................................................................................}.{)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):376832
                                                Entropy (8bit):2.6371963290907305
                                                Encrypted:false
                                                SSDEEP:3072:fpFZfwN1/HecetetUuM/aNim4ixiyuiKisiXiPG7ieCNi5gU5zH35Gs3MOx02EnC:fvZoN1vJAO84iTd+v4He3TKz
                                                MD5:8726C4CBDA130722A758F76728527B19
                                                SHA1:7E989D5E29BECA70895BF7F8DCE7ECD5A502B331
                                                SHA-256:3856E2E2811C31B7CFB6872DB96F0E384ECA9C3B6DDE5B9712BFC85D20A2B952
                                                SHA-512:BBF5D267ABC9A6C2A8750B14901D56840CFD00473125732250EB2C22B0F0EA0A4756B30B090A9F182EDFD2F5C0EE862F8DD74CFE66C79378D4DB416DA05CB954
                                                Malicious:false
                                                Preview:regf........5.#.^................... ....P .....\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm...OY..............................................................................................................................................................................................................................................................................................................................................{.{)HvLE.............P ....../.E..d)H."....................@...............@............... ............................... ... ... .. ..hbin................5.#.^...........nk,....S....... .......................................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}......nk ...k.PY......(...........@...............................*...N.......)...InventoryMiscellaneousMemorySlotArrayInfo....................mG.....nk .$4./T....... ...................................
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                                File Type:Windows desktop.ini
                                                Category:dropped
                                                Size (bytes):227
                                                Entropy (8bit):5.2735028737400205
                                                Encrypted:false
                                                SSDEEP:6:a1eZBXVNYTF0NwoScUbtSgyAXIWv7v5PMKq:UeZBFNYTswUq1r5zq
                                                MD5:F7F759A5CD40BC52172E83486B6DE404
                                                SHA1:D74930F354A56CFD03DC91AA96D8AE9657B1EE54
                                                SHA-256:A709C2551B8818D7849D31A65446DC2F8C4CCA2DCBBC5385604286F49CFDAF1C
                                                SHA-512:A50B7826BFE72506019E4B1148A214C71C6F4743C09E809EF15CD0E0223F3078B683D203200910B07B5E1E34B94F0FE516AC53527311E2943654BFCEADE53298
                                                Malicious:false
                                                Preview:; ==++==..; ..; Copyright (c) Microsoft Corporation. All rights reserved...; ..; ==--==..[.ShellClassInfo]..CLSID={1D2680C9-0E2A-469d-B787-065558BC7D43}..ConfirmFileOp=1..InfoTip=Contains application stability information...
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):158
                                                Entropy (8bit):4.298534139898036
                                                Encrypted:false
                                                SSDEEP:3:WNEDkFrA7fwkh07NfORRAzs2VkNatO3MLlDKIEsExLrWwrAXTcFrXX8:WsTbRh07NkMswksKML4IOBWEyIFrc
                                                MD5:95A9765293B395853C7059AB01DA28AE
                                                SHA1:7627EBC68CCE94B1E1CCC826C0D14D8068B3C90D
                                                SHA-256:08E334353322F44FDC19102929B367F4D870F3BC8872F973EAAA8119B6AC771F
                                                SHA-512:47D1F81B3E26D4BC20954268285ACE3DAA970A5B78F3E6F31BF8266F2310702B57CDF285839BACE9635BE31A2479F9126814FFA4E832C2864080A9C8918D9505
                                                Malicious:false
                                                Preview:.Unhandled Exception: System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other memory is corrupt..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.1116261135004395
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Rechung-R1663322504.exe
                                                File size:416280
                                                MD5:11b5b208de7a85b46104a0597c5da7dc
                                                SHA1:c578bc317e666159cbfc191cb4e50de2de03ab79
                                                SHA256:0a80ba418f561098477e18cc42ddfc31796b2be3166ff6c99967b98388fe4826
                                                SHA512:c79e0deeb1686edc5bfe2db026f423277740fe816a674a3111fb36fd4813825a080048b44d03e92310db526a8c791259684778f8dea0861cd9b26e2f5f0b5d23
                                                SSDEEP:6144:16bAcJtT+SdoujpZM5DMJ+VGM1lMwJ1OPH7USLahNcfM9rQ09j3V/PySssz:2APSbyDMOJrOPH7UfnpCSD
                                                TLSH:B694BFA0F620D0DADCB417F16C9FD9211AE76EECE4E0220F65A73259AD736D3051F24A
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                                                Icon Hash:f169e8e4e4ccca88
                                                Entrypoint:0x403350
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:b34f154ec913d2d2c435cbd644e91687
                                                Signature Valid:false
                                                Signature Issuer:E=Departmentalizations@Trisulphide193.Lok, OU="Pasteuriseringens Eternellerne ", O=Stikprvestandardafvigelsernes, L=Dividing Creek, S=New Jersey, C=US
                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                Error Number:-2146762487
                                                Not Before, Not After
                                                • 27/12/2022 11:19:02 26/12/2025 11:19:02
                                                Subject Chain
                                                • E=Departmentalizations@Trisulphide193.Lok, OU="Pasteuriseringens Eternellerne ", O=Stikprvestandardafvigelsernes, L=Dividing Creek, S=New Jersey, C=US
                                                Version:3
                                                Thumbprint MD5:1F7F4BF42A830708AC95921509004FCC
                                                Thumbprint SHA-1:54B3D870C522C1CA544E3D38597EEC9DC6D3C3A0
                                                Thumbprint SHA-256:ED0BD8E407BDD2EB9D4B7BDFEC49D761B0F85D212BDFDC1A3F9981BBA4AD638B
                                                Serial:4122AFC051A99F02AE188FBC961AC5C36F876297
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+14h], ebx
                                                mov dword ptr [esp+10h], 0040A2E0h
                                                mov dword ptr [esp+1Ch], ebx
                                                call dword ptr [004080A8h]
                                                call dword ptr [004080A4h]
                                                and eax, BFFFFFFFh
                                                cmp ax, 00000006h
                                                mov dword ptr [007A8A2Ch], eax
                                                je 00007F40DCB82EE3h
                                                push ebx
                                                call 00007F40DCB86179h
                                                cmp eax, ebx
                                                je 00007F40DCB82ED9h
                                                push 00000C00h
                                                call eax
                                                mov esi, 004082B0h
                                                push esi
                                                call 00007F40DCB860F3h
                                                push esi
                                                call dword ptr [00408150h]
                                                lea esi, dword ptr [esi+eax+01h]
                                                cmp byte ptr [esi], 00000000h
