Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SzznpUhIjo.exe

Overview

General Information

Sample Name:SzznpUhIjo.exe
Original Sample Name:f62fe8447c5e9b9ea5ac424543ad20b3.exe
Analysis ID:829685
MD5:f62fe8447c5e9b9ea5ac424543ad20b3
SHA1:847f52f9fff9b080e44de6738b61141b289cd09c
SHA256:d7f0a894956299f235cc735af3469746f223b3394abc85660e89872503e55982
Tags:exeRedLineStealer
Infos:

Detection

Amadey, RedLine
Score:93
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Yara detected Amadeys stealer DLL
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Detected unpacking (changes PE section rights)
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Disable Windows Defender real time protection (registry)
Machine Learning detection for sample
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Disable Windows Defender notifications (registry)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Binary contains a suspicious time stamp
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • SzznpUhIjo.exe (PID: 6092 cmdline: C:\Users\user\Desktop\SzznpUhIjo.exe MD5: F62FE8447C5E9B9EA5AC424543AD20B3)
    • kino5628.exe (PID: 6084 cmdline: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe MD5: 51B7FE413501DC9DD84CF1FCBB4C4BA2)
      • kino6423.exe (PID: 6028 cmdline: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe MD5: DB27DCB2B593E449358CEC94D3D257DA)
        • kino4801.exe (PID: 6116 cmdline: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe MD5: 211103CF935C81941C9A7C527A99891E)
          • bus7600.exe (PID: 4084 cmdline: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe MD5: 7E93BACBBC33E6652E147E7FE07572A0)
          • con1165.exe (PID: 5392 cmdline: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe MD5: 3930494C030BFEF77C7C0624C1F6BAEB)
  • rundll32.exe (PID: 680 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • rundll32.exe (PID: 2432 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • rundll32.exe (PID: 1504 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • rundll32.exe (PID: 2460 cmdline: C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\ MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about 500$ on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "31.41.244.200/games/category/index.php", "Version": "3.68"}
{"C2 url": "193.233.20.30:4125", "Bot Id": "relon", "Authorization Header": "17da69809725577b595e217ba006b869"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1a434:$pat14: , CommandLine:
    • 0x134a7:$v2_1: ListOfProcesses
    • 0x13286:$v4_3: base64str
    • 0x13dff:$v4_4: stringKey
    • 0x11b63:$v4_5: BytesToStringConverted
    • 0x10d76:$v4_6: FromBase64
    • 0x12098:$v4_8: procName
    • 0x12811:$v5_5: FileScanning
    • 0x11d6c:$v5_7: RecordHeaderField
    • 0x11a34:$v5_9: BCRYPT_KEY_LENGTHS_STRUCT
    C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exeJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      SourceRuleDescriptionAuthorStrings
      00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 C4 88 44 24 2B 88 44 24 2F B0 3F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            9.2.con1165.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              9.2.con1165.exe.400000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                9.2.con1165.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
                • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
                • 0x1300:$s3: 83 EC 38 53 B0 C4 88 44 24 2B 88 44 24 2F B0 3F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
                • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
                • 0x1fdd0:$s5: delete[]
                • 0x1f288:$s6: constructor or from DllMain.
                9.2.con1165.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
                • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
                • 0x700:$s3: 83 EC 38 53 B0 C4 88 44 24 2B 88 44 24 2F B0 3F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
                • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
                • 0x1e9d0:$s5: delete[]
                • 0x1de88:$s6: constructor or from DllMain.
                9.2.con1165.exe.2da0e67.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: SzznpUhIjo.exeReversingLabs: Detection: 43%
                  Source: SzznpUhIjo.exeVirustotal: Detection: 49%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeAvira: detection malicious, Label: HEUR/AGEN.1252166
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeAvira: detection malicious, Label: HEUR/AGEN.1252166
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exeReversingLabs: Detection: 63%
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exeVirustotal: Detection: 79%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeReversingLabs: Detection: 68%
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeVirustotal: Detection: 65%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeReversingLabs: Detection: 87%
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeVirustotal: Detection: 79%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeReversingLabs: Detection: 64%
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\dNT35s70.exeReversingLabs: Detection: 43%
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeReversingLabs: Detection: 59%
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeReversingLabs: Detection: 88%
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeReversingLabs: Detection: 66%
                  Source: SzznpUhIjo.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\dNT35s70.exeJoe Sandbox ML: detected
                  Source: 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "193.233.20.30:4125", "Bot Id": "relon", "Authorization Header": "17da69809725577b595e217ba006b869"}
                  Source: 0.3.SzznpUhIjo.exe.6f54a20.1.unpackMalware Configuration Extractor: Amadey {"C2 url": "31.41.244.200/games/category/index.php", "Version": "3.68"}
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00402F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E2F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E52F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D2F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeUnpacked PE file: 0.2.SzznpUhIjo.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeUnpacked PE file: 9.2.con1165.exe.400000.0.unpack
                  Source: SzznpUhIjo.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                  Source: Binary string: C:\lar\megeheyubosed.pdb source: kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, dNT35s70.exe.2.dr
                  Source: Binary string: wextract.pdb source: SzznpUhIjo.exe, SzznpUhIjo.exe, 00000000.00000002.340743892.0000000000400000.00000040.00000001.01000000.00000003.sdmp, SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, kino5628.exe, kino5628.exe, 00000001.00000002.335529120.00000000008E1000.00000020.00000001.01000000.00000004.sdmp, kino5628.exe, 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, kino6423.exe, kino6423.exe, 00000002.00000002.329120312.0000000000E51000.00000020.00000001.01000000.00000005.sdmp, kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, kino4801.exe, kino4801.exe, 00000003.00000002.318831834.00000000010D1000.00000020.00000001.01000000.00000006.sdmp, kino6423.exe.1.dr, kino5628.exe.0.dr, kino4801.exe.2.dr
                  Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: SzznpUhIjo.exe, 00000000.00000003.256081932.0000000004EFC000.00000004.00000020.00020000.00000000.sdmp, SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, ge280443.exe.0.dr
                  Source: Binary string: Healer.pdb source: con1165.exe, 00000009.00000003.292100697.0000000002E86000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317635484.0000000004620000.00000004.08000000.00040000.00000000.sdmp, con1165.exe, 00000009.00000002.318010465.0000000004BF1000.00000004.00000800.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317671404.0000000004650000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317938178.0000000004950000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: wextract.pdbGCTL source: SzznpUhIjo.exe, 00000000.00000002.340743892.0000000000400000.00000040.00000001.01000000.00000003.sdmp, SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, kino5628.exe, 00000001.00000002.335529120.00000000008E1000.00000020.00000001.01000000.00000004.sdmp, kino5628.exe, 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, kino6423.exe, 00000002.00000002.329120312.0000000000E51000.00000020.00000001.01000000.00000005.sdmp, kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, kino4801.exe, 00000003.00000002.318831834.00000000010D1000.00000020.00000001.01000000.00000006.sdmp, kino6423.exe.1.dr, kino5628.exe.0.dr, kino4801.exe.2.dr
                  Source: Binary string: PC:\lar\megeheyubosed.pdb source: kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, dNT35s70.exe.2.dr
                  Source: Binary string: C:\Users\Admin\source\repos\Healer\Healer\obj\Release\Healer.pdb source: kino4801.exe, 00000003.00000003.258987124.0000000004AC6000.00000004.00000020.00020000.00000000.sdmp, bus7600.exe, 00000004.00000000.259206423.0000000000822000.00000002.00000001.01000000.00000007.sdmp, bus7600.exe.3.dr
                  Source: Binary string: XAC:\zavexuji\kixufefaginuye\9-kotegusaw 37\rihipivolov.pdb source: kino4801.exe, 00000003.00000003.258987124.0000000004AC6000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000000.290825680.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, con1165.exe.3.dr
