Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
01885599.exe

Overview

General Information

Sample Name:01885599.exe
Analysis ID:876999
MD5:a29c587c678826f4a44cf6a2a78599f1
SHA1:92ea36730fa1f19300a27ebbb4d1359e7b8a16de
SHA256:b3fbcfd775b7c9bfc5b58f5df13eb8fbeb4844d98756f8fca41b63f060ae5132
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 01885599.exe (PID: 6936 cmdline: C:\Users\user\Desktop\01885599.exe MD5: A29C587C678826F4A44CF6A2A78599F1)
    • 01885599.exe (PID: 6956 cmdline: C:\Users\user\Desktop\01885599.exe MD5: A29C587C678826F4A44CF6A2A78599F1)
      • explorer.exe (PID: 3528 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vbjjhwi (PID: 6476 cmdline: C:\Users\user\AppData\Roaming\vbjjhwi MD5: A29C587C678826F4A44CF6A2A78599F1)
    • vbjjhwi (PID: 6468 cmdline: C:\Users\user\AppData\Roaming\vbjjhwi MD5: A29C587C678826F4A44CF6A2A78599F1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2020, "C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.622842996.00000000006B8000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x7ae9:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 5 entries
      SourceRuleDescriptionAuthorStrings
      1.2.01885599.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        5.2.vbjjhwi.8215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          6.2.vbjjhwi.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            0.2.01885599.exe.7f15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2020, "C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
              Source: 01885599.exeVirustotal: Detection: 37%Perma Link
              Source: http://host-host-file8.com/URL Reputation: Label: malware
              Source: host-file-host6.comVirustotal: Detection: 22%Perma Link
              Source: host-host-file8.comVirustotal: Detection: 19%Perma Link
              Source: C:\Users\user\AppData\Roaming\vbjjhwiReversingLabs: Detection: 40%
              Source: C:\Users\user\AppData\Roaming\vbjjhwiVirustotal: Detection: 37%Perma Link
              Source: 01885599.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\vbjjhwiJoe Sandbox ML: detected
              Source: 01885599.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000003.00000000.569751105.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: MHC:\nodiga.pdb source: 01885599.exe, vbjjhwi.3.dr
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000003.00000000.569751105.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: C:\nodiga.pdb source: 01885599.exe, vbjjhwi.3.dr
              Source: Binary string: eex.pdb source: explorer.exe, 00000003.00000000.569751105.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Windows\explorer.exeNetwork Connect: 194.50.153.68 80
              Source: Malware configuration extractorURLs: http://host-file-host6.com/
              Source: Malware configuration extractorURLs: http://host-host-file8.com/
              Source: Joe Sandbox ViewASN Name: GAZ-IS-ASRU GAZ-IS-ASRU
              Source: Joe Sandbox ViewIP Address: 194.50.153.68 194.50.153.68
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oncejkc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: host-file-host6.com
              Source: explorer.exe, 00000003.00000000.570166430.00007FF883839000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov
              Source: explorer.exe, 00000003.00000000.570166430.00007FF883839000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oncejkc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: host-file-host6.com
              Source: unknownDNS traffic detected: queries for: host-file-host6.com

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 1.2.01885599.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.vbjjhwi.8215a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbjjhwi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.01885599.exe.7f15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: 01885599.exe, 00000000.00000002.530524455.00000000008DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 00000005.00000002.622842996.00000000006B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000000.00000002.530540948.00000000008E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 01885599.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 00000005.00000002.622842996.00000000006B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000000.00000002.530540948.00000000008E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_004118DE
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040A4AA
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0041251A
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_004132E1
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0041139A
              Source: C:\Users\user\Desktop\01885599.exeCode function: String function: 00407404 appears 35 times
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_007F0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 5_2_00820110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
              Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dll
