Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pYHrqNhFKr.exe

Overview

General Information

Sample Name:pYHrqNhFKr.exe
Original Sample Name:65cab4a566b172d984c8f8ebfdbdfea0.exe
Analysis ID:829683
MD5:65cab4a566b172d984c8f8ebfdbdfea0
SHA1:5628ef015cc37598a43b0f032b1ef91ad7f24934
SHA256:4700abbc439afe49697e67333bf6d3fcb04b73d73f44b40f68ed20a1e4812a8b
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Disable Windows Defender real time protection (registry)
Machine Learning detection for sample
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Disable Windows Defender notifications (registry)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Binary contains a suspicious time stamp
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • pYHrqNhFKr.exe (PID: 2980 cmdline: C:\Users\user\Desktop\pYHrqNhFKr.exe MD5: 65CAB4A566B172D984C8F8EBFDBDFEA0)
    • niba6073.exe (PID: 2968 cmdline: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe MD5: 7ED66C765EC9F99A5D8215486D6BC8C9)
      • niba2214.exe (PID: 5268 cmdline: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe MD5: 6775BA3EF89ACFDA026F96DF54C2C21D)
        • f7051zI.exe (PID: 5244 cmdline: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe MD5: 7E93BACBBC33E6652E147E7FE07572A0)
        • h99af07.exe (PID: 6132 cmdline: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe MD5: C8B5287FF76DDEC6B7F8C0DA94084603)
  • rundll32.exe (PID: 408 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • rundll32.exe (PID: 5140 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • rundll32.exe (PID: 1004 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "193.233.20.28:4125", "Bot Id": "ruka", "Message": "", "Authorization Header": "5d1d0e51ebe1e3f16cca573ff651c43c"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1a430:$pat14: , CommandLine:
    • 0x134a7:$v2_1: ListOfProcesses
    • 0x13286:$v4_3: base64str
    • 0x13dff:$v4_4: stringKey
    • 0x11b63:$v4_5: BytesToStringConverted
    • 0x10d76:$v4_6: FromBase64
    • 0x12098:$v4_8: procName
    • 0x12811:$v5_5: FileScanning
    • 0x11d6c:$v5_7: RecordHeaderField
    • 0x11a34:$v5_9: BCRYPT_KEY_LENGTHS_STRUCT
    SourceRuleDescriptionAuthorStrings
    00000005.00000002.307087402.0000000002E97000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1328:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x1300:$s3: 83 EC 38 53 B0 C4 88 44 24 2B 88 44 24 2F B0 3F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1fdd0:$s5: delete[]
      • 0x1f288:$s6: constructor or from DllMain.
      00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        5.2.h99af07.exe.2bf0e67.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          5.2.h99af07.exe.2bf0e67.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 C4 88 44 24 2B 88 44 24 2F B0 3F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          5.2.h99af07.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            5.2.h99af07.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 C4 88 44 24 2B 88 44 24 2F B0 3F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            5.2.h99af07.exe.400000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 5 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: pYHrqNhFKr.exeReversingLabs: Detection: 69%
              Source: pYHrqNhFKr.exeVirustotal: Detection: 50%Perma Link
              Source: pYHrqNhFKr.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeAvira: detection malicious, Label: HEUR/AGEN.1252166
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeReversingLabs: Detection: 87%
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeVirustotal: Detection: 81%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeReversingLabs: Detection: 58%
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeVirustotal: Detection: 56%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exeReversingLabs: Detection: 48%
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exeVirustotal: Detection: 51%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeReversingLabs: Detection: 58%
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeVirustotal: Detection: 53%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeReversingLabs: Detection: 88%
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeReversingLabs: Detection: 46%
              Source: pYHrqNhFKr.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exeJoe Sandbox ML: detected
              Source: 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "193.233.20.28:4125", "Bot Id": "ruka", "Message": "", "Authorization Header": "5d1d0e51ebe1e3f16cca573ff651c43c"}
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A2F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00072F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01252F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,