                  Source: Binary string: _.pdb source: con1165.exe, 00000009.00000003.292100697.0000000002E86000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317635484.0000000004620000.00000004.08000000.00040000.00000000.sdmp, con1165.exe, 00000009.00000002.318010465.0000000004BF1000.00000004.00000800.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317671404.0000000004650000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000003.293865027.0000000002E98000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.316698493.0000000002E98000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\zen\nuheweca.pdb source: SzznpUhIjo.exe
                  Source: Binary string: Healer.pdbH5 source: con1165.exe, 00000009.00000003.292100697.0000000002E86000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317635484.0000000004620000.00000004.08000000.00040000.00000000.sdmp, con1165.exe, 00000009.00000002.318010465.0000000004BF1000.00000004.00000800.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317671404.0000000004650000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317938178.0000000004950000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: C:\zavexuji\kixufefaginuye\9-kotegusaw 37\rihipivolov.pdb source: kino4801.exe, 00000003.00000003.258987124.0000000004AC6000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000000.290825680.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, con1165.exe.3.dr
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00402390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E2390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E52390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D2390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 31.41.244.200/games/category/index.php
                  Source: Malware configuration extractorURLs: 193.233.20.30:4125
                  Source: kino5628.exe, 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, en239906.exe.1.drString found in binary or memory: https://api.ip.sb/ip
                  Source: con1165.exe, 00000009.00000002.316630593.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 9.2.con1165.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 9.2.con1165.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 9.2.con1165.exe.2da0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 1.3.kino5628.exe.4776220.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 1.3.kino5628.exe.4776220.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 9.3.con1165.exe.4510000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000000.00000002.341685333.0000000006A30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000009.00000002.316668372.0000000002E26000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.341440182.0000000006880000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe, type: DROPPEDMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: SzznpUhIjo.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 9.2.con1165.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 9.2.con1165.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 9.2.con1165.exe.2da0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 1.3.kino5628.exe.4776220.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 1.3.kino5628.exe.4776220.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 9.3.con1165.exe.4510000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000000.00000002.341685333.0000000006A30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000009.00000002.316668372.0000000002E26000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.341440182.0000000006880000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe, type: DROPPEDMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00401F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E1F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E51F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D1F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00403BA2
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00405C9E
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E3BA2
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E5C9E
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E53BA2
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E55C9E
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D3BA2
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D5C9E
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00408C60
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0040DC11
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00407C3F
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00418CCC
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00406CA0
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004028B0
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0041A4BE
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00418244
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00401650
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00402F20
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004193C4
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00418788
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00402F89
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00402B90
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004073A0
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA2B17
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA18B7
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA786D
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA31F0
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DB89EF
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA3187
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA8EC7
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA7EA6
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DADE78
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA77D9
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA6F07
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DB8F33
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DBA725
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DB84AB
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA2DF7
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: String function: 02DAE43F appears 44 times
                  Source: kino5628.exe.0.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 724274 bytes, 2 files, at 0x2c +A "kino6423.exe" +A "en239906.exe", ID 1904, number 1, 28 datablocks, 0x1503 compression
                  Source: kino6423.exe.1.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 578750 bytes, 2 files, at 0x2c +A "kino4801.exe" +A "dNT35s70.exe", ID 1958, number 1, 25 datablocks, 0x1503 compression
                  Source: kino4801.exe.2.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 205326 bytes, 2 files, at 0x2c +A "bus7600.exe" +A "con1165.exe", ID 1796, number 1, 11 datablocks, 0x1503 compression
                  Source: kino4801.exe.2.drStatic PE information: Resource name: RT_RCDATA type: 370 sysV pure executable not stripped
                  Source: SzznpUhIjo.exeBinary or memory string: OriginalFilename vs SzznpUhIjo.exe
                  Source: SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs SzznpUhIjo.exe
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exe 319B22945BEEB7424FE6DB1E9953AD5F2DC12CBBA2FE24E599C3DEDA678893BB
                  Source: SzznpUhIjo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: dNT35s70.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: con1165.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: SzznpUhIjo.exeReversingLabs: Detection: 43%
                  Source: SzznpUhIjo.exeVirustotal: Detection: 49%
                  Source: SzznpUhIjo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\SzznpUhIjo.exe C:\Users\user\Desktop\SzznpUhIjo.exe
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00401F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E1F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E51F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D1F90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,ExitWindowsEx,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\bus7600.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
                  Source: classification engineClassification label: mal93.troj.spyw.evad.winEXE@15/10@0/0
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_0040597D GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_0040597D GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeCode function: 4_2_00007FFBACD21B10 ChangeServiceConfigA,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_068807C6 CreateToolhelp32Snapshot,Module32First,
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00404FE0 FindResourceA,LoadResource,LockResource,GetDlgItem,ShowWindow,GetDlgItem,ShowWindow,FreeResource,SendMessageA,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCommand line argument: Kernel32.dll
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCommand line argument: Kernel32.dll
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCommand line argument: Kernel32.dll
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCommand line argument: Kernel32.dll
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCommand line argument: 08A
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeAutomated click: OK
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: SzznpUhIjo.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                  Source: SzznpUhIjo.exeStatic file information: File size 1238528 > 1048576
                  Source: SzznpUhIjo.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x109200
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: SzznpUhIjo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\lar\megeheyubosed.pdb source: kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, dNT35s70.exe.2.dr