              Source: 01885599.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: vbjjhwi.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 01885599.exeVirustotal: Detection: 37%
              Source: 01885599.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\01885599.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\01885599.exe C:\Users\user\Desktop\01885599.exe
              Source: C:\Users\user\Desktop\01885599.exeProcess created: C:\Users\user\Desktop\01885599.exe C:\Users\user\Desktop\01885599.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\vbjjhwi C:\Users\user\AppData\Roaming\vbjjhwi
              Source: C:\Users\user\AppData\Roaming\vbjjhwiProcess created: C:\Users\user\AppData\Roaming\vbjjhwi C:\Users\user\AppData\Roaming\vbjjhwi
              Source: C:\Users\user\Desktop\01885599.exeProcess created: C:\Users\user\Desktop\01885599.exe C:\Users\user\Desktop\01885599.exe
              Source: C:\Users\user\AppData\Roaming\vbjjhwiProcess created: C:\Users\user\AppData\Roaming\vbjjhwi C:\Users\user\AppData\Roaming\vbjjhwi
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbjjhwiJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/3@4/1
              Source: C:\Users\user\Desktop\01885599.exeCommand line argument: T#0y
              Source: C:\Users\user\Desktop\01885599.exeCommand line argument: #"#
              Source: C:\Users\user\Desktop\01885599.exeCommand line argument: .d|1
              Source: C:\Users\user\Desktop\01885599.exeCommand line argument: K[
              Source: C:\Users\user\Desktop\01885599.exeCommand line argument: ZBE
              Source: C:\Users\user\Desktop\01885599.exeCommand line argument: kernel32.dll
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: 01885599.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000003.00000000.569751105.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: MHC:\nodiga.pdb source: 01885599.exe, vbjjhwi.3.dr
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000003.00000000.569751105.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: C:\nodiga.pdb source: 01885599.exe, vbjjhwi.3.dr
              Source: Binary string: eex.pdb source: explorer.exe, 00000003.00000000.569751105.00007FF883751000.00000020.00000001.01000000.00000007.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\01885599.exeUnpacked PE file: 1.2.01885599.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Roaming\vbjjhwiUnpacked PE file: 6.2.vbjjhwi.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_00407449 push ecx; ret
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_00403770 push ecx; mov dword ptr [esp], 00000000h
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_007F1977 push ebx; iretd
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_007F1970 push ebx; iretd
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_007F198B push ebx; iretd
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_004011D0 push ebx; iretd
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_004011D7 push ebx; iretd
              Source: C:\Users\user\Desktop\01885599.exeCode function: 1_2_004011EB push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 5_2_0082198B push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 5_2_00821970 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 5_2_00821977 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_004011D0 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_004011D7 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 6_2_004011EB push ebx; iretd
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040D6B0 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.581715328183715
              Source: initial sampleStatic PE information: section name: .text entropy: 7.581715328183715
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbjjhwiJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbjjhwiJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\01885599.exeJump to behavior
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vbjjhwi:Zone.Identifier read attributes | delete
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: vbjjhwi, 00000006.00000002.633709015.00000000005EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
              Source: C:\Users\user\Desktop\01885599.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\01885599.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\01885599.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\01885599.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\01885599.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\01885599.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vbjjhwiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vbjjhwiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vbjjhwiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vbjjhwiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vbjjhwiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\vbjjhwiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Windows\explorer.exe TID: 860Thread sleep count: 505 > 30
              Source: C:\Windows\explorer.exe TID: 640Thread sleep count: 300 > 30