                                                jne 00007F40DCB82EBCh
                                                push 0000000Ah
                                                call 00007F40DCB8614Ch
                                                push 00000008h
                                                call 00007F40DCB86145h
                                                push 00000006h
                                                mov dword ptr [007A8A24h], eax
                                                call 00007F40DCB86139h
                                                cmp eax, ebx
                                                je 00007F40DCB82EE1h
                                                push 0000001Eh
                                                call eax
                                                test eax, eax
                                                je 00007F40DCB82ED9h
                                                or byte ptr [007A8A2Fh], 00000040h
                                                push ebp
                                                call dword ptr [00408044h]
                                                push ebx
                                                call dword ptr [004082A0h]
                                                mov dword ptr [007A8AF8h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 000002B4h
                                                push eax
                                                push ebx
                                                push 0079FEE0h
                                                call dword ptr [00408188h]
                                                push 0040A2C8h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d30000x281f0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x637780x22a0.data
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x3a90000x2a0000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x3d30000x281f00x28200False0.35579731308411217data5.085440369030725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0x3d33100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                                                RT_ICON0x3e3b380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                                                RT_ICON0x3ecfe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                                                RT_ICON0x3f24680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                                                RT_ICON0x3f66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                                                RT_ICON0x3f8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                                                RT_ICON0x3f9ce00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                                                RT_ICON0x3fa6680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                                                RT_DIALOG0x3faad00x120dataEnglishUnited States
                                                RT_DIALOG0x3fabf00x11cdataEnglishUnited States
                                                RT_DIALOG0x3fad100xc4dataEnglishUnited States
                                                RT_DIALOG0x3fadd80x60dataEnglishUnited States
                                                RT_GROUP_ICON0x3fae380x76dataEnglishUnited States
                                                RT_MANIFEST0x3faeb00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                                                DLLImport
                                                KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                192.168.11.20158.101.44.24249845802039190 03/18/23-05:38:08.943594TCP2039190ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check4984580192.168.11.20158.101.44.242
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 18, 2023 05:38:07.192332983 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.192359924 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.192634106 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.205848932 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.205863953 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.243274927 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.243577957 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.244079113 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.244271040 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.301903009 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.303085089 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.303307056 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.306361914 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.348496914 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.686002016 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.686170101 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.686347961 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.686557055 CET44349843142.250.184.206192.168.11.20
                                                Mar 18, 2023 05:38:07.686769009 CET49843443192.168.11.20142.250.184.206
                                                Mar 18, 2023 05:38:07.791002989 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.791033030 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:07.791369915 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.791657925 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.791678905 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:07.834359884 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:07.834547997 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.834606886 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.835166931 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:07.835330009 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.835330009 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.838656902 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.838684082 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:07.839046001 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:07.839221954 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.839565992 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:07.880487919 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.059297085 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.059484959 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.059570074 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.059582949 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.059621096 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.059700012 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.059746981 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.059823990 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.061012030 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.061258078 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.061803102 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.062004089 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.062004089 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.062004089 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.062088013 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.062323093 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.063960075 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.064158916 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.064220905 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.064448118 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.066956043 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.067177057 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.067687035 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.067857027 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.067909002 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.068015099 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.068114996 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.068186998 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.068217993 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.068413973 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.068625927 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.068834066 