                  Source: Binary string: wextract.pdb source: SzznpUhIjo.exe, SzznpUhIjo.exe, 00000000.00000002.340743892.0000000000400000.00000040.00000001.01000000.00000003.sdmp, SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, kino5628.exe, kino5628.exe, 00000001.00000002.335529120.00000000008E1000.00000020.00000001.01000000.00000004.sdmp, kino5628.exe, 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, kino6423.exe, kino6423.exe, 00000002.00000002.329120312.0000000000E51000.00000020.00000001.01000000.00000005.sdmp, kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, kino4801.exe, kino4801.exe, 00000003.00000002.318831834.00000000010D1000.00000020.00000001.01000000.00000006.sdmp, kino6423.exe.1.dr, kino5628.exe.0.dr, kino4801.exe.2.dr
                  Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: SzznpUhIjo.exe, 00000000.00000003.256081932.0000000004EFC000.00000004.00000020.00020000.00000000.sdmp, SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, ge280443.exe.0.dr
                  Source: Binary string: Healer.pdb source: con1165.exe, 00000009.00000003.292100697.0000000002E86000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317635484.0000000004620000.00000004.08000000.00040000.00000000.sdmp, con1165.exe, 00000009.00000002.318010465.0000000004BF1000.00000004.00000800.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317671404.0000000004650000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317938178.0000000004950000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: wextract.pdbGCTL source: SzznpUhIjo.exe, 00000000.00000002.340743892.0000000000400000.00000040.00000001.01000000.00000003.sdmp, SzznpUhIjo.exe, 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, kino5628.exe, 00000001.00000002.335529120.00000000008E1000.00000020.00000001.01000000.00000004.sdmp, kino5628.exe, 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, kino6423.exe, 00000002.00000002.329120312.0000000000E51000.00000020.00000001.01000000.00000005.sdmp, kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, kino4801.exe, 00000003.00000002.318831834.00000000010D1000.00000020.00000001.01000000.00000006.sdmp, kino6423.exe.1.dr, kino5628.exe.0.dr, kino4801.exe.2.dr
                  Source: Binary string: PC:\lar\megeheyubosed.pdb source: kino6423.exe, 00000002.00000003.257898884.0000000000B39000.00000004.00000020.00020000.00000000.sdmp, dNT35s70.exe.2.dr
                  Source: Binary string: C:\Users\Admin\source\repos\Healer\Healer\obj\Release\Healer.pdb source: kino4801.exe, 00000003.00000003.258987124.0000000004AC6000.00000004.00000020.00020000.00000000.sdmp, bus7600.exe, 00000004.00000000.259206423.0000000000822000.00000002.00000001.01000000.00000007.sdmp, bus7600.exe.3.dr
                  Source: Binary string: XAC:\zavexuji\kixufefaginuye\9-kotegusaw 37\rihipivolov.pdb source: kino4801.exe, 00000003.00000003.258987124.0000000004AC6000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000000.290825680.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, con1165.exe.3.dr
                  Source: Binary string: _.pdb source: con1165.exe, 00000009.00000003.292100697.0000000002E86000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317635484.0000000004620000.00000004.08000000.00040000.00000000.sdmp, con1165.exe, 00000009.00000002.318010465.0000000004BF1000.00000004.00000800.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317671404.0000000004650000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000003.293865027.0000000002E98000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.316698493.0000000002E98000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\zen\nuheweca.pdb source: SzznpUhIjo.exe
                  Source: Binary string: Healer.pdbH5 source: con1165.exe, 00000009.00000003.292100697.0000000002E86000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317635484.0000000004620000.00000004.08000000.00040000.00000000.sdmp, con1165.exe, 00000009.00000002.318010465.0000000004BF1000.00000004.00000800.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317671404.0000000004650000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000002.317938178.0000000004950000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: C:\zavexuji\kixufefaginuye\9-kotegusaw 37\rihipivolov.pdb source: kino4801.exe, 00000003.00000003.258987124.0000000004AC6000.00000004.00000020.00020000.00000000.sdmp, con1165.exe, 00000009.00000000.290825680.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, con1165.exe.3.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeUnpacked PE file: 0.2.SzznpUhIjo.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeUnpacked PE file: 9.2.con1165.exe.400000.0.unpack
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeUnpacked PE file: 0.2.SzznpUhIjo.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.data:W;.idata:R;.rsrc:R;.reloc:R;
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeUnpacked PE file: 9.2.con1165.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_0040724D push ecx; ret
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_06881E94 pushad ; retf
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_068838D3 push cs; ret
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_06881F0B push FFFFFF8Bh; ret
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_06885624 pushfd ; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E724D push ecx; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E5724D push ecx; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D724D push ecx; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0041C40C push cs; iretd
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00423149 push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0041C50E push cs; iretd
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004231C8 push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0040E21D push ecx; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0041C6BE push ebx; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DBC125 push ebx; ret
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DBBE73 push cs; iretd
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DBBF75 push cs; iretd
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DAE484 push ecx; ret
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00402F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
                  Source: en239906.exe.1.drStatic PE information: 0xEFAF45DE [Wed Jun 5 03:28:30 2097 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.985785026742163
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.769697619291595
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.747055941352255
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeFile created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\dNT35s70.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeFile created: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeJump to dropped file
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeFile created: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeFile created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeFile created: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeJump to dropped file
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeFile created: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeJump to dropped file
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00401AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E1AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E51AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D1AE8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe TID: 484Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe TID: 2356Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IXP002.TMP\dNT35s70.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exeJump to dropped file
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00405467 GetSystemInfo,CreateDirectoryA,RemoveDirectoryA,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00402390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E2390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E52390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D2390 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00402F1D GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0040ADB0 GetProcessHeap,HeapFree,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_068800A3 push dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA092B mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DA0D90 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeMemory allocated: page read and write | page guard
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00406F40 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00406CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E6F40 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exeCode function: 1_2_008E6CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E56F40 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exeCode function: 2_2_00E56CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D6F40 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exeCode function: 3_2_010D6CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_004123F1 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DAE883 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DAD070 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DB71D1 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: 9_2_02DB2658 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_004017EE LoadLibraryA,GetProcAddress,AllocateAndInitializeSid,FreeSid,FreeLibrary,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeQueries volume information: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: GetLocaleInfoA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeCode function: GetLocaleInfoA,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00407155 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                  Source: C:\Users\user\Desktop\SzznpUhIjo.exeCode function: 0_2_00402BFB GetVersion,GetModuleHandleW,GetProcAddress,CloseHandle,
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeCode function: 4_2_00007FFBACD2077D GetUserNameA,