              Source: C:\Windows\explorer.exe TID: 640Thread sleep time: -30000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 4628Thread sleep count: 187 > 30
              Source: C:\Windows\explorer.exe TID: 3728Thread sleep time: -60000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 6600Thread sleep count: 516 > 30
              Source: C:\Windows\explorer.exe TID: 6588Thread sleep count: 203 > 30
              Source: C:\Windows\explorer.exe TID: 6584Thread sleep count: 248 > 30
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 505
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 516
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 850
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 867
              Source: C:\Users\user\Desktop\01885599.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,
              Source: C:\Users\user\Desktop\01885599.exeSystem information queried: ModuleInformation
              Source: explorer.exe, 00000003.00000000.551747489.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
              Source: explorer.exe, 00000003.00000000.551747489.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000006
              Source: explorer.exe, 00000003.00000000.547717895.00000000059F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
              Source: explorer.exe, 00000003.00000000.541592445.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000003.00000000.551747489.0000000008394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000003.00000000.554336000.000000000CDC8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&
              Source: explorer.exe, 00000003.00000000.551747489.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000000

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\01885599.exeSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\AppData\Roaming\vbjjhwiSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040533B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040D6B0 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_007F0042 push dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\vbjjhwiCode function: 5_2_00820042 push dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\01885599.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\vbjjhwiProcess queried: DebugPort
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_004084CF SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040D9F8 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040533B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_004063C4 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeFile created: vbjjhwi.3.drJump to dropped file
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Windows\explorer.exeNetwork Connect: 194.50.153.68 80
              Source: C:\Users\user\Desktop\01885599.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\Desktop\01885599.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\AppData\Roaming\vbjjhwiSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\AppData\Roaming\vbjjhwiSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\Desktop\01885599.exeMemory written: C:\Users\user\Desktop\01885599.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\vbjjhwiMemory written: C:\Users\user\AppData\Roaming\vbjjhwi base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_007F0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\Desktop\01885599.exeThread created: C:\Windows\explorer.exe EIP: 4C01930
              Source: C:\Users\user\AppData\Roaming\vbjjhwiThread created: unknown EIP: 4B01930
              Source: C:\Users\user\Desktop\01885599.exeProcess created: C:\Users\user\Desktop\01885599.exe C:\Users\user\Desktop\01885599.exe
              Source: C:\Users\user\AppData\Roaming\vbjjhwiProcess created: C:\Users\user\AppData\Roaming\vbjjhwi C:\Users\user\AppData\Roaming\vbjjhwi
              Source: explorer.exe, 00000003.00000000.541706271.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
              Source: explorer.exe, 00000003.00000000.541706271.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.551747489.000000000834F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.548723968.0000000005C70000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000003.00000000.541706271.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000003.00000000.541592445.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanath
              Source: explorer.exe, 00000003.00000000.541706271.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\01885599.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_0040963C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
              Source: C:\Users\user\Desktop\01885599.exeCode function: 0_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.01885599.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.vbjjhwi.8215a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbjjhwi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.01885599.exe.7f15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.2.01885599.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.vbjjhwi.8215a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbjjhwi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.01885599.exe.7f15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              512