              Compliance

              barindex
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeUnpacked PE file: 5.2.h99af07.exe.400000.0.unpack
              Source: pYHrqNhFKr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
              Source: pYHrqNhFKr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: wextract.pdb source: pYHrqNhFKr.exe, niba6073.exe.0.dr, niba2214.exe.1.dr
              Source: Binary string: Healer.pdb source: h99af07.exe, 00000005.00000003.281384842.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307743738.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.308257566.00000000075C0000.00000004.08000000.00040000.00000000.sdmp, h99af07.exe, 00000005.00000002.307495557.0000000004750000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307402577.0000000004640000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wextract.pdbGCTL source: pYHrqNhFKr.exe, niba6073.exe.0.dr, niba2214.exe.1.dr
              Source: Binary string: <C:\zarepot\talotoyuy1\guf.pdb source: niba6073.exe, 00000001.00000003.242966738.0000000004521000.00000004.00000020.00020000.00000000.sdmp, imYkV36.exe.1.dr
              Source: Binary string: C:\Users\Admin\source\repos\Healer\Healer\obj\Release\Healer.pdb source: niba2214.exe, 00000002.00000003.243954252.0000000004A0C000.00000004.00000020.00020000.00000000.sdmp, f7051zI.exe, 00000003.00000000.244138101.0000000000CA2000.00000002.00000001.01000000.00000006.sdmp, f7051zI.exe.2.dr
              Source: Binary string: C:\tugiwozexe-hon68\xozutuboreja.pdb source: niba2214.exe, 00000002.00000003.243954252.0000000004A0C000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000000.269895289.0000000000401000.00000020.00000001.01000000.00000009.sdmp, h99af07.exe.2.dr
              Source: Binary string: _.pdb source: h99af07.exe, 00000005.00000003.281384842.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307743738.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, h99af07.exe, 00000005.00000003.283921128.0000000002F05000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307495557.0000000004750000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307402577.0000000004640000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\zarepot\talotoyuy1\guf.pdb source: niba6073.exe, 00000001.00000003.242966738.0000000004521000.00000004.00000020.00020000.00000000.sdmp, imYkV36.exe.1.dr
              Source: Binary string: Healer.pdbH5 source: h99af07.exe, 00000005.00000003.281384842.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307743738.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.308257566.00000000075C0000.00000004.08000000.00040000.00000000.sdmp, h99af07.exe, 00000005.00000002.307495557.0000000004750000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307402577.0000000004640000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A2390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00072390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01252390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,

