Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YofglD94L7.exe

Overview

General Information

Sample Name:YofglD94L7.exe
Original Sample Name:a15368816de1f0ed8b7bb687f8ef54a7.exe
Analysis ID:877009
MD5:a15368816de1f0ed8b7bb687f8ef54a7
SHA1:6323221495834dc42128b64e07881913a62cd71a
SHA256:ad357adba4c2b2a46057c65dc06fcba8e2ccb41d157a88cb31dc29db43cecf36
Tags:exeRecordBreaker
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • YofglD94L7.exe (PID: 7896 cmdline: C:\Users\user\Desktop\YofglD94L7.exe MD5: A15368816DE1F0ED8B7BB687F8EF54A7)
    • YofglD94L7.exe (PID: 7916 cmdline: C:\Users\user\Desktop\YofglD94L7.exe MD5: A15368816DE1F0ED8B7BB687F8EF54A7)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • jefgchi (PID: 8152 cmdline: C:\Users\user\AppData\Roaming\jefgchi MD5: A15368816DE1F0ED8B7BB687F8EF54A7)
    • jefgchi (PID: 6060 cmdline: C:\Users\user\AppData\Roaming\jefgchi MD5: A15368816DE1F0ED8B7BB687F8EF54A7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2020, "C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.360930929.00000000009D9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x795d:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 5 entries
      SourceRuleDescriptionAuthorStrings
      6.2.jefgchi.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        1.2.YofglD94L7.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          5.2.jefgchi.7215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            0.2.YofglD94L7.exe.9415a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2020, "C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
              Source: YofglD94L7.exeReversingLabs: Detection: 44%
              Source: YofglD94L7.exeVirustotal: Detection: 43%Perma Link
              Source: http://host-host-file8.com/URL Reputation: Label: malware
              Source: host-file-host6.comVirustotal: Detection: 22%Perma Link
              Source: host-host-file8.comVirustotal: Detection: 19%Perma Link
              Source: C:\Users\user\AppData\Roaming\jefgchiReversingLabs: Detection: 43%
              Source: C:\Users\user\AppData\Roaming\jefgchiVirustotal: Detection: 43%Perma Link
              Source: YofglD94L7.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\jefgchiJoe Sandbox ML: detected
              Source: YofglD94L7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000002.00000000.386088396.00007FFC1B351000.00000020.00000001.01000000.00000005.sdmp
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000002.00000000.386088396.00007FFC1B351000.00000020.00000001.01000000.00000005.sdmp
              Source: Binary string: (C:\jenases-bifid\zonewaf\givacuy\73 zof.pdb source: YofglD94L7.exe, jefgchi.2.dr
              Source: Binary string: C:\jenases-bifid\zonewaf\givacuy\73 zof.pdb source: YofglD94L7.exe, jefgchi.2.dr
              Source: Binary string: eex.pdb source: explorer.exe, 00000002.00000000.386088396.00007FFC1B351000.00000020.00000001.01000000.00000005.sdmp
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004038C7 GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,CreateJobObjectA,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,EnterCriticalSection,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Windows\explorer.exeNetwork Connect: 194.50.153.68 80
              Source: Malware configuration extractorURLs: http://host-file-host6.com/
              Source: Malware configuration extractorURLs: http://host-host-file8.com/
              Source: Joe Sandbox ViewASN Name: GAZ-IS-ASRU GAZ-IS-ASRU
              Source: Joe Sandbox ViewIP Address: 194.50.153.68 194.50.153.68
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xlrooofq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 138Host: host-file-host6.com
              Source: explorer.exe, 00000002.00000000.386292796.00007FFC1B439000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov
              Source: explorer.exe, 00000002.00000000.386292796.00007FFC1B439000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xlrooofq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 138Host: host-file-host6.com
              Source: unknownDNS traffic detected: queries for: host-file-host6.com

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 6.2.jefgchi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.YofglD94L7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.jefgchi.7215a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YofglD94L7.exe.9415a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: YofglD94L7.exe, 00000000.00000002.360914185.00000000009CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 00000000.00000002.360930929.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000005.00000002.437682684.0000000000928000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: YofglD94L7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 00000000.00000002.360930929.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000005.00000002.437682684.0000000000928000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0041185E
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0040A42A