              Process Injection
              11
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Native API
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              12
              Virtualization/Sandbox Evasion
              LSASS Memory421
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth2
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)Logon Script (Windows)512
              Process Injection
              Security Account Manager12
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Deobfuscate/Decode Files or Information
              NTDS2
              Process Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common3
              Obfuscated Files or Information
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items12
              Software Packing
              DCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc Filesystem14
              System Information Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
              File Deletion
              /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 876999 Sample: 01885599.exe Startdate: 28/05/2023 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 6 other signatures 2->36 7 01885599.exe 2->7         started        10 vbjjhwi 2->10         started        process3 signatures4 46 Detected unpacking (changes PE section rights) 7->46 48 Contains functionality to inject code into remote processes 7->48 50 Injects a PE file into a foreign processes 7->50 12 01885599.exe 7->12         started        52 Multi AV Scanner detection for dropped file 10->52 54 Machine Learning detection for dropped file 10->54 15 vbjjhwi 10->15         started        process5 signatures6 56 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->56 58 Maps a DLL or memory area into another process 12->58 60 Checks if the current machine is a virtual machine (disk enumeration) 12->60 17 explorer.exe 2 3 12->17 injected 62 Creates a thread in another existing process (thread injection) 15->62 process7 dnsIp8 26 host-file-host6.com 194.50.153.68, 49684, 80 GAZ-IS-ASRU United Kingdom 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\vbjjhwi, PE32 17->22 dropped 24 C:\Users\user\...\vbjjhwi:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              01885599.exe37%VirustotalBrowse
              01885599.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\vbjjhwi100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\vbjjhwi41%ReversingLabs
              C:\Users\user\AppData\Roaming\vbjjhwi37%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              host-file-host6.com22%VirustotalBrowse
              host-host-file8.com19%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov0%URL Reputationsafe
              http://host-file-host6.com/0%URL Reputationsafe
              http://host-host-file8.com/100%URL Reputationmalware
              http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              host-file-host6.com
              194.50.153.68
              truetrueunknown
              host-host-file8.com
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://host-file-host6.com/true
              • URL Reputation: safe
              unknown
              http://host-host-file8.com/true
              • URL Reputation: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groovexplorer.exe, 00000003.00000000.570166430.00007FF883839000.00000002.00000001.01000000.00000007.sdmpfalse
              • URL Reputation: safe
              unknown
              http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.groexplorer.exe, 00000003.00000000.570166430.00007FF883839000.00000002.00000001.01000000.00000007.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              194.50.153.68
              host-file-host6.comUnited Kingdom
              198526GAZ-IS-ASRUtrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:876999
              Start date and time:2023-05-28 10:42:06 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 33s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:01885599.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/3@4/1
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 89% (good quality ratio 81.4%)
              • Quality average: 69.7%
              • Quality standard deviation: 32.3%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
              • Report size getting too big, too many NtEnumerateKey calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              10:43:38API Interceptor495x Sleep call for process: explorer.exe modified
              10:43:39Task SchedulerRun new task: Firefox Default Browser Agent 584CBA64FC927E3D path: C:\Users\user\AppData\Roaming\vbjjhwi
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\explorer.exe
              File Type:JSON data
              Category:dropped
              Size (bytes):985
              Entropy (8bit):5.225141189452099
              Encrypted:false