              Networking

              barindex
              Source: Malware configuration extractorURLs: 193.233.20.28:4125
              Source: pYHrqNhFKr.exe, 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmp, l64fQ59.exe.0.drString found in binary or memory: https://api.ip.sb/ip
              Source: h99af07.exe, 00000005.00000002.307016604.0000000002E7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 5.2.h99af07.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 5.2.h99af07.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 5.2.h99af07.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.3.pYHrqNhFKr.exe.4c79c20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.3.pYHrqNhFKr.exe.4c79c20.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000005.00000002.307087402.0000000002E97000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe, type: DROPPEDMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: pYHrqNhFKr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 5.2.h99af07.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.2.h99af07.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.2.h99af07.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.3.pYHrqNhFKr.exe.4c79c20.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.3.pYHrqNhFKr.exe.4c79c20.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000005.00000002.307087402.0000000002E97000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe, type: DROPPEDMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A1F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00071F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01251F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A3BA2
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A5C9E
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00073BA2
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00075C9E
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01253BA2
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01255C9E
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00408C60
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0040DC11
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00407C3F
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00418CCC
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00406CA0
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004028B0
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0041A4BE
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00418244
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00401650
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00402F20
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004193C4
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00418788
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00402F89
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00402B90
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004073A0
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_045E0DB0
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: String function: 0040E1D8 appears 44 times
              Source: pYHrqNhFKr.exeStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 710141 bytes, 2 files, at 0x2c +A "niba6073.exe" +A "l64fQ59.exe", ID 1861, number 1, 28 datablocks, 0x1503 compression
              Source: niba6073.exe.0.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 564865 bytes, 2 files, at 0x2c +A "niba2214.exe" +A "imYkV36.exe", ID 1948, number 1, 23 datablocks, 0x1503 compression
              Source: niba2214.exe.1.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 205776 bytes, 2 files, at 0x2c +A "f7051zI.exe" +A "h99af07.exe", ID 1758, number 1, 11 datablocks, 0x1503 compression
              Source: pYHrqNhFKr.exe, 00000000.00000003.241408245.000000000300D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWearing.exe< vs pYHrqNhFKr.exe
              Source: pYHrqNhFKr.exe, 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs pYHrqNhFKr.exe
              Source: pYHrqNhFKr.exe, 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWearing.exe< vs pYHrqNhFKr.exe
              Source: pYHrqNhFKr.exeBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs pYHrqNhFKr.exe
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe B182F2D3D49BDDA2E29A0ED312DEEF4BEE03983DE54080C5E97AD6422DE192D2
              Source: imYkV36.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: h99af07.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: pYHrqNhFKr.exeReversingLabs: Detection: 69%
              Source: pYHrqNhFKr.exeVirustotal: Detection: 50%
              Source: pYHrqNhFKr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\pYHrqNhFKr.exe C:\Users\user\Desktop\pYHrqNhFKr.exe
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
              Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
              Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
              Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A1F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00071F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01251F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\f7051zI.exe.logJump to behavior
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@12/8@0/0
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A597D GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A3FEF CreateProcessA,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,GetLastError,FormatMessageA,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeCode function: 3_2_00007FFC9DD11B10 ChangeServiceConfigA,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
              Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A4FE0 FindResourceA,LoadResource,LockResource,GetDlgItem,ShowWindow,GetDlgItem,ShowWindow,FreeResource,SendMessageA,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCommand line argument: Kernel32.dll
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCommand line argument: Kernel32.dll
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCommand line argument: Kernel32.dll
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCommand line argument: 08A
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeAutomated click: OK
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeAutomated click: OK
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: pYHrqNhFKr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: pYHrqNhFKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wextract.pdb source: pYHrqNhFKr.exe, niba6073.exe.0.dr, niba2214.exe.1.dr
              Source: Binary string: Healer.pdb source: h99af07.exe, 00000005.00000003.281384842.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307743738.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.308257566.00000000075C0000.00000004.08000000.00040000.00000000.sdmp, h99af07.exe, 00000005.00000002.307495557.0000000004750000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307402577.0000000004640000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wextract.pdbGCTL source: pYHrqNhFKr.exe, niba6073.exe.0.dr, niba2214.exe.1.dr
              Source: Binary string: <C:\zarepot\talotoyuy1\guf.pdb source: niba6073.exe, 00000001.00000003.242966738.0000000004521000.00000004.00000020.00020000.00000000.sdmp, imYkV36.exe.1.dr
              Source: Binary string: C:\Users\Admin\source\repos\Healer\Healer\obj\Release\Healer.pdb source: niba2214.exe, 00000002.00000003.243954252.0000000004A0C000.00000004.00000020.00020000.00000000.sdmp, f7051zI.exe, 00000003.00000000.244138101.0000000000CA2000.00000002.00000001.01000000.00000006.sdmp, f7051zI.exe.2.dr
              Source: Binary string: C:\tugiwozexe-hon68\xozutuboreja.pdb source: niba2214.exe, 00000002.00000003.243954252.0000000004A0C000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000000.269895289.0000000000401000.00000020.00000001.01000000.00000009.sdmp, h99af07.exe.2.dr
              Source: Binary string: _.pdb source: h99af07.exe, 00000005.00000003.281384842.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307743738.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, h99af07.exe, 00000005.00000003.283921128.0000000002F05000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307495557.0000000004750000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307402577.0000000004640000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\zarepot\talotoyuy1\guf.pdb source: niba6073.exe, 00000001.00000003.242966738.0000000004521000.00000004.00000020.00020000.00000000.sdmp, imYkV36.exe.1.dr
              Source: Binary string: Healer.pdbH5 source: h99af07.exe, 00000005.00000003.281384842.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307743738.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.308257566.00000000075C0000.00000004.08000000.00040000.00000000.sdmp, h99af07.exe, 00000005.00000002.307495557.0000000004750000.00000004.00000020.00020000.00000000.sdmp, h99af07.exe, 00000005.00000002.307402577.0000000004640000.00000004.08000000.00040000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeUnpacked PE file: 5.2.h99af07.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeUnpacked PE file: 5.2.h99af07.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A724D push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_0007724D push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_0125724D push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0041C40C push cs; iretd
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00423149 push eax; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0041C50E push cs; iretd
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00422D28 push ss; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004231C8 push eax; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0040E21D push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0041C6BE push ebx; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_02E9C693 push edi; retf
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_02E99748 push FFFFFFE1h; ret
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_045E454E push ecx; retf
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_045E4139 push edi; iretd
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A2F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
              Source: l64fQ59.exe.0.drStatic PE information: 0xD1DEA1A2 [Tue Jul 29 15:28:34 2081 UTC]
              Source: initial sampleStatic PE information: section name: .text entropy: 7.842085736950787
              Source: initial sampleStatic PE information: section name: .text entropy: 7.7554731967823
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeFile created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeFile created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeJump to dropped file
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeFile created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeFile created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeJump to dropped file
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeJump to dropped file
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A1AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00071AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01251AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe TID: 5184Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe TID: 2512Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exeJump to dropped file
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A5467 GetSystemInfo,CreateDirectoryA,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A2390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00072390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01252390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A2F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0040ADB0 GetProcessHeap,HeapFree,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_02E97C33 push dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeMemory allocated: page read and write | page guard
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A6F40 SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A6CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00076F40 SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exeCode function: 1_2_00076CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01256F40 SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exeCode function: 2_2_01256CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: 5_2_004123F1 SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A18A3 GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,LocalFree,CloseHandle,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeQueries volume information: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A7155 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
              Source: C:\Users\user\Desktop\pYHrqNhFKr.exeCode function: 0_2_008A2BFB GetVersion,GetModuleHandleW,GetProcAddress,CloseHandle,
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeCode function: 3_2_00007FFC9DD1077D GetUserNameA,