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.068902969 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.069087982 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.069444895 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.069610119 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.069678068 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.069844007 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.070167065 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.070367098 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.070437908 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.070699930 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.070875883 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.071058989 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.071125031 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.071337938 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.071608067 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.071770906 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.071839094 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.072031021 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.072288036 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.072453976 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.072556973 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.072715998 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.072776079 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.072920084 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.073020935 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.073086023 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.073132038 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.073306084 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.073761940 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.073991060 CET49844443192.168.11.20172.217.16.129
                                                Mar 18, 2023 05:38:08.073998928 CET44349844172.217.16.129192.168.11.20
                                                Mar 18, 2023 05:38:08.074049950 CET44349844172.217.16.129192.168.11.20
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 18, 2023 05:38:07.178211927 CET6044553192.168.11.201.1.1.1
                                                Mar 18, 2023 05:38:07.187526941 CET53604451.1.1.1192.168.11.20
                                                Mar 18, 2023 05:38:07.758445024 CET6323253192.168.11.201.1.1.1
                                                Mar 18, 2023 05:38:07.789558887 CET53632321.1.1.1192.168.11.20
                                                Mar 18, 2023 05:38:08.780349016 CET6501353192.168.11.201.1.1.1
                                                Mar 18, 2023 05:38:08.789386034 CET53650131.1.1.1192.168.11.20
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 18, 2023 05:38:07.178211927 CET192.168.11.201.1.1.10xe0f5Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:07.758445024 CET192.168.11.201.1.1.10xaebbStandard query (0)doc-04-c4-docs.googleusercontent.comA (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.780349016 CET192.168.11.201.1.1.10xce36Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 18, 2023 05:38:07.187526941 CET1.1.1.1192.168.11.200xe0f5No error (0)drive.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:07.789558887 CET1.1.1.1192.168.11.200xaebbNo error (0)doc-04-c4-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                                                Mar 18, 2023 05:38:07.789558887 CET1.1.1.1192.168.11.200xaebbNo error (0)googlehosted.l.googleusercontent.com172.217.16.129A (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.789386034 CET1.1.1.1192.168.11.200xce36No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.789386034 CET1.1.1.1192.168.11.200xce36No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.789386034 CET1.1.1.1192.168.11.200xce36No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.789386034 CET1.1.1.1192.168.11.200xce36No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.789386034 CET1.1.1.1192.168.11.200xce36No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                Mar 18, 2023 05:38:08.789386034 CET1.1.1.1192.168.11.200xce36No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                • drive.google.com
                                                • doc-04-c4-docs.googleusercontent.com
                                                • checkip.dyndns.org

                                                Click to jump to process

                                                Target ID:1
                                                Start time:05:36:55
                                                Start date:18/03/2023
                                                Path:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                Imagebase:0x400000
                                                File size:416280 bytes
                                                MD5 hash:11B5B208DE7A85B46104A0597C5DA7DC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.52371090291.000000000690B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                Target ID:5
                                                Start time:05:38:01
                                                Start date:18/03/2023
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                Imagebase:0xd0000
                                                File size:106496 bytes
                                                MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                Target ID:6
                                                Start time:05:38:01
                                                Start date:18/03/2023
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                Imagebase:0x490000
                                                File size:106496 bytes
                                                MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                Target ID:7
                                                Start time:05:38:01
                                                Start date:18/03/2023
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\Rechung-R1663322504.exe
                                                Imagebase:0xcb0000
                                                File size:106496 bytes
                                                MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: HKTL_NET_GUID_BrowserPass, Description: Detects c# red/black-team tools via typelibguid, Source: 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp, Author: Arnim Rupp (https://github.com/ruppde)
                                                • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000007.00000002.52561610808.0000000037520000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000007.00000002.52540526737.0000000034E8C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000007.00000002.52560446262.0000000036F71000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000007.00000002.52540526737.0000000034E46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.52540526737.0000000034D71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:moderate

                                                Target ID:8
                                                Start time:05:38:01
                                                Start date:18/03/2023
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6ee940000
                                                File size:875008 bytes
                                                MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Target ID:9
                                                Start time:05:38:14
                                                Start date:18/03/2023
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                Wow64 process (32bit):true
                                                Commandline:dw20.exe -x -s 2584
                                                Imagebase:0x10000000
                                                File size:36264 bytes
                                                MD5 hash:89106D4D0BA99F770EAFE946EA81BB65
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                No disassembly