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0041249A
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0040C933
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00413261
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0041131A
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: String function: 00407384 appears 35 times
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00940110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_00720110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
              Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dll
              Source: YofglD94L7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: jefgchi.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: YofglD94L7.exeReversingLabs: Detection: 44%
              Source: YofglD94L7.exeVirustotal: Detection: 43%
              Source: YofglD94L7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\YofglD94L7.exe C:\Users\user\Desktop\YofglD94L7.exe
              Source: C:\Users\user\Desktop\YofglD94L7.exeProcess created: C:\Users\user\Desktop\YofglD94L7.exe C:\Users\user\Desktop\YofglD94L7.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\jefgchi C:\Users\user\AppData\Roaming\jefgchi
              Source: C:\Users\user\AppData\Roaming\jefgchiProcess created: C:\Users\user\AppData\Roaming\jefgchi C:\Users\user\AppData\Roaming\jefgchi
              Source: C:\Users\user\Desktop\YofglD94L7.exeProcess created: C:\Users\user\Desktop\YofglD94L7.exe C:\Users\user\Desktop\YofglD94L7.exe
              Source: C:\Users\user\AppData\Roaming\jefgchiProcess created: C:\Users\user\AppData\Roaming\jefgchi C:\Users\user\AppData\Roaming\jefgchi
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}\InProcServer32
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jefgchiJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_009E098B CreateToolhelp32Snapshot,Module32First,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCommand line argument: T#0y
              Source: C:\Users\user\Desktop\YofglD94L7.exeCommand line argument: #"#
              Source: C:\Users\user\Desktop\YofglD94L7.exeCommand line argument: .d|1
              Source: C:\Users\user\Desktop\YofglD94L7.exeCommand line argument: K[
              Source: C:\Users\user\Desktop\YofglD94L7.exeCommand line argument: ZBE
              Source: C:\Users\user\Desktop\YofglD94L7.exeCommand line argument: kernel32.dll
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: YofglD94L7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000002.00000000.386088396.00007FFC1B351000.00000020.00000001.01000000.00000005.sdmp
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000002.00000000.386088396.00007FFC1B351000.00000020.00000001.01000000.00000005.sdmp
              Source: Binary string: (C:\jenases-bifid\zonewaf\givacuy\73 zof.pdb source: YofglD94L7.exe, jefgchi.2.dr
              Source: Binary string: C:\jenases-bifid\zonewaf\givacuy\73 zof.pdb source: YofglD94L7.exe, jefgchi.2.dr
              Source: Binary string: eex.pdb source: explorer.exe, 00000002.00000000.386088396.00007FFC1B351000.00000020.00000001.01000000.00000005.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\YofglD94L7.exeUnpacked PE file: 1.2.YofglD94L7.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Roaming\jefgchiUnpacked PE file: 6.2.jefgchi.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004036E0 push ecx; mov dword ptr [esp], 00000000h
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004073C9 push ecx; ret
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0094198B push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00941977 push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00941970 push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_009E189E push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_009E1889 push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_009E672A pushad ; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_004011D0 push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_004011D7 push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 1_2_004011EB push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_00721970 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_00721977 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_0072198B push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_009307B1 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_009307C6 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_00935652 pushad ; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_004011D0 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_004011D7 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 6_2_004011EB push ebx; iretd
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0040D630 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.588227971051698
              Source: initial sampleStatic PE information: section name: .text entropy: 7.588227971051698
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jefgchiJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jefgchiJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\yofgld94l7.exeJump to behavior