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection DisableIOAVProtection 1Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 5.2.h99af07.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.h99af07.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.h99af07.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pYHrqNhFKr.exe.4c79c20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pYHrqNhFKr.exe.4c79c20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 5.2.h99af07.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.h99af07.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.h99af07.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pYHrqNhFKr.exe.4c79c20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pYHrqNhFKr.exe.4c79c20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe, type: DROPPED
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts3
              Native API
              1
              Windows Service
              2
              Bypass User Access Control
              21
              Disable or Modify Tools
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium2
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              System Shutdown/Reboot
              Default Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol1
              Input Capture
              Exfiltration Over Bluetooth1
              Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts1
              Service Execution
              Logon Script (Windows)1
              Windows Service
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)1
              Process Injection
              22
              Software Packing
              NTDS26
              System Information Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Timestomp
              LSA Secrets13
              Security Software Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Bypass User Access Control
              Cached Domain Credentials21
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items1
              Masquerading
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
              Virtualization/Sandbox Evasion
              Proc Filesystem1
              System Owner/User Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
              Access Token Manipulation
              /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
              Process Injection
              Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
              Rundll32
              Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 829683 Sample: pYHrqNhFKr.exe Startdate: 18/03/2023 Architecture: WINDOWS Score: 100 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for dropped file 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 48 6 other signatures 2->48 8 pYHrqNhFKr.exe 1 4 2->8         started        11 rundll32.exe 2->11         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        process3 file4 38 C:\Users\user\AppData\Local\...\niba6073.exe, PE32 8->38 dropped 40 C:\Users\user\AppData\Local\...\l64fQ59.exe, PE32 8->40 dropped 17 niba6073.exe 1 4 8->17         started        process5 file6 30 C:\Users\user\AppData\Local\...\niba2214.exe, PE32 17->30 dropped 32 C:\Users\user\AppData\Local\...\imYkV36.exe, PE32 17->32 dropped 50 Multi AV Scanner detection for dropped file 17->50 52 Machine Learning detection for dropped file 17->52 21 niba2214.exe 1 4 17->21         started        signatures7 process8 file9 34 C:\Users\user\AppData\Local\...\h99af07.exe, PE32 21->34 dropped 36 C:\Users\user\AppData\Local\...\f7051zI.exe, PE32 21->36 dropped 54 Multi AV Scanner detection for dropped file 21->54 56 Machine Learning detection for dropped file 21->56 25 h99af07.exe 1 1 21->25         started        28 f7051zI.exe 9 1 21->28         started        signatures10 process11 signatures12 58 Multi AV Scanner detection for dropped file 25->58 60 Detected unpacking (changes PE section rights) 25->60 62 Detected unpacking (overwrites its own PE header) 25->62 64 Machine Learning detection for dropped file 28->64 66 Disable Windows Defender notifications (registry) 28->66 68 Disable Windows Defender real time protection (registry) 28->68