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection DisableIOAVProtection 1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 9.2.con1165.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.con1165.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.con1165.exe.2da0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.3.kino5628.exe.4776220.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.3.kino5628.exe.4776220.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.3.con1165.exe.4510000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe, type: DROPPED
                  Source: Yara matchFile source: 0.3.SzznpUhIjo.exe.6f54a20.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.SzznpUhIjo.exe.6f54a20.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exe, type: DROPPED

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 9.2.con1165.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.con1165.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.con1165.exe.2da0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.3.kino5628.exe.4776220.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.3.kino5628.exe.4776220.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.3.con1165.exe.4510000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe, type: DROPPED
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts3
                  Native API
                  1
                  Windows Service
                  2
                  Bypass User Access Control
                  21
                  Disable or Modify Tools
                  1
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium2
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                  System Shutdown/Reboot
                  Default Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  Access Token Manipulation
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory1
                  Account Discovery
                  Remote Desktop Protocol1
                  Input Capture
                  Exfiltration Over Bluetooth1
                  Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts1
                  Service Execution
                  Logon Script (Windows)1
                  Windows Service
                  3
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)1
                  Process Injection
                  22
                  Software Packing
                  NTDS26
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets13
                  Security Software Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Bypass User Access Control
                  Cached Domain Credentials21
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Masquerading
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  System Owner/User Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                  Process Injection
                  Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                  Rundll32
                  Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 829685 Sample: SzznpUhIjo.exe Startdate: 18/03/2023 Architecture: WINDOWS Score: 93 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for dropped file 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 6 other signatures 2->58 9 SzznpUhIjo.exe 1 4 2->9         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        17 2 other processes 2->17 process3 file4 44 C:\Users\user\AppData\Local\...\kino5628.exe, PE32 9->44 dropped 46 C:\Users\user\AppData\Local\...\ge280443.exe, PE32 9->46 dropped 70 Detected unpacking (changes PE section rights) 9->70 72 Detected unpacking (overwrites its own PE header) 9->72 19 kino5628.exe 1 4 9->19         started        signatures5 process6 file7 36 C:\Users\user\AppData\Local\...\kino6423.exe, PE32 19->36 dropped 38 C:\Users\user\AppData\Local\...\en239906.exe, PE32 19->38 dropped 60 Antivirus detection for dropped file 19->60 62 Multi AV Scanner detection for dropped file 19->62 64 Machine Learning detection for dropped file 19->64 23 kino6423.exe 1 4 19->23         started        signatures8 process9 file10 40 C:\Users\user\AppData\Local\...\kino4801.exe, PE32 23->40 dropped 42 C:\Users\user\AppData\Local\...\dNT35s70.exe, PE32 23->42 dropped 66 Multi AV Scanner detection for dropped file 23->66 68 Machine Learning detection for dropped file 23->68 27 kino4801.exe 1 4 23->27         started        signatures11 process12 file13 48 C:\Users\user\AppData\Local\...\con1165.exe, PE32 27->48 dropped 50 C:\Users\user\AppData\Local\...\bus7600.exe, PE32 27->50 dropped 74 Multi AV Scanner detection for dropped file 27->74 76 Machine Learning detection for dropped file 27->76 31 con1165.exe 1 1 27->31         started        34 bus7600.exe 9 1 27->34         started        signatures14 process15 signatures16 78 Multi AV Scanner detection for dropped file 31->78 80 Detected unpacking (changes PE section rights) 31->80 82 Detected unpacking (overwrites its own PE header) 31->82 84 Machine Learning detection for dropped file 34->84 86 Disable Windows Defender notifications (registry) 34->86 88 Disable Windows Defender real time protection (registry) 34->88