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jefgchi:Zone.Identifier read attributes | delete
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: YofglD94L7.exe, 00000001.00000002.387676501.000000000061B000.00000004.00000020.00020000.00000000.sdmp, jefgchi, 00000006.00000002.448428463.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\YofglD94L7.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\jefgchiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\jefgchiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\jefgchiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\jefgchiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\jefgchiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\jefgchiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Windows\explorer.exe TID: 7956Thread sleep count: 358 > 30
              Source: C:\Windows\explorer.exe TID: 7964Thread sleep count: 291 > 30
              Source: C:\Windows\explorer.exe TID: 7960Thread sleep count: 177 > 30
              Source: C:\Windows\explorer.exe TID: 3488Thread sleep time: -60000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 5980Thread sleep count: 461 > 30
              Source: C:\Windows\explorer.exe TID: 6036Thread sleep count: 258 > 30
              Source: C:\Windows\explorer.exe TID: 6028Thread sleep count: 217 > 30
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\YofglD94L7.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 358
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 461
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 872
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 831
              Source: C:\Users\user\Desktop\YofglD94L7.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004038C7 GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,CreateJobObjectA,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,EnterCriticalSection,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,
              Source: C:\Users\user\Desktop\YofglD94L7.exeSystem information queried: ModuleInformation
              Source: explorer.exe, 00000002.00000000.378808063.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z,
              Source: explorer.exe, 00000002.00000000.378808063.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
              Source: explorer.exe, 00000002.00000000.374886460.0000000007166000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
              Source: explorer.exe, 00000002.00000000.378808063.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i,
              Source: explorer.exe, 00000002.00000000.378808063.0000000008FD3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG
              Source: explorer.exe, 00000002.00000000.372670848.0000000005063000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9'
              Source: explorer.exe, 00000002.00000000.378808063.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}.exe,-4000
              Source: explorer.exe, 00000002.00000000.378808063.0000000008FD3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
              Source: explorer.exe, 00000002.00000000.379947658.000000000917E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\YofglD94L7.exeSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\AppData\Roaming\jefgchiSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004052BB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0040D630 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00940042 push dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_009E0268 push dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_00720042 push dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\jefgchiCode function: 5_2_0092F190 push dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\YofglD94L7.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\jefgchiProcess queried: DebugPort
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0040844F SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_0040D978 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004052BB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00406344 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeFile created: jefgchi.2.drJump to dropped file
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Windows\explorer.exeNetwork Connect: 194.50.153.68 80
              Source: C:\Users\user\Desktop\YofglD94L7.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\Desktop\YofglD94L7.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\AppData\Roaming\jefgchiSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\AppData\Roaming\jefgchiSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\Desktop\YofglD94L7.exeMemory written: C:\Users\user\Desktop\YofglD94L7.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\jefgchiMemory written: C:\Users\user\AppData\Roaming\jefgchi base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_00940110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\Desktop\YofglD94L7.exeThread created: C:\Windows\explorer.exe EIP: 57E1930
              Source: C:\Users\user\AppData\Roaming\jefgchiThread created: unknown EIP: 58A1930