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              pYHrqNhFKr.exe69%ReversingLabsWin32.Trojan.Plugx
              pYHrqNhFKr.exe51%VirustotalBrowse
              pYHrqNhFKr.exe100%AviraHEUR/AGEN.1252166
              pYHrqNhFKr.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe100%AviraHEUR/AGEN.1252166
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe88%ReversingLabsByteCode-MSIL.Trojan.Whispergate
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe81%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe59%ReversingLabsWin32.Trojan.Plugx
              C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe57%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exe49%ReversingLabsWin32.Trojan.Generic
              C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exe52%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe59%ReversingLabsWin32.Trojan.Plugx
              C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe54%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe88%ReversingLabsByteCode-MSIL.Trojan.Casdet
              C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe46%ReversingLabsWin32.Trojan.Generic
              SourceDetectionScannerLabelLinkDownload
              0.2.pYHrqNhFKr.exe.8a0000.0.unpack100%AviraHEUR/AGEN.1252166Download File
              2.3.niba2214.exe.4a0ec20.0.unpack100%AviraHEUR/AGEN.1253311Download File
              1.3.niba6073.exe.4577020.0.unpack100%AviraHEUR/AGEN.1253311Download File
              0.0.pYHrqNhFKr.exe.8a0000.0.unpack100%AviraHEUR/AGEN.1252166Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://api.ip.sb/ip0%URL Reputationsafe
              193.233.20.28:41250%URL Reputationsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              193.233.20.28:4125true
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://api.ip.sb/ippYHrqNhFKr.exe, 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmp, l64fQ59.exe.0.drfalse
              • URL Reputation: safe
              unknown
              No contacted IP infos
              Joe Sandbox Version:37.0.0 Beryl
              Analysis ID:829683
              Start date and time:2023-03-18 21:03:42 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 9m 30s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:pYHrqNhFKr.exe
              Original Sample Name:65cab4a566b172d984c8f8ebfdbdfea0.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@12/8@0/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 58.8% (good quality ratio 56.4%)
              • Quality average: 85%
              • Quality standard deviation: 24.1%
              HCA Information:
              • Successful, ratio: 92%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for rundll32
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): fs.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              No simulations
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):226
              Entropy (8bit):5.354940450065058
              Encrypted:false
              SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
              MD5:B10E37251C5B495643F331DB2EEC3394
              SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
              SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
              SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
              Malicious:false
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
              Process:C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):321
              Entropy (8bit):5.355221377978991
              Encrypted:false
              SSDEEP:6:Q3La/xwchM3RJoDLIP12MUAvvR+uCqDLIP12MUAvvR+uTL2LDY3U21v:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21v
              MD5:03C5BA5FCE7124B503EA65EF522177C3
              SHA1:F76B1F538D5EA66664355901E927B2F870ACCDD8
              SHA-256:8128CE419BBE0419F1A0BDE97C3A14E3377C0184DC1D7AF61AA01AAB756B625B
              SHA-512:151A974DDABA852144EC4BC18C548227A32E5261736F186A3920F2497434AEE9DBB0E0AB77E0E52A84A9FBC4529A158882B7549763400DDC2082D384B1135141
              Malicious:false
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
              Process:C:\Users\user\Desktop\pYHrqNhFKr.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):179200
              Entropy (8bit):4.951964215863173
              Encrypted:false
              SSDEEP:3072:PxqZWN9abUP0Pv3EIye7597h4HxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuwM:5qZ5v3fV7h
              MD5:6C4C2A56D5DD785ADBE4FE60FA3CC1F2
              SHA1:F8BD4379310258F8E54C47B56F5EEC7394ADB9A2
              SHA-256:B182F2D3D49BDDA2E29A0ED312DEEF4BEE03983DE54080C5E97AD6422DE192D2
              SHA-512:F6958CAB80E2F7736CEA307B51BE546E50ACD5494B72DB0343A09E6EF8C446114F51BE6C9826FCB6E9F7190E4EC8415C0A403C3C1706183577C2604B877FF830
              Malicious:true
              Yara Hits:
              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe, Author: Joe Security
              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe, Author: ditekSHen
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              • Antivirus: Virustotal, Detection: 81%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............z.... ........@.. ....................... ............@.................................(...O.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\pYHrqNhFKr.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):711680
              Entropy (8bit):7.8902015677558275
              Encrypted:false
              SSDEEP:12288:wMrPy90wwLaLRKc8ivC60x+WwOwoFz7/INS6niIOaHaCeDR7pxR:vyLw+wc8g30MW5xANSUiXCY7LR
              MD5:7ED66C765EC9F99A5D8215486D6BC8C9
              SHA1:F328914BCA7292FCBDF8F0E8856DA373E04DCF52
              SHA-256:B92AD2C0F810D458ACA00DAEE24510480D3483D174BA0A2957E2E08AC10000D9
              SHA-512:95B4F7838CDAB00F2FEF1215CA174F2A94B3FB58ED06432E45DF702AFBC771AA0CAB3581B370AD2E7F09D5706E89CBBF390C4738DB2A2BB2D3CF8B2716FEA0D1
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 59%
              • Antivirus: Virustotal, Detection: 57%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%...K..K..K...N..K...H..K...O..K...J..K..J...K...C..K.....K...I..K.Rich..K.........PE..L....`.b.................d...t......`j............@..........................0............@...... .......................................T................... ..........T...............................@............................................text....c.......d.................. ..`.data...H............h..............@....idata..R............j..............@..@.rsrc....`.......V...|..............@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):400896
              Entropy (8bit):6.799086491924015
              Encrypted:false
              SSDEEP:6144:ipBL6vPRiUryaNB5HC6XkN9UomaZ4RPDNr:ipBGvPIUOaThCpDTQr
              MD5:096E2BA0F9570710D940FC8C2F472610
              SHA1:2ABAA5C867AA6AD1685585F2EEE03F598CB6FCCC
              SHA-256:E6BE267888556464BB6FB416D62BAB0383625C23C1A614D6819E983CCDEA9ECF
              SHA-512:B62EAA662ECBB1F71B95BFF7780F42A50E4DAC78AD8016E0F9EE47AE45D42256068AF903D63DDE45C71ACC6147AADBBB5EA6FD03A788C9D7D57D511699D2C697
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 49%