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  SzznpUhIjo.exe44%ReversingLabsWin32.Trojan.Pwsx
                  SzznpUhIjo.exe49%VirustotalBrowse
                  SzznpUhIjo.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe100%AviraHEUR/AGEN.1252166
                  C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe100%AviraHEUR/AGEN.1252166
                  C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP002.TMP\dNT35s70.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exe63%ReversingLabsWin32.Trojan.Amadey
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exe80%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe68%ReversingLabsWin32.Trojan.Plugx
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe65%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe88%ReversingLabsWin32.Trojan.RedLine
                  C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe80%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe64%ReversingLabsWin32.Trojan.Plugx
                  C:\Users\user\AppData\Local\Temp\IXP002.TMP\dNT35s70.exe44%ReversingLabsWin32.Trojan.CrypterX
                  C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe59%ReversingLabsWin32.Trojan.Plugx
                  C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe88%ReversingLabsByteCode-MSIL.Trojan.Casdet
                  C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe67%ReversingLabsWin32.Trojan.Babar
                  SourceDetectionScannerLabelLinkDownload
                  1.2.kino5628.exe.8e0000.0.unpack100%AviraHEUR/AGEN.1252166Download File
                  0.2.SzznpUhIjo.exe.400000.0.unpack100%AviraHEUR/AGEN.1252166Download File
                  1.0.kino5628.exe.8e0000.0.unpack100%AviraHEUR/AGEN.1252166Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  31.41.244.200/games/category/index.php0%URL Reputationsafe
                  https://api.ip.sb/ip0%URL Reputationsafe
                  193.233.20.30:41250%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  31.41.244.200/games/category/index.phptrue
                  • URL Reputation: safe
                  low
                  193.233.20.30:4125true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ip.sb/ipkino5628.exe, 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, en239906.exe.1.drfalse
                  • URL Reputation: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox Version:37.0.0 Beryl
                  Analysis ID:829685
                  Start date and time:2023-03-18 21:05:04 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 11m 16s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:22
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:SzznpUhIjo.exe
                  Original Sample Name:f62fe8447c5e9b9ea5ac424543ad20b3.exe
                  Detection:MAL
                  Classification:mal93.troj.spyw.evad.winEXE@15/10@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 54.2% (good quality ratio 52%)
                  • Quality average: 85.2%
                  • Quality standard deviation: 23.7%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240s for rundll32
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report creation exceeded maximum time and may have missing disassembly code information.
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe
                  File Type:CSV text
                  Category:dropped
                  Size (bytes):226
                  Entropy (8bit):5.354940450065058
                  Encrypted:false
                  SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
                  MD5:B10E37251C5B495643F331DB2EEC3394
                  SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
                  SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
                  SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
                  Malicious:false
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
                  Process:C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):321
                  Entropy (8bit):5.355221377978991
                  Encrypted:false
                  SSDEEP:6:Q3La/xwchM3RJoDLIP12MUAvvR+uCqDLIP12MUAvvR+uTL2LDY3U21v:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21v
                  MD5:03C5BA5FCE7124B503EA65EF522177C3
                  SHA1:F76B1F538D5EA66664355901E927B2F870ACCDD8
                  SHA-256:8128CE419BBE0419F1A0BDE97C3A14E3377C0184DC1D7AF61AA01AAB756B625B
                  SHA-512:151A974DDABA852144EC4BC18C548227A32E5261736F186A3920F2497434AEE9DBB0E0AB77E0E52A84A9FBC4529A158882B7549763400DDC2082D384B1135141
                  Malicious:false
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                  Process:C:\Users\user\Desktop\SzznpUhIjo.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):231424
                  Entropy (8bit):6.351317966279805
                  Encrypted:false
                  SSDEEP:6144:4rzyIG8IcCnD5A2QdY8rWpau1CYUqfhYdMBg:KmlLnD5qdY8Fu1CYUehrBg
                  MD5:8627EBE3777CC777ED2A14B907162224
                  SHA1:06EEED93EB3094F9D0B13AC4A6936F7088FBBDAA
                  SHA-256:319B22945BEEB7424FE6DB1E9953AD5F2DC12CBBA2FE24E599C3DEDA678893BB
                  SHA-512:9DE429300C95D52452CAEB80C9D44FF72714F017319E416649C2100F882C394F5AB9F3876CC68D338F4B5A3CD58337DEFFF9405BE64C87D078EDD0D86259C845
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\ge280443.exe, Author: Joe Security
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 63%
                  • Antivirus: Virustotal, Detection: 80%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]..M.o...o...o..B....o..B....o..B....o.......o.......o......5o..B....o...o...o.......o....m..o.......o..Rich.o..................PE..L...gv.d.............................V............@.......................................@..................................M..d................................'...#..p....................$.......#..@............................................text...}........................... ..`.rdata..p...........................@..@.data...H'...`.......F..............@....rsrc................^..............@..@.reloc...'.......(...`..............@..B........................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\SzznpUhIjo.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):870912
                  Entropy (8bit):7.918235779778771
                  Encrypted:false
                  SSDEEP:12288:xMrny90oTgVqmNTdrA26N6DLaDYUBXaSQzuMqXlxcDtMD6Og+Clkp4NE3SNwyc:eyWLNh7baXC3eCZApgEt
                  MD5:51B7FE413501DC9DD84CF1FCBB4C4BA2
                  SHA1:4D55BF3929ED65E32BBD774B8C4AA112ACF211E3
                  SHA-256:E7161C00B03551D7A04E547110B71BC7CBC81B0CEC26AFEC42323A0511F7F572
                  SHA-512:246EFFEFC9D395F83033DD9DEE9B7C1B6D40723C1195FCCA6DFDDA1F60848A0DD6A5BA79A6E4DAB1AE2EEE059F9EF27AEBEF81304805183CAB69CC2E0BAB60C0
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 68%
                  • Antivirus: Virustotal, Detection: 65%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%...K..K..K...N..K...H..K...O..K...J..K..J...K...C..K.....K...I..K.Rich..K.........PE..L....`.b.................d..........`j............@.......................................@...... ......................................................................T...............................@............................................text....c.......d.................. ..`.data...H............h..............@....idata..R............j..............@..@.rsrc................|..............@..@.reloc...............@..............@..B........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):179200
                  Entropy (8bit):4.951892860913068
                  Encrypted:false
                  SSDEEP:3072:W9xqZWBJaHEDgXGJ5MS8IL1eXx9vhxbxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw9:WHqZVGJ5bHLYvh
                  MD5:6FBFF2D7C9BA7F0A71F02A5C70DF9DFC
                  SHA1:003DA0075734CD2D7F201C5B0E4779B8E1F33621
                  SHA-256:CB56407367A42F61993842B66BCD24993A30C87116313C26D6AF9E37BBB1B6B3
                  SHA-512:25842B9DF4767B16096F2BFCEDC9D368A9696E6C6D9C7B2C75987769A5B338AE04B23B1E89F18EEF2244E84F04E4ACF6AF56643A97ABFE5B605F66CBA0BAC27F