              Source: C:\Users\user\Desktop\YofglD94L7.exeProcess created: C:\Users\user\Desktop\YofglD94L7.exe C:\Users\user\Desktop\YofglD94L7.exe
              Source: C:\Users\user\AppData\Roaming\jefgchiProcess created: C:\Users\user\AppData\Roaming\jefgchi C:\Users\user\AppData\Roaming\jefgchi
              Source: explorer.exe, 00000002.00000000.372178125.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerT7<=ge
              Source: explorer.exe, 00000002.00000000.372178125.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.378808063.00000000090D8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.374860016.0000000006770000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000002.00000000.372178125.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000002.00000000.371960520.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CProgmanile
              Source: explorer.exe, 00000002.00000000.372178125.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: GetLocaleInfoA,
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004095BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
              Source: C:\Users\user\Desktop\YofglD94L7.exeCode function: 0_2_004038C7 GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,CreateJobObjectA,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,EnterCriticalSection,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 6.2.jefgchi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.YofglD94L7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.jefgchi.7215a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YofglD94L7.exe.9415a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 6.2.jefgchi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.YofglD94L7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.jefgchi.7215a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YofglD94L7.exe.9415a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              512
              Process Injection
              11
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts2
              Native API
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              12
              Virtualization/Sandbox Evasion
              LSASS Memory421
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth2
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)Logon Script (Windows)512
              Process Injection
              Security Account Manager12
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Deobfuscate/Decode Files or Information
              NTDS3
              Process Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common3
              Obfuscated Files or Information
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items12
              Software Packing
              DCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc Filesystem15
              System Information Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
              File Deletion
              /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 877009 Sample: YofglD94L7.exe Startdate: 28/05/2023 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 6 other signatures 2->36 7 YofglD94L7.exe 2->7         started        10 jefgchi 2->10         started        process3 signatures4 46 Detected unpacking (changes PE section rights) 7->46 48 Contains functionality to inject code into remote processes 7->48 50 Injects a PE file into a foreign processes 7->50 12 YofglD94L7.exe 7->12         started        52 Multi AV Scanner detection for dropped file 10->52 54 Machine Learning detection for dropped file 10->54 15 jefgchi 10->15         started        process5 signatures6 56 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->56 58 Maps a DLL or memory area into another process 12->58 60 Checks if the current machine is a virtual machine (disk enumeration) 12->60 17 explorer.exe 2 3 12->17 injected 62 Creates a thread in another existing process (thread injection) 15->62 process7 dnsIp8 26 host-file-host6.com 194.50.153.68, 49699, 80 GAZ-IS-ASRU United Kingdom 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\jefgchi, PE32 17->22 dropped 24 C:\Users\user\...\jefgchi:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              YofglD94L7.exe44%ReversingLabs
              YofglD94L7.exe44%VirustotalBrowse
              YofglD94L7.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\jefgchi100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\jefgchi43%ReversingLabs
              C:\Users\user\AppData\Roaming\jefgchi44%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              host-file-host6.com22%VirustotalBrowse
              host-host-file8.com19%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov0%URL Reputationsafe
              http://host-file-host6.com/0%URL Reputationsafe
              http://host-host-file8.com/100%URL Reputationmalware
              http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              host-file-host6.com
              194.50.153.68
              truetrueunknown
              host-host-file8.com