              SSDEEP:24:YqHZ6T06MhmimH6CUXyhm/mYbNdB6hmUmYz0JahmDmYbxdB6hm1mY7KTdB6hmuXA:YqHZ6T06McLHDUXyceYbNdUcZYz0Jack
              MD5:094FB5672ED4D4990DF33BE15CE2CB40
              SHA1:2BF77D89C6637F478893D63DFC809808C835A839
              SHA-256:19FEE75854625F0D51FE350049FE33EB16CB40E728C9BAADB232CA3E449DECA3
              SHA-512:A542CF7E0BE301B8BB2E369B0750D0C93941E02D044BFA840A28FBBEDD3F3EAF2D4E0F01ED0B3F836C916D0F0B79EEDD084DBE941A6424947C4EFE87AF38B304
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:{"RecentItems":[{"AppID":"Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge","PenUsageSec":15,"LastSwitchedLowPart":3031678576,"LastSwitchedHighPart":30840569,"PrePopulated":false},{"AppID":"Microsoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim","PenUsageSec":15,"LastSwitchedLowPart":4008173792,"LastSwitchedHighPart":30747923,"PrePopulated":true},{"AppID":"Microsoft.WindowsMaps_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":3998173792,"LastSwitchedHighPart":30747923,"PrePopulated":true},{"AppID":"Microsoft.MSPaint_8wekyb3d8bbwe!Microsoft.MSPaint","PenUsageSec":15,"LastSwitchedLowPart":3988173792,"LastSwitchedHighPart":30747923,"PrePopulated":true},{"AppID":"Microsoft.Windows.Photos_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":3968173792,"LastSwitchedHighPart":30747923,"PrePopulated":true},{"AppID":"Microsoft.Getstarted_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":3958173792,"LastSwitchedHighPart":30747923,"PrePopulated":true}]}
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):290304
              Entropy (8bit):6.587235509794249
              Encrypted:false
              SSDEEP:3072:X6JOiohJ19MbvuzdRE45nLtn5gFTti91:yOiY9T10FTti
              MD5:A29C587C678826F4A44CF6A2A78599F1
              SHA1:92EA36730FA1F19300A27EBBB4D1359E7B8A16DE
              SHA-256:B3FBCFD775B7C9BFC5B58F5DF13EB8FBEB4844D98756F8FCA41B63F060AE5132
              SHA-512:72CB4A67885C7E2167F98365F209FB0F757FB978ACBB55099D5A8B768DDE4158071DF3BD6D6CD808255A45FFE24040D86715A673EAEB386B1412918B2C65DDED
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 41%
              • Antivirus: Virustotal, Detection: 37%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L.... Ib....................."&.....YN............@...........................(.....E...........................................d.....'.......................(..... ...............................P1..@............................................text............................... ..`.data...DX$.........................@....rsrc.........'.....................@..@.reloc..83....(..4...:..............@..B........................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.587235509794249
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:01885599.exe
              File size:290304
              MD5:a29c587c678826f4a44cf6a2a78599f1
              SHA1:92ea36730fa1f19300a27ebbb4d1359e7b8a16de
              SHA256:b3fbcfd775b7c9bfc5b58f5df13eb8fbeb4844d98756f8fca41b63f060ae5132
              SHA512:72cb4a67885c7e2167f98365f209fb0f757fb978acbb55099d5a8b768dde4158071df3bd6d6cd808255a45ffe24040d86715a673eaeb386b1412918b2c65dded
              SSDEEP:3072:X6JOiohJ19MbvuzdRE45nLtn5gFTti91:yOiY9T10FTti
              TLSH:F154185382A13C55EA668B768E1FC6F8761EB6718F5D3769321CBA1F08B00B2D173B11
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.......|...c...|...c...|...c...Richb...................PE..L.... Ib...........
              Icon Hash:554541494945691d
              Entrypoint:0x404e59
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x62492001 [Sun Apr 3 04:18:09 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:2d9ed3462f8a74bfd1231e2e9de56b43
              Instruction
              call 00007F66CCCE3613h
              jmp 00007F66CCCDECADh
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              mov ecx, dword ptr [esp+04h]
              test ecx, 00000003h
              je 00007F66CCCDEE56h
              mov al, byte ptr [ecx]
              add ecx, 01h
              test al, al
              je 00007F66CCCDEE80h
              test ecx, 00000003h
              jne 00007F66CCCDEE21h
              add eax, 00000000h
              lea esp, dword ptr [esp+00000000h]
              lea esp, dword ptr [esp+00000000h]
              mov eax, dword ptr [ecx]
              mov edx, 7EFEFEFFh
              add edx, eax
              xor eax, FFFFFFFFh
              xor eax, edx
              add ecx, 04h
              test eax, 81010100h
              je 00007F66CCCDEE1Ah
              mov eax, dword ptr [ecx-04h]
              test al, al
              je 00007F66CCCDEE64h
              test ah, ah
              je 00007F66CCCDEE56h
              test eax, 00FF0000h
              je 00007F66CCCDEE45h
              test eax, FF000000h
              je 00007F66CCCDEE34h
              jmp 00007F66CCCDEDFFh
              lea eax, dword ptr [ecx-01h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-02h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-03h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-04h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 20h