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe, Author: Joe Security
                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\AppData\Local\Temp\IXP001.TMP\en239906.exe, Author: ditekSHen
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 88%
                  • Antivirus: Virustotal, Detection: 80%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E................0.............~.... ........@.. ....................... ............@.................................,...O.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):725504
                  Entropy (8bit):7.892582618323688
                  Encrypted:false
                  SSDEEP:12288:sMrSy90DPz6pF226NPDLPQYUBma59zh8qXlzZDZMD6ObrCrk/2/V3Sl:+yiaL0qmUuKFVu/QVw
                  MD5:DB27DCB2B593E449358CEC94D3D257DA
                  SHA1:9BAF8FFCA3B41D45510491BE18B3C7925D3C2BBE
                  SHA-256:211AEFFAE8C6C2E01ADFA9FC68EE1383EBA739F91E2E446F0015B46A5CE3EA7E
                  SHA-512:931904EF2A1707DC53914C7EB26DB142417E75461DE76E27FBA839BFDA0EEAA5FFC49B8F73D0592DC71A82D11E9B2E917FF34B53D87B709A4126B6E8A29FF1DD
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 64%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%...K..K..K...N..K...H..K...O..K...J..K..J...K...C..K.....K...I..K.Rich..K.........PE..L....`.b.................d..........`j............@..........................`............@...... ......................................T....................P..........T...............................@............................................text....c.......d.................. ..`.data...H............h..............@....idata..R............j..............@..@.rsrc................|..............@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):439808
                  Entropy (8bit):6.702697953069308
                  Encrypted:false
                  SSDEEP:6144:UeQq/CLl3o24+WIqXjJcDwZMND6WbrhYmpCTsPrIz:N/CZ3o243TeMZMD6WbrSmUmI
                  MD5:685668F97D2248E1D69DA6CC1553EC0B
                  SHA1:1A034138A90ECADE47AA7FD6982CC2AE3CFF7F03
                  SHA-256:AE3FAA7905D107E9209BE0EA000BA94A09752AE5DF064C86E662B2B1A75554AB
                  SHA-512:DCCC56807CA396489DCC3BAA4BA5BEAD515427FAAEF074B9C4F72386D25CBBC8A4446EBCE306D470EBAAB4B31062FFF1A2564B818778B3B09CEFEDC06D9F07E5
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 44%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B..,...,...,.......,.......,.......,..0W...,...-...,.......,.......,.......,.Rich..,.................PE..L.....a.................4...Nm......n.......P....@...........................q..............................................8..d....po.......................q.x..................................../..@............................................text....2.......4.................. ..`.data...H.k..P...B...8..............@....rsrc........po......z..............@..@.reloc........q.....................@..B........................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):351744
                  Entropy (8bit):7.691266649958334
                  Encrypted:false
                  SSDEEP:6144:KAy+bnr+op0yN90QExDhdvfGLgfYUNcQZR0OCxH8BjFOHCFPkBVHUF+b3K5:wMrgy907DLwQYU6mROVQS8qG
                  MD5:211103CF935C81941C9A7C527A99891E
                  SHA1:1F57C1B0E7784F36E6123BBD9F1F750C430AB7AD
                  SHA-256:F5C28886725B88C1AE31FE02A8EB8B2A7D6E72ED41D8BFB80A5C468AA41A4DDE
                  SHA-512:5A4CCA86C05D356D479E9DF6A08BC98CD795234FCCD4AB15109A2316033EE7EC6D26DA04CE788E967ACEC07E32192DFE6E20A4CFA52839D6CB987A0D74328D4C
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 59%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%...K..K..K...N..K...H..K...O..K...J..K..J...K...C..K.....K...I..K.Rich..K.........PE..L....`.b.................d..........`j............@.......................................@...... ......................................................................T...............................@............................................text....c.......d.................. ..`.data...H............h..............@....idata..R............j..............@..@.rsrc................|..............@..@.reloc...............T..............@..B........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):11264
                  Entropy (8bit):4.97029807367379
                  Encrypted:false
                  SSDEEP:96:yA/vMth9sDLibql3A44P9QL4fwmPImg+A03PvXLOzk+gqWYV4J6oP/zNt:yw+wGWt94+iANiCkc4Jhp
                  MD5:7E93BACBBC33E6652E147E7FE07572A0
                  SHA1:421A7167DA01C8DA4DC4D5234CA3DD84E319E762
                  SHA-256:850CD190AAEEBCF1505674D97F51756F325E650320EAF76785D954223A9BEE38
                  SHA-512:250169D7B6FCEBFF400BE89EDAE8340F14130CED70C340BA9DA9F225F62B52B35F6645BFB510962EFB866F988688CB42392561D3E6B72194BC89D310EA43AA91
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 88%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................"...0.."...........@... ...`....@.. ....................................@..................................@..O....`...............................@..8............................................ ............... ..H............text.... ... ...".................. ..`.rsrc........`.......$..............@..@.reloc...............*..............@..B.................@......H.......T$...............................................................0...........@s.....@...(....&*..0..K......... ?...(......~....(....,.*r...p.....(....%..(....& ....(....(....&.(....&*..0..e.......(....~........+G.....o....r#..p(....,-.o.... ......(....-.*.(....&(.....o....(....&..X....i2..(....&*....0..`.......(....~........+B.....o....r...p(....,(.o.... ......(....-.*.(....&.o....(....&..X....i2..(....&*.0..c......... ?...(......~....(....,.*....(............%...(...
                  Process:C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):340992
                  Entropy (8bit):6.466677658359874
                  Encrypted:false
                  SSDEEP:6144:sZJLa5SdfYUNcQZc0OzxE8RjF/HCFPdBMkhDHK:sZJ+5ShYU6mcn5Q/K
                  MD5:3930494C030BFEF77C7C0624C1F6BAEB
                  SHA1:3FFC69B116C370D6372A62E1C623EA8457808152
                  SHA-256:76A3221E1DCEF4CF9B0F8856DB1E20D24D782C4BF068CF76E95A57EAA6B1516E
                  SHA-512:AB2A772BC04DB434AF4D2C5CD5253A3634A9679E329AD7CE53FAFDE8E7C81CDCC53B3D00F5D2CBC47EAD6BF4EFD1A0D8BAD81FD63E452D4401E3C82A757F7910
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 67%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@......P...P...P..(P/..P..9P...P../Pm..P#z.P...P...Py..P..&P...P..8P...P..=P...PRich...P................PE..L...=..b......................m......P............@..........................0p.................................................d.....n.......................o.....................................P-..@............................................text...h........................... ..`.data...H.j......&..................@....rsrc.........n.....................@..@.reloc..l.....o.....................@..B........................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.76751253637924
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:SzznpUhIjo.exe
                  File size:1238528
                  MD5:f62fe8447c5e9b9ea5ac424543ad20b3
                  SHA1:847f52f9fff9b080e44de6738b61141b289cd09c
                  SHA256:d7f0a894956299f235cc735af3469746f223b3394abc85660e89872503e55982
                  SHA512:c003f5dba14ac90cfbfcb66c8efff3caecad59ef4938fffb4b8c9cba776bfd7363dd8e1f37174d884582e5d237f4241d404014f82617b8fcdcb77352d327a205
                  SSDEEP:24576:bogX4PvpDseL3ckNcZQrKxl3fXZ16b4PEPtYn1h7Xn6iZGyF:bdoPLrcepKfBG4PEED7XF
                  TLSH:5D45F14392E13C48E9268B339E1FD6E8F71EF6B1EE89676531189E2F0471172D163B90
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@......P...P...P..(P/..P..9P...P../Pm..P#z.P...P...Py..P..&P...P..8P...P..=P...PRich...P................PE..L....Dbb...........
                  Icon Hash:a4a484a4a4a4a4e2
                  Entrypoint:0x405088
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Time Stamp:0x62624480 [Fri Apr 22 06:00:32 2022 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:8b512f0a0b2cd54ff600ee8ace8b2bd0
                  Instruction