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://host-file-host6.com/true
              • URL Reputation: safe
              unknown
              http://host-host-file8.com/true
              • URL Reputation: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groovexplorer.exe, 00000002.00000000.386292796.00007FFC1B439000.00000002.00000001.01000000.00000005.sdmpfalse
              • URL Reputation: safe
              unknown
              http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.groexplorer.exe, 00000002.00000000.386292796.00007FFC1B439000.00000002.00000001.01000000.00000005.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              194.50.153.68
              host-file-host6.comUnited Kingdom
              198526GAZ-IS-ASRUtrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:877009
              Start date and time:2023-05-28 14:26:04 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 20s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:YofglD94L7.exe
              Original Sample Name:a15368816de1f0ed8b7bb687f8ef54a7.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/2@4/1
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 79.2% (good quality ratio 72.3%)
              • Quality average: 69.5%
              • Quality standard deviation: 32.3%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              14:27:05API Interceptor952x Sleep call for process: explorer.exe modified
              14:27:33Task SchedulerRun new task: Firefox Default Browser Agent 58F21DDAF5459DDF path: C:\Users\user\AppData\Roaming\jefgchi
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):282624
              Entropy (8bit):6.606962847821293
              Encrypted:false
              SSDEEP:3072:MgzVrh9zwm5ZisWcVtnQTbwOw7bsDYR6Pd5gG+ZGvAgi:jzVbwiZL9VtQTb7w7IDu1GQ
              MD5:A15368816DE1F0ED8B7BB687F8EF54A7
              SHA1:6323221495834DC42128B64E07881913A62CD71A
              SHA-256:AD357ADBA4C2B2A46057C65DC06FCBA8E2CCB41D157A88CB31DC29DB43CECF36
              SHA-512:E65F67F8344C8BB11FBF4F8DCE717463C5C8CF9C358BEFFCFA6DAA8816CB9FEDA7EE7947B90112B81F20FD7EF057884334B648CF9C52AB6420C9514460CC79AC
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 43%
              • Antivirus: Virustotal, Detection: 44%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L...Ptpb......................&......M............@...........................(......A..........................................d.....'..w....................(..... ................................0..@............................................text.............................. ..`.data...DX$.........................@....rsrc....w....'..x..................@..@.reloc..(3....(..4..................@..B........................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.606962847821293
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:YofglD94L7.exe
              File size:282624
              MD5:a15368816de1f0ed8b7bb687f8ef54a7
              SHA1:6323221495834dc42128b64e07881913a62cd71a
              SHA256:ad357adba4c2b2a46057c65dc06fcba8e2ccb41d157a88cb31dc29db43cecf36
              SHA512:e65f67f8344c8bb11fbf4f8dce717463c5c8cf9c358beffcfa6daa8816cb9feda7ee7947b90112b81f20fd7ef057884334b648cf9c52ab6420c9514460cc79ac
              SSDEEP:3072:MgzVrh9zwm5ZisWcVtnQTbwOw7bsDYR6Pd5gG+ZGvAgi:jzVbwiZL9VtQTb7w7IDu1GQ
              TLSH:9A543A8396E2FC54ED678A729E2FC6E8761EF2508F59776922189A1F04703B2C173713
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.......|...c...|...c...|...c...Richb...................PE..L...Ptpb...........
              Icon Hash:4545554d5145691d
              Entrypoint:0x404dd9
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x62707450 [Tue May 3 00:16:16 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:d302e4ac3406067f8ed838633897aebb
              Instruction
              call 00007EFDCC6D7A33h
              jmp 00007EFDCC6D30CDh
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              mov ecx, dword ptr [esp+04h]
              test ecx, 00000003h
              je 00007EFDCC6D3276h
              mov al, byte ptr [ecx]
              add ecx, 01h
              test al, al
              je 00007EFDCC6D32A0h
              test ecx, 00000003h
              jne 00007EFDCC6D3241h
              add eax, 00000000h
              lea esp, dword ptr [esp+00000000h]
              lea esp, dword ptr [esp+00000000h]
              mov eax, dword ptr [ecx]
              mov edx, 7EFEFEFFh
              add edx, eax
              xor eax, FFFFFFFFh
              xor eax, edx
              add ecx, 04h
              test eax, 81010100h
              je 00007EFDCC6D323Ah
              mov eax, dword ptr [ecx-04h]
              test al, al
              je 00007EFDCC6D3284h
              test ah, ah
              je 00007EFDCC6D3276h
              test eax, 00FF0000h
              je 00007EFDCC6D3265h
              test eax, FF000000h
              je 00007EFDCC6D3254h
              jmp 00007EFDCC6D321Fh
              lea eax, dword ptr [ecx-01h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-02h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-03h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-04h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 20h