              mov eax, dword ptr [ebp+08h]
              push esi
              push edi
              push 00000008h
              pop ecx
              mov esi, 004012D8h
              lea edi, dword ptr [ebp-20h]
              rep movsd
              mov dword ptr [ebp-08h], eax
              mov eax, dword ptr [ebp+0Ch]
              pop edi
              mov dword ptr [ebp-04h], eax
              pop esi
              Programming Language:
              • [ASM] VS2008 build 21022
              • [ C ] VS2008 build 21022
              • [C++] VS2008 build 21022
              • [IMP] VS2005 build 50727
              • [RES] VS2008 build 21022
              • [LNK] VS2008 build 21022
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x287f80x64.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2700000x19398.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x28a0000xddc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x31500x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x282ba0x28400False0.7868788819875776data7.581715328183715IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x2a0000x2458440x1e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x2700000x193980x19400False0.37933168316831684data4.266178948669026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x28a0000x33380x3400False0.22581129807692307data2.522522475741166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x2707300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x2715d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x271e800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x2744280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x2754d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_ICON0x2759880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x2768300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x2770d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x2776400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x279be80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x27ac900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
              RT_ICON0x27b6180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_ICON0x27bae80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x27c9900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x27d2380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
              RT_ICON0x27d9000x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x27de680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x2804100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x2814b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_ICON0x2819880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x2828300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x2830d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x2836400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x285be80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x286c900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
              RT_ICON0x2876180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_STRING0x287d200x664data
              RT_STRING0x2883880x59edata
              RT_STRING0x2889280x29adata
              RT_STRING0x288bc80x248data
              RT_STRING0x288e100x582data
              RT_GROUP_ICON0x287a800x68data
              RT_GROUP_ICON0x2759380x4cdata
              RT_GROUP_ICON0x2819200x68data
              RT_GROUP_ICON0x27ba800x68data
              RT_VERSION0x287ae80x238data
              DLLImport
              KERNEL32.dllGetModuleHandleW, IsBadReadPtr, GetConsoleAliasesLengthA, WaitForMultipleObjectsEx, GetPrivateProfileIntA, FreeConsole, GetVersionExW, WritePrivateProfileStructW, MulDiv, GetModuleFileNameW, CreateActCtxA, WritePrivateProfileStringW, ReplaceFileA, GetStringTypeExA, GetStdHandle, GetLogicalDriveStringsA, OpenMutexW, GetLastError, ReadConsoleOutputCharacterA, GetProcAddress, AttachConsole, SleepEx, VirtualAlloc, _hwrite, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, GetFileType, CreateFileMappingW, FindFirstVolumeMountPointW, GetNumberFormatW, CreateEventW, GetModuleFileNameA, lstrcmpiW, GetModuleHandleA, CreateMutexA, GetFileAttributesExW, GetConsoleCursorInfo, ScrollConsoleScreenBufferA, GetCurrentThreadId, FindAtomW, EnumResourceLanguagesW, DebugBreak, FindNextVolumeA, AddConsoleAliasW, CancelWaitableTimer, GetCommState, WaitForSingleObject, GetLongPathNameA, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapFree, WideCharToMultiByte, SetHandleCount, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, Sleep, ExitProcess, WriteFile, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, SetFilePointer, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, HeapSize, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, CreateFileA, CloseHandle
              USER32.dllCharLowerBuffA
              GDI32.dllGetCharWidthW, EnumFontsW, GetCharABCWidthsFloatW
              ADVAPI32.dllMapGenericMask
              TimestampSource PortDest PortSource IPDest IP
              May 28, 2023 10:43:38.398670912 CEST4968480192.168.2.4194.50.153.68