              • Antivirus: Virustotal, Detection: 52%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@......P...P...P..(P/..P..9P...P../Pm..P#z.P...P...Py..P..&P...P..8P...P..=P...PRich...P................PE..L.....b......................m......P............@.......................... q.....(...........................................d.....n.......................p.....................................x-..@............................................text............................... ..`.data...H.j......&..................@....rsrc.........n.....................@..@.reloc..x.....p.....................@..B........................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):352256
              Entropy (8bit):7.693939457552631
              Encrypted:false
              SSDEEP:6144:Key+bnr+qp0yN90QE31x142x9Q4lJENM0Cr4x+W6QYLwztFz7MwE1w:SMrSy907v4AC60R+WnowZFz7jIw
              MD5:6775BA3EF89ACFDA026F96DF54C2C21D
              SHA1:557EE02A4A5438B9D7ED9BB6BB618B3C682ED9F7
              SHA-256:93F40046EA8851424C4E084BE7A9562EFC4553ECC9336AA7A41693A5A1382301
              SHA-512:25A1767570591807E972F459BF7D238ADC75CBA353FB81DB201A872D0D42693D62902275B389D5151342822F33BB43AA5D8D6C3F48158B038548ACB49D6C36D8
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 59%
              • Antivirus: Virustotal, Detection: 54%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%...K..K..K...N..K...H..K...O..K...J..K..J...K...C..K.....K...I..K.Rich..K.........PE..L....`.b.................d..........`j............@..................................|....@...... ......................................\...............................T...............................@............................................text....c.......d.................. ..`.data...H............h..............@....idata..R............j..............@..@.rsrc................|..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):11264
              Entropy (8bit):4.97029807367379
              Encrypted:false
              SSDEEP:96:yA/vMth9sDLibql3A44P9QL4fwmPImg+A03PvXLOzk+gqWYV4J6oP/zNt:yw+wGWt94+iANiCkc4Jhp
              MD5:7E93BACBBC33E6652E147E7FE07572A0
              SHA1:421A7167DA01C8DA4DC4D5234CA3DD84E319E762
              SHA-256:850CD190AAEEBCF1505674D97F51756F325E650320EAF76785D954223A9BEE38
              SHA-512:250169D7B6FCEBFF400BE89EDAE8340F14130CED70C340BA9DA9F225F62B52B35F6645BFB510962EFB866F988688CB42392561D3E6B72194BC89D310EA43AA91
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................"...0.."...........@... ...`....@.. ....................................@..................................@..O....`...............................@..8............................................ ............... ..H............text.... ... ...".................. ..`.rsrc........`.......$..............@..@.reloc...............*..............@..B.................@......H.......T$...............................................................0...........@s.....@...(....&*..0..K......... ?...(......~....(....,.*r...p.....(....%..(....& ....(....(....&.(....&*..0..e.......(....~........+G.....o....r#..p(....,-.o.... ......(....-.*.(....&(.....o....(....&..X....i2..(....&*....0..`.......(....~........+B.....o....r...p(....,(.o.... ......(....-.*.(....&.o....(....&..X....i2..(....&*.0..c......... ?...(......~....(....,.*....(............%...(...
              Process:C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):341504
              Entropy (8bit):6.48186591893242
              Encrypted:false
              SSDEEP:6144:bZ3LYwHUxsB2a9D4lJERA0Cr4x+WBQYLwzAW0nr:bZ38wHU2BsCi0R+Weowar
              MD5:C8B5287FF76DDEC6B7F8C0DA94084603
              SHA1:A184F5E2899BC2EB8B46216866717C042AF714D1
              SHA-256:C3182B01766055A3711BD34FDEB4E6D585F8BB9C7A54BD532CE56DAF2D26219B
              SHA-512:8752AE46628FD8FF925A125AEE47853F4B28E2F1CC149D00C504439EFF0E57B1428B5751CDAC4DF82B82C9A76AB634EA1A302D8A17FC0647F20D3CF7550F1C99
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 46%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@......P...P...P..(P/..P..9P...P../Pm..P#z.P...P...Py..P..&P...P..8P...P..=P...PRich...P................PE..L......a......................m......P............@..........................0p......C..........................................d.....n.......................o.....................................x-..@............................................text............................... ..`.data...H.j......&..................@....rsrc.........n.....................@..@.reloc..x.....o.....................@..B........................................................................................................................................................................................................................................................................................................................................................................
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.916514632003815
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:pYHrqNhFKr.exe
              File size:856576
              MD5:65cab4a566b172d984c8f8ebfdbdfea0
              SHA1:5628ef015cc37598a43b0f032b1ef91ad7f24934
              SHA256:4700abbc439afe49697e67333bf6d3fcb04b73d73f44b40f68ed20a1e4812a8b
              SHA512:81d853e8a29305edf1c8f1039ad7d2d64ec9d694f45affdff39a9d36c455e88270bdb4bcea85fe0ce9ecd3345f631774ce868c8abf1b77f3dad844db2a561f60
              SSDEEP:24576:ByMW6YJ+DKboT0MWrOJNSAz2CjqVZAe0m:066+64fGOJIAzCVZA
              TLSH:42052253F7D46022E1BA177449F713D30A36BC91AA38436F3386A61E1D72BC9997036B
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%...K...K...K...N...K...H...K...O...K...J...K...J...K...C...K.......K...I...K.Rich..K.........PE..L....`.b.................d.
              Icon Hash:f8e0e4e8ecccc870
              Entrypoint:0x406a60
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Time Stamp:0x628D60E2 [Tue May 24 22:49:06 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:10
              OS Version Minor:0
              File Version Major:10
              File Version Minor:0
              Subsystem Version Major:10
              Subsystem Version Minor:0
              Import Hash:646167cce332c1c252cdcb1839e0cf48
              Instruction
              call 00007F67F116FC45h
              jmp 00007F67F116F555h
              push 00000058h
              push 004072B8h
              call 00007F67F116FCE7h
              xor ebx, ebx
              mov dword ptr [ebp-20h], ebx
              lea eax, dword ptr [ebp-68h]
              push eax
              call dword ptr [0040A184h]
              mov dword ptr [ebp-04h], ebx
              mov eax, dword ptr fs:[00000018h]
              mov esi, dword ptr [eax+04h]
              mov edi, ebx
              mov edx, 004088ACh
              mov ecx, esi
              xor eax, eax
              lock cmpxchg dword ptr [edx], ecx
              test eax, eax
              je 00007F67F116F56Ah
              cmp eax, esi
              jne 00007F67F116F559h
              xor esi, esi
              inc esi
              mov edi, esi
              jmp 00007F67F116F562h
              push 000003E8h
              call dword ptr [0040A188h]
              jmp 00007F67F116F529h
              xor esi, esi
              inc esi
              cmp dword ptr [004088B0h], esi
              jne 00007F67F116F55Ch
              push 0000001Fh
              call 00007F67F116FA7Bh
              pop ecx
              jmp 00007F67F116F58Ch
              cmp dword ptr [004088B0h], ebx
              jne 00007F67F116F57Eh
              mov dword ptr [004088B0h], esi
              push 004010C4h
              push 004010B8h