              mov eax, dword ptr [ebp+08h]
              push esi
              push edi
              push 00000008h
              pop ecx
              mov esi, 004012D8h
              lea edi, dword ptr [ebp-20h]
              rep movsd
              mov dword ptr [ebp-08h], eax
              mov eax, dword ptr [ebp+0Ch]
              pop edi
              mov dword ptr [ebp-04h], eax
              pop esi
              Programming Language:
              • [ASM] VS2008 build 21022
              • [ C ] VS2008 build 21022
              • [C++] VS2008 build 21022
              • [IMP] VS2005 build 50727
              • [RES] VS2008 build 21022
              • [LNK] VS2008 build 21022
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x287080x64.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2700000x17700.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2880000xde8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x30c80x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x281c20x28200False0.7881924162772586data7.588227971051698IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x2a0000x2458440x1e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x2700000x177000x17800False0.3845786236702128DIY-Thermocam raw data (Lepton 3.x), scale -32383-32383, spot sensor temperature -0.000000, unit celsius, color scheme 0, calibration: offset 170141183460469231731687303715884105728.000000, slope 338285908496422218588534207645931798528.0000004.2078074882893075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x2880000x33280x3400False0.22596153846153846data2.5254561443990666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x2706d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
              RT_ICON0x270d980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x2733400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_ICON0x2737d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x2746800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x274f280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x2754900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x277a380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x278ae00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
              RT_ICON0x2794680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_ICON0x2799380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x27a7e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x27b0880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
              RT_ICON0x27b7500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x27bcb80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x27e2600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x27f3080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_ICON0x27f7d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x2806800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x280f280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x2814900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x283a380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x284ae00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
              RT_ICON0x2854680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_STRING0x285b700x6fadata
              RT_STRING0x2862700x6a8data
              RT_STRING0x2869180x4b8data
              RT_STRING0x286dd00x1dadata
              RT_STRING0x286fb00x74cdata
              RT_GROUP_ICON0x2858d00x68data
              RT_GROUP_ICON0x27f7700x68data
              RT_GROUP_ICON0x2737a80x30data
              RT_GROUP_ICON0x2798d00x68data
              RT_VERSION0x2859380x234data
              DLLImport
              KERNEL32.dllGetModuleHandleW, GetTickCount, IsBadReadPtr, GetConsoleAliasesLengthA, GetPrivateProfileIntA, FreeConsole, GetVersionExW, WritePrivateProfileStructW, MulDiv, GetModuleFileNameW, CreateActCtxA, WritePrivateProfileStringW, ReplaceFileA, GetStringTypeExA, CreateJobObjectA, GetStdHandle, GetLogicalDriveStringsA, OpenMutexW, GetLastError, ReadConsoleOutputCharacterA, GetProcAddress, SleepEx, GetLongPathNameA, VirtualAlloc, EnterCriticalSection, _hwrite, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, GetFileType, CreateFileMappingW, FindFirstVolumeMountPointW, GetNumberFormatW, CreateEventW, GetModuleFileNameA, lstrcmpiW, GetModuleHandleA, CreateMutexA, GetFileAttributesExW, GetConsoleCursorInfo, ScrollConsoleScreenBufferA, FindAtomW, EnumResourceLanguagesW, DebugBreak, FindNextVolumeA, AddConsoleAliasW, CancelWaitableTimer, GetCommState, WaitForSingleObject, AttachConsole, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapFree, WideCharToMultiByte, SetHandleCount, DeleteCriticalSection, LeaveCriticalSection, Sleep, ExitProcess, WriteFile, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, SetFilePointer, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, HeapSize, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, CreateFileA, CloseHandle
              USER32.dllCharLowerBuffA
              GDI32.dllGetCharWidthW, EnumFontsW, GetCharABCWidthsFloatW