              May 28, 2023 10:43:38.423293114 CEST8049684194.50.153.68192.168.2.4
              May 28, 2023 10:43:38.423527002 CEST4968480192.168.2.4194.50.153.68
              May 28, 2023 10:43:38.424354076 CEST4968480192.168.2.4194.50.153.68
              May 28, 2023 10:43:38.424403906 CEST4968480192.168.2.4194.50.153.68
              May 28, 2023 10:43:38.448726892 CEST8049684194.50.153.68192.168.2.4
              May 28, 2023 10:43:38.449038982 CEST8049684194.50.153.68192.168.2.4
              May 28, 2023 10:43:38.546303988 CEST8049684194.50.153.68192.168.2.4
              May 28, 2023 10:43:38.546607018 CEST4968480192.168.2.4194.50.153.68
              May 28, 2023 10:43:38.547754049 CEST4968480192.168.2.4194.50.153.68
              May 28, 2023 10:43:38.572189093 CEST8049684194.50.153.68192.168.2.4
              TimestampSource PortDest PortSource IPDest IP
              May 28, 2023 10:43:38.250626087 CEST5741753192.168.2.48.8.8.8
              May 28, 2023 10:43:38.373370886 CEST53574178.8.8.8192.168.2.4
              May 28, 2023 10:43:38.559854984 CEST5098253192.168.2.48.8.8.8
              May 28, 2023 10:43:39.579572916 CEST5098253192.168.2.48.8.8.8
              May 28, 2023 10:43:40.626518011 CEST5098253192.168.2.48.8.8.8
              May 28, 2023 10:43:42.625973940 CEST53509828.8.8.8192.168.2.4
              May 28, 2023 10:43:43.618988991 CEST53509828.8.8.8192.168.2.4
              May 28, 2023 10:43:44.670767069 CEST53509828.8.8.8192.168.2.4
              TimestampSource IPDest IPChecksumCodeType
              May 28, 2023 10:43:43.619714975 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
              May 28, 2023 10:43:44.673737049 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              May 28, 2023 10:43:38.250626087 CEST192.168.2.48.8.8.80x1116Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
              May 28, 2023 10:43:38.559854984 CEST192.168.2.48.8.8.80x1637Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              May 28, 2023 10:43:39.579572916 CEST192.168.2.48.8.8.80x1637Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              May 28, 2023 10:43:40.626518011 CEST192.168.2.48.8.8.80x1637Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              May 28, 2023 10:43:38.373370886 CEST8.8.8.8192.168.2.40x1116No error (0)host-file-host6.com194.50.153.68A (IP address)IN (0x0001)false
              May 28, 2023 10:43:42.625973940 CEST8.8.8.8192.168.2.40x1637Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              May 28, 2023 10:43:43.618988991 CEST8.8.8.8192.168.2.40x1637Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              May 28, 2023 10:43:44.670767069 CEST8.8.8.8192.168.2.40x1637Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              • oncejkc.org
                • host-file-host6.com

              Click to jump to process

              Target ID:0
              Start time:10:42:57
              Start date:28/05/2023
              Path:C:\Users\user\Desktop\01885599.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\01885599.exe
              Imagebase:0x400000
              File size:290304 bytes
              MD5 hash:A29C587C678826F4A44CF6A2A78599F1
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.530540948.00000000008E9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:1
              Start time:10:42:57
              Start date:28/05/2023
              Path:C:\Users\user\Desktop\01885599.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\01885599.exe
              Imagebase:0x400000
              File size:290304 bytes
              MD5 hash:A29C587C678826F4A44CF6A2A78599F1
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.571005339.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.570947519.0000000000420000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:3
              Start time:10:43:02
              Start date:28/05/2023
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff618f60000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:10:43:39
              Start date:28/05/2023
              Path:C:\Users\user\AppData\Roaming\vbjjhwi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\vbjjhwi
              Imagebase:0x400000
              File size:290304 bytes
              MD5 hash:A29C587C678826F4A44CF6A2A78599F1
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.622842996.00000000006B8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 41%, ReversingLabs
              • Detection: 37%, Virustotal, Browse
              Reputation:low

              Target ID:6
              Start time:10:43:40
              Start date:28/05/2023
              Path:C:\Users\user\AppData\Roaming\vbjjhwi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\vbjjhwi
              Imagebase:0x400000
              File size:290304 bytes
              MD5 hash:A29C587C678826F4A44CF6A2A78599F1
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.633668542.00000000004A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.633696994.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              Reputation:low

              No disassembly