                  call 00007F6B44C7F123h
                  jmp 00007F6B44C7B35Eh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  push ecx
                  push esi
                  mov esi, dword ptr [ebp+0Ch]
                  push esi
                  call 00007F6B44C7CBE5h
                  mov dword ptr [ebp+0Ch], eax
                  mov eax, dword ptr [esi+0Ch]
                  pop ecx
                  test al, 82h
                  jne 00007F6B44C7B4F9h
                  call 00007F6B44C7C48Dh
                  mov dword ptr [eax], 00000009h
                  or dword ptr [esi+0Ch], 20h
                  or eax, FFFFFFFFh
                  jmp 00007F6B44C7B614h
                  test al, 40h
                  je 00007F6B44C7B4EFh
                  call 00007F6B44C7C472h
                  mov dword ptr [eax], 00000022h
                  jmp 00007F6B44C7B4C5h
                  push ebx
                  xor ebx, ebx
                  test al, 01h
                  je 00007F6B44C7B4F8h
                  mov dword ptr [esi+04h], ebx
                  test al, 10h
                  je 00007F6B44C7B56Dh
                  mov ecx, dword ptr [esi+08h]
                  and eax, FFFFFFFEh
                  mov dword ptr [esi], ecx
                  mov dword ptr [esi+0Ch], eax
                  mov eax, dword ptr [esi+0Ch]
                  and eax, FFFFFFEFh
                  or eax, 02h
                  mov dword ptr [esi+0Ch], eax
                  mov dword ptr [esi+04h], ebx
                  mov dword ptr [ebp-04h], ebx
                  test eax, 0000010Ch
                  jne 00007F6B44C7B50Eh
                  call 00007F6B44C7C76Eh
                  add eax, 20h
                  cmp esi, eax
                  je 00007F6B44C7B4EEh
                  call 00007F6B44C7C762h
                  add eax, 40h
                  cmp esi, eax
                  jne 00007F6B44C7B4EFh
                  push dword ptr [ebp+0Ch]
                  call 00007F6B44C7FB11h
                  pop ecx
                  test eax, eax
                  jne 00007F6B44C7B4E9h
                  push esi
                  call 00007F6B44C7FABDh
                  pop ecx
                  test dword ptr [esi+0Ch], 00000108h
                  push edi
                  je 00007F6B44C7B566h
                  mov eax, dword ptr [esi+08h]
                  mov edi, dword ptr [esi]
                  lea ecx, dword ptr [eax+01h]
                  mov dword ptr [esi], ecx
                  Programming Language:
                  • [C++] VS2008 build 21022
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1097400x64.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x27bb0000x1a612.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x27d60000xa9c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d500x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ac.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x1091080x109200False0.9758442362093352data7.985785026742163IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x10b0000x26af5480x2600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x27bb0000x1a6120x1a800False0.38334684551886794data4.303385034614976IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x27d60000x816c0x8200False0.07370793269230769data0.9145308616917248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x27bb8b00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishMexico
                  RT_ICON0x27bc7580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishMexico
                  RT_ICON0x27bd0000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishMexico
                  RT_ICON0x27bf5a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishMexico
                  RT_ICON0x27c06500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishMexico
                  RT_ICON0x27c0ab80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishMexico
                  RT_ICON0x27c19600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishMexico
                  RT_ICON0x27c22080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishMexico
                  RT_ICON0x27c28d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishMexico
                  RT_ICON0x27c2e380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SpanishMexico
                  RT_ICON0x27c53e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SpanishMexico
                  RT_ICON0x27c64880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SpanishMexico
                  RT_ICON0x27c6e100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SpanishMexico
                  RT_ICON0x27c72780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishMexico
                  RT_ICON0x27c81200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishMexico
                  RT_ICON0x27c89c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishMexico
                  RT_ICON0x27c8f300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishMexico
                  RT_ICON0x27cb4d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishMexico
                  RT_ICON0x27cc5800x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishMexico
                  RT_ICON0x27ccf080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishMexico
                  RT_ICON0x27cd3700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishMexico
                  RT_ICON0x27ce2180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishMexico
                  RT_ICON0x27ceac00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishMexico
                  RT_ICON0x27cf1880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishMexico
                  RT_ICON0x27cf6f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishMexico
                  RT_ICON0x27d1c980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishMexico
                  RT_ICON0x27d2d400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishMexico
                  RT_ICON0x27d36c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishMexico
                  RT_DIALOG0x27d3b300x86data
                  RT_STRING0x27d3bb80x490data
                  RT_STRING0x27d40480x3d6data
                  RT_STRING0x27d44200x492data
                  RT_STRING0x27d48b40x382data
                  RT_ACCELERATOR0x27d4c380x48dataSpanishMexico
                  RT_ACCELERATOR0x27d4c800x18dataSpanishMexico
                  RT_GROUP_ICON0x27d4c980x68dataSpanishMexico
                  RT_GROUP_ICON0x27d4d000x4cdataSpanishMexico
                  RT_GROUP_ICON0x27d4d4c0x76dataSpanishMexico
                  RT_GROUP_ICON0x27d4dc40x76dataSpanishMexico
                  RT_VERSION0x27d4e3c0x1e0data
                  RT_MANIFEST0x27d501c0x5ebXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                  None0x27d56080xadata
                  DLLImport
                  KERNEL32.dllSetDefaultCommConfigW, CreateHardLinkA, GetConsoleAliasesA, LoadLibraryW, _hread, IsBadCodePtr, CreateEventA, FormatMessageW, GetStringTypeExW, GetExitCodeProcess, GetFileAttributesW, WriteConsoleW, WritePrivateProfileSectionW, GetLogicalDriveStringsA, ChangeTimerQueueTimer, SetLastError, GetProcAddress, GlobalAddAtomA, EnumSystemCodePagesW, LocalAlloc, FoldStringA, FreeEnvironmentStringsW, VirtualProtect, GetWindowsDirectoryW, GetFileInformationByHandle, GlobalReAlloc, InterlockedPushEntrySList, LCMapStringW, CloseHandle, CreateFileA, HeapSize, lstrcpynA, CallNamedPipeA, VirtualAlloc, GetVolumeNameForVolumeMountPointA, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, GetLastError, HeapFree, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapReAlloc, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LoadLibraryA, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, LCMapStringA, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, RaiseException
                  USER32.dllClientToScreen, LoadMenuA, InvalidateRgn, GetMenuInfo, MessageBoxIndirectW, CountClipboardFormats, SetScrollInfo
                  GDI32.dllGetGlyphIndicesW
                  ADVAPI32.dllRegOpenKeyA
                  Language of compilation systemCountry where language is spokenMap
                  SpanishMexico
                  Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