              ADVAPI32.dllMapGenericMask
              TimestampSource PortDest PortSource IPDest IP
              May 28, 2023 14:27:33.230834007 CEST4969980192.168.2.3194.50.153.68
              May 28, 2023 14:27:33.255489111 CEST8049699194.50.153.68192.168.2.3
              May 28, 2023 14:27:33.255640030 CEST4969980192.168.2.3194.50.153.68
              May 28, 2023 14:27:33.288640976 CEST4969980192.168.2.3194.50.153.68
              May 28, 2023 14:27:33.288698912 CEST4969980192.168.2.3194.50.153.68
              May 28, 2023 14:27:33.313499928 CEST8049699194.50.153.68192.168.2.3
              May 28, 2023 14:27:33.410356998 CEST8049699194.50.153.68192.168.2.3
              May 28, 2023 14:27:33.410481930 CEST4969980192.168.2.3194.50.153.68
              May 28, 2023 14:27:33.412591934 CEST4969980192.168.2.3194.50.153.68
              May 28, 2023 14:27:33.437330008 CEST8049699194.50.153.68192.168.2.3
              TimestampSource PortDest PortSource IPDest IP
              May 28, 2023 14:27:33.203741074 CEST5238753192.168.2.38.8.8.8
              May 28, 2023 14:27:33.223833084 CEST53523878.8.8.8192.168.2.3
              May 28, 2023 14:27:34.652285099 CEST5692453192.168.2.38.8.8.8
              May 28, 2023 14:27:35.692795038 CEST5692453192.168.2.38.8.8.8
              May 28, 2023 14:27:36.739690065 CEST5692453192.168.2.38.8.8.8
              May 28, 2023 14:27:38.697307110 CEST53569248.8.8.8192.168.2.3
              May 28, 2023 14:27:38.697369099 CEST53569248.8.8.8192.168.2.3
              May 28, 2023 14:27:40.777638912 CEST53569248.8.8.8192.168.2.3
              TimestampSource IPDest IPChecksumCodeType
              May 28, 2023 14:27:40.777764082 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              May 28, 2023 14:27:33.203741074 CEST192.168.2.38.8.8.80xa05aStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
              May 28, 2023 14:27:34.652285099 CEST192.168.2.38.8.8.80x7ae7Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              May 28, 2023 14:27:35.692795038 CEST192.168.2.38.8.8.80x7ae7Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              May 28, 2023 14:27:36.739690065 CEST192.168.2.38.8.8.80x7ae7Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              May 28, 2023 14:27:33.223833084 CEST8.8.8.8192.168.2.30xa05aNo error (0)host-file-host6.com194.50.153.68A (IP address)IN (0x0001)false
              May 28, 2023 14:27:38.697307110 CEST8.8.8.8192.168.2.30x7ae7Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              May 28, 2023 14:27:38.697369099 CEST8.8.8.8192.168.2.30x7ae7Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              May 28, 2023 14:27:40.777638912 CEST8.8.8.8192.168.2.30x7ae7Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              • xlrooofq.org
                • host-file-host6.com

              Click to jump to process

              Target ID:0
              Start time:14:26:59
              Start date:28/05/2023
              Path:C:\Users\user\Desktop\YofglD94L7.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\YofglD94L7.exe
              Imagebase:0x400000
              File size:282624 bytes
              MD5 hash:A15368816DE1F0ED8B7BB687F8EF54A7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.360930929.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:1
              Start time:14:26:59
              Start date:28/05/2023
              Path:C:\Users\user\Desktop\YofglD94L7.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\YofglD94L7.exe
              Imagebase:0x400000
              File size:282624 bytes
              MD5 hash:A15368816DE1F0ED8B7BB687F8EF54A7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.387615974.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.387662201.00000000005E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:2
              Start time:14:27:04
              Start date:28/05/2023
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff69fe90000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:14:27:33
              Start date:28/05/2023
              Path:C:\Users\user\AppData\Roaming\jefgchi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\jefgchi
              Imagebase:0x400000
              File size:282624 bytes
              MD5 hash:A15368816DE1F0ED8B7BB687F8EF54A7
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.437682684.0000000000928000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 43%, ReversingLabs
              • Detection: 44%, Virustotal, Browse
              Reputation:low

              Target ID:6
              Start time:14:27:35
              Start date:28/05/2023
              Path:C:\Users\user\AppData\Roaming\jefgchi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\jefgchi
              Imagebase:0x400000
              File size:282624 bytes
              MD5 hash:A15368816DE1F0ED8B7BB687F8EF54A7
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.448548337.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.448462460.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              No disassembly