              call 00007F67F116F6A6h
              pop ecx
              pop ecx
              test eax, eax
              je 00007F67F116F569h
              mov dword ptr [ebp-04h], FFFFFFFEh
              mov eax, 000000FFh
              jmp 00007F67F116F689h
              mov dword ptr [004081E4h], esi
              cmp dword ptr [004088B0h], esi
              jne 00007F67F116F56Dh
              push 004010B4h
              push 004010ACh
              call 00007F67F116FC35h
              pop ecx
              pop ecx
              mov dword ptr [000088B0h], 00000000h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xa28c0xb4.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000xc8b90.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xd50000x888.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x14100x54.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x10080x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0xa0000x288.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x63140x6400False0.5744140625data6.314163792045976IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x80000x1a480x200False0.609375data4.970639543960129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0xa0000x10520x1200False0.4140625data5.025949912909207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0xc0000xc90000xc8c00False0.962984267979452data7.941202576330205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xd50000x8880xa00False0.746484375data6.222637930812128IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              AVI0xc9f80x2e1aRIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppEnglishUnited States
              RT_ICON0xf8140x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States
              RT_ICON0xfe7c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States
              RT_ICON0x101640x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States
              RT_ICON0x1034c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States
              RT_ICON0x104740xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States
              RT_ICON0x1131c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States
              RT_ICON0x11bc40x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States
              RT_ICON0x1228c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States
              RT_ICON0x127f40xd9d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
              RT_ICON0x201c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
              RT_ICON0x227700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
              RT_ICON0x238180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
              RT_ICON0x241a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
              RT_DIALOG0x246080x2f2dataEnglishUnited States
              RT_DIALOG0x248fc0x1b0dataEnglishUnited States
              RT_DIALOG0x24aac0x166dataEnglishUnited States
              RT_DIALOG0x24c140x1c0dataEnglishUnited States
              RT_DIALOG0x24dd40x130dataEnglishUnited States
              RT_DIALOG0x24f040x120dataEnglishUnited States
              RT_STRING0x250240x8cMatlab v4 mat-file (little endian) l, numeric, rows 0, columns 0EnglishUnited States
              RT_STRING0x250b00x520dataEnglishUnited States
              RT_STRING0x255d00x5ccdataEnglishUnited States
              RT_STRING0x25b9c0x4b0dataEnglishUnited States
              RT_STRING0x2604c0x44adataEnglishUnited States
              RT_STRING0x264980x3cedataEnglishUnited States
              RT_RCDATA0x268680x7ASCII text, with no line terminatorsEnglishUnited States
              RT_RCDATA0x268700xad5fdMicrosoft Cabinet archive data, many, 710141 bytes, 2 files, at 0x2c +A "niba6073.exe" +A "l64fQ59.exe", ID 1861, number 1, 28 datablocks, 0x1503 compressionEnglishUnited States
              RT_RCDATA0xd3e700x4dataEnglishUnited States
              RT_RCDATA0xd3e740x24dataEnglishUnited States
              RT_RCDATA0xd3e980x7ASCII text, with no line terminatorsEnglishUnited States
              RT_RCDATA0xd3ea00x7ASCII text, with no line terminatorsEnglishUnited States
              RT_RCDATA0xd3ea80x4dataEnglishUnited States
              RT_RCDATA0xd3eac0xcdataEnglishUnited States
              RT_RCDATA0xd3eb80x4dataEnglishUnited States
              RT_RCDATA0xd3ebc0xdASCII text, with no line terminatorsEnglishUnited States
              RT_RCDATA0xd3ecc0x4dataEnglishUnited States
              RT_RCDATA0xd3ed00x7ASCII text, with no line terminatorsEnglishUnited States
              RT_RCDATA0xd3ed80x7ASCII text, with no line terminatorsEnglishUnited States
              RT_RCDATA0xd3ee00x7ASCII text, with no line terminatorsEnglishUnited States
              RT_GROUP_ICON0xd3ee80xbcdataEnglishUnited States
              RT_VERSION0xd3fa40x408dataEnglishUnited States
              RT_MANIFEST0xd43ac0x7e2XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
              DLLImport
              ADVAPI32.dllGetTokenInformation, RegDeleteValueA, RegOpenKeyExA, RegQueryInfoKeyA, FreeSid, OpenProcessToken, RegSetValueExA, RegCreateKeyExA, LookupPrivilegeValueA, AllocateAndInitializeSid, RegQueryValueExA, EqualSid, RegCloseKey, AdjustTokenPrivileges
              KERNEL32.dll_lopen, _llseek, CompareStringA, GetLastError, GetFileAttributesA, GetSystemDirectoryA, LoadLibraryA, DeleteFileA, GlobalAlloc, GlobalFree, CloseHandle, WritePrivateProfileStringA, IsDBCSLeadByte, GetWindowsDirectoryA, SetFileAttributesA, GetProcAddress, GlobalLock, LocalFree, RemoveDirectoryA, FreeLibrary, _lclose, CreateDirectoryA, GetPrivateProfileIntA, GetPrivateProfileStringA, GlobalUnlock, ReadFile, SizeofResource, WriteFile, GetDriveTypeA, lstrcmpA, SetFileTime, SetFilePointer, FindResourceA, CreateMutexA, GetVolumeInformationA, ExpandEnvironmentStringsA, GetCurrentDirectoryA, FreeResource, GetVersion, SetCurrentDirectoryA, GetTempPathA, LocalFileTimeToFileTime, CreateFileA, SetEvent, TerminateThread, GetVersionExA, LockResource, GetSystemInfo, CreateThread, ResetEvent, LoadResource, ExitProcess, GetModuleHandleW, CreateProcessA, FormatMessageA, GetTempFileNameA, DosDateTimeToFileTime, CreateEventA, GetExitCodeProcess, FindNextFileA, LocalAlloc, GetShortPathNameA, MulDiv, GetDiskFreeSpaceA, EnumResourceLanguagesA, GetTickCount, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetStartupInfoW, Sleep, FindClose, GetCurrentProcess, FindFirstFileA, WaitForSingleObject, GetModuleFileNameA, LoadLibraryExA
              GDI32.dllGetDeviceCaps
              USER32.dllSetWindowLongA, GetDlgItemTextA, DialogBoxIndirectParamA, ShowWindow, MsgWaitForMultipleObjects, SetWindowPos, GetDC, GetWindowRect, DispatchMessageA, GetDesktopWindow, CharUpperA, SetDlgItemTextA, ExitWindowsEx, MessageBeep, EndDialog, CharPrevA, LoadStringA, CharNextA, EnableWindow, ReleaseDC, SetForegroundWindow, PeekMessageA, GetDlgItem, SendMessageA, SendDlgItemMessageA, MessageBoxA, SetWindowTextA, GetWindowLongA, CallWindowProcA, GetSystemMetrics
              msvcrt.dll_controlfp, ?terminate@@YAXXZ, _acmdln, _initterm, __setusermatherr, _except_handler4_common, memcpy, _ismbblead, __p__fmode, _cexit, _exit, exit, __set_app_type, __getmainargs, _amsg_exit, __p__commode, _XcptFilter, memcpy_s, _vsnprintf, memset
              COMCTL32.dll
              Cabinet.dll
              VERSION.dllGetFileVersionInfoA, VerQueryValueA, GetFileVersionInfoSizeA
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