                  Click to jump to process

                  Target ID:0
                  Start time:21:06:01
                  Start date:18/03/2023
                  Path:C:\Users\user\Desktop\SzznpUhIjo.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\SzznpUhIjo.exe
                  Imagebase:0x400000
                  File size:1238528 bytes
                  MD5 hash:F62FE8447C5E9B9EA5AC424543AD20B3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.341685333.0000000006A30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.341440182.0000000006880000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.255438944.0000000006E80000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  Target ID:1
                  Start time:21:06:02
                  Start date:18/03/2023
                  Path:C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\IXP000.TMP\kino5628.exe
                  Imagebase:0x8e0000
                  File size:870912 bytes
                  MD5 hash:51B7FE413501DC9DD84CF1FCBB4C4BA2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000003.256675819.00000000046C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 68%, ReversingLabs
                  • Detection: 65%, Virustotal, Browse
                  Reputation:moderate

                  Target ID:2
                  Start time:21:06:02
                  Start date:18/03/2023
                  Path:C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\IXP001.TMP\kino6423.exe
                  Imagebase:0xe50000
                  File size:725504 bytes
                  MD5 hash:DB27DCB2B593E449358CEC94D3D257DA
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 64%, ReversingLabs
                  Reputation:moderate

                  Target ID:3
                  Start time:21:06:03
                  Start date:18/03/2023
                  Path:C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\IXP002.TMP\kino4801.exe
                  Imagebase:0x10d0000
                  File size:351744 bytes
                  MD5 hash:211103CF935C81941C9A7C527A99891E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 59%, ReversingLabs
                  Reputation:moderate

                  Target ID:4
                  Start time:21:06:03
                  Start date:18/03/2023
                  Path:C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\AppData\Local\Temp\IXP003.TMP\bus7600.exe
                  Imagebase:0x820000
                  File size:11264 bytes
                  MD5 hash:7E93BACBBC33E6652E147E7FE07572A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 88%, ReversingLabs
                  Reputation:high

                  Target ID:6
                  Start time:21:06:14
                  Start date:18/03/2023
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                  Imagebase:0x7ff6759a0000
                  File size:69632 bytes
                  MD5 hash:73C519F050C20580F8A62C849D49215A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:9
                  Start time:21:06:18
                  Start date:18/03/2023
                  Path:C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\IXP003.TMP\con1165.exe
                  Imagebase:0x400000
                  File size:340992 bytes
                  MD5 hash:3930494C030BFEF77C7C0624C1F6BAEB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000009.00000002.316570894.0000000002DA0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000009.00000003.291817431.0000000004510000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000009.00000002.316168321.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000009.00000002.316668372.0000000002E26000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 67%, ReversingLabs
                  Reputation:moderate

                  Target ID:14
                  Start time:21:06:22
                  Start date:18/03/2023
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
                  Imagebase:0x7ff6759a0000
                  File size:69632 bytes
                  MD5 hash:73C519F050C20580F8A62C849D49215A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:15
                  Start time:21:06:30
                  Start date:18/03/2023
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
                  Imagebase:0x7ff6759a0000
                  File size:69632 bytes
                  MD5 hash:73C519F050C20580F8A62C849D49215A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language

                  Target ID:16
                  Start time:21:06:44
                  Start date:18/03/2023
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
                  Imagebase:0x7ff6759a0000
                  File size:69632 bytes
                  MD5 hash:73C519F050C20580F8A62C849D49215A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language

                  No disassembly