              Click to jump to process

              Target ID:0
              Start time:21:04:36
              Start date:18/03/2023
              Path:C:\Users\user\Desktop\pYHrqNhFKr.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\pYHrqNhFKr.exe
              Imagebase:0x8a0000
              File size:856576 bytes
              MD5 hash:65CAB4A566B172D984C8F8EBFDBDFEA0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.241248149.0000000004BCC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low

              Target ID:1
              Start time:21:04:36
              Start date:18/03/2023
              Path:C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
              Imagebase:0x70000
              File size:711680 bytes
              MD5 hash:7ED66C765EC9F99A5D8215486D6BC8C9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 59%, ReversingLabs
              • Detection: 57%, Virustotal, Browse
              Reputation:low

              Target ID:2
              Start time:21:04:37
              Start date:18/03/2023
              Path:C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
              Imagebase:0x1250000
              File size:352256 bytes
              MD5 hash:6775BA3EF89ACFDA026F96DF54C2C21D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 59%, ReversingLabs
              • Detection: 54%, Virustotal, Browse
              Reputation:low

              Target ID:3
              Start time:21:04:37
              Start date:18/03/2023
              Path:C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
              Imagebase:0xca0000
              File size:11264 bytes
              MD5 hash:7E93BACBBC33E6652E147E7FE07572A0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 88%, ReversingLabs
              Reputation:high

              Target ID:4
              Start time:21:04:45
              Start date:18/03/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
              Imagebase:0x7ff704b20000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:21:04:49
              Start date:18/03/2023
              Path:C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
              Imagebase:0x400000
              File size:341504 bytes
              MD5 hash:C8B5287FF76DDEC6B7F8C0DA94084603
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.307087402.0000000002E97000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000005.00000002.306344937.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.306851644.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 46%, ReversingLabs
              Reputation:low

              Target ID:6
              Start time:21:04:54
              Start date:18/03/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
              Imagebase:0x7ff704b20000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:14
              Start time:21:05:03
              Start date:18/03/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
              Imagebase:0x7ff704b20000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              No disassembly