Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
86NKwZGvwn.exe

Overview

General Information

Sample Name:86NKwZGvwn.exe
Original Sample Name:40dcb3614c663e7ef659044a6514d446.exe
Analysis ID:877010
MD5:40dcb3614c663e7ef659044a6514d446
SHA1:4c25245ddbea2d5fb5330ce333d313a4973e5b98
SHA256:069b749dc167bae6560ea3f73a461184f0380f6ae3ffcfc095488063da4f9554
Tags:exeRecordBreaker
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 86NKwZGvwn.exe (PID: 5764 cmdline: C:\Users\user\Desktop\86NKwZGvwn.exe MD5: 40DCB3614C663E7EF659044A6514D446)
    • 86NKwZGvwn.exe (PID: 5732 cmdline: C:\Users\user\Desktop\86NKwZGvwn.exe MD5: 40DCB3614C663E7EF659044A6514D446)
      • explorer.exe (PID: 3528 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • evcgwtu (PID: 6696 cmdline: C:\Users\user\AppData\Roaming\evcgwtu MD5: 40DCB3614C663E7EF659044A6514D446)
    • evcgwtu (PID: 6688 cmdline: C:\Users\user\AppData\Roaming\evcgwtu MD5: 40DCB3614C663E7EF659044A6514D446)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2020, "C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.528146469.0000000000808000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x7581:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 5 entries
      SourceRuleDescriptionAuthorStrings
      1.2.86NKwZGvwn.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        6.2.evcgwtu.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          5.2.evcgwtu.22a15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            0.2.86NKwZGvwn.exe.7315a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2020, "C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
              Source: 86NKwZGvwn.exeReversingLabs: Detection: 37%
              Source: 86NKwZGvwn.exeVirustotal: Detection: 38%Perma Link
              Source: http://host-host-file8.com/URL Reputation: Label: malware
              Source: host-file-host6.comVirustotal: Detection: 22%Perma Link
              Source: C:\Users\user\AppData\Roaming\evcgwtuReversingLabs: Detection: 37%
              Source: 86NKwZGvwn.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\evcgwtuJoe Sandbox ML: detected
              Source: 86NKwZGvwn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Binary string: 6C:\vafovuvotun26\we.pdb source: 86NKwZGvwn.exe, evcgwtu.2.dr
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000002.00000000.568853592.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000002.00000000.568853592.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: C:\vafovuvotun26\we.pdb source: 86NKwZGvwn.exe, evcgwtu.2.dr
              Source: Binary string: eex.pdb source: explorer.exe, 00000002.00000000.568853592.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatA,GetCharWidthW,GetCharABCWidthsFloatA,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,WritePrivateProfileStructW,VirtualFree,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Windows\explorer.exeNetwork Connect: 194.50.153.68 80
              Source: Malware configuration extractorURLs: http://host-file-host6.com/
              Source: Malware configuration extractorURLs: http://host-host-file8.com/
              Source: Joe Sandbox ViewASN Name: GAZ-IS-ASRU GAZ-IS-ASRU
              Source: Joe Sandbox ViewIP Address: 194.50.153.68 194.50.153.68
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tclyyrvk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 172Host: host-file-host6.com
              Source: explorer.exe, 00000002.00000000.569722517.00007FF883839000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov
              Source: explorer.exe, 00000002.00000000.569722517.00007FF883839000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tclyyrvk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 172Host: host-file-host6.com
              Source: unknownDNS traffic detected: queries for: host-file-host6.com

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 1.2.86NKwZGvwn.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.evcgwtu.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.evcgwtu.22a15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.86NKwZGvwn.exe.7315a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: 86NKwZGvwn.exe, 00000000.00000002.528128131.00000000007FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 00000000.00000002.528146469.0000000000808000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000005.00000002.618725202.00000000008D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 86NKwZGvwn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 00000000.00000002.528146469.0000000000808000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000005.00000002.618725202.00000000008D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_004114CE
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0040A09A
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0041210A
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00412ED1
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00410F8A
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: String function: 00406FF4 appears 35 times
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00730110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_022A0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_0040180C Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_00401818 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_00401822 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_00401826 Sleep,NtTerminateProcess,
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_00401834 Sleep,NtTerminateProcess,
              Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
              Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dll
              Source: 86NKwZGvwn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: evcgwtu.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 86NKwZGvwn.exeReversingLabs: Detection: 37%
              Source: 86NKwZGvwn.exeVirustotal: Detection: 38%
              Source: 86NKwZGvwn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\86NKwZGvwn.exe C:\Users\user\Desktop\86NKwZGvwn.exe
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeProcess created: C:\Users\user\Desktop\86NKwZGvwn.exe C:\Users\user\Desktop\86NKwZGvwn.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\evcgwtu C:\Users\user\AppData\Roaming\evcgwtu
              Source: C:\Users\user\AppData\Roaming\evcgwtuProcess created: C:\Users\user\AppData\Roaming\evcgwtu C:\Users\user\AppData\Roaming\evcgwtu
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeProcess created: C:\Users\user\Desktop\86NKwZGvwn.exe C:\Users\user\Desktop\86NKwZGvwn.exe
              Source: C:\Users\user\AppData\Roaming\evcgwtuProcess created: C:\Users\user\AppData\Roaming\evcgwtu C:\Users\user\AppData\Roaming\evcgwtu
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\evcgwtuJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_008DF7EF CreateToolhelp32Snapshot,Module32First,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCommand line argument: T#0y
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCommand line argument: #"#
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCommand line argument: .d|1
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCommand line argument: K[
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCommand line argument: ZBE
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCommand line argument: kernel32.dll
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: 86NKwZGvwn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: 6C:\vafovuvotun26\we.pdb source: 86NKwZGvwn.exe, evcgwtu.2.dr
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000002.00000000.568853592.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000002.00000000.568853592.00007FF883751000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: C:\vafovuvotun26\we.pdb source: 86NKwZGvwn.exe, evcgwtu.2.dr
              Source: Binary string: eex.pdb source: explorer.exe, 00000002.00000000.568853592.00007FF883751000.00000020.00000001.01000000.00000007.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeUnpacked PE file: 1.2.86NKwZGvwn.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Roaming\evcgwtuUnpacked PE file: 6.2.evcgwtu.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00407039 push ecx; ret
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00403770 push ecx; mov dword ptr [esp], 00000000h
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00731970 push ebx; iretd
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00731977 push ebx; iretd
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0073198B push ebx; iretd
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_004011D0 push ebx; iretd
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_004011D7 push ebx; iretd
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 1_2_004011EB push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_008E558E pushad ; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_008E06ED push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_008E0702 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_022A1970 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_022A1977 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_022A198B push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_004011D0 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_004011D7 push ebx; iretd
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 6_2_004011EB push ebx; iretd
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0040D2A0 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.5850231403020265
              Source: initial sampleStatic PE information: section name: .text entropy: 7.5850231403020265
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\evcgwtuJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\evcgwtuJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\86nkwzgvwn.exeJump to behavior
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\evcgwtu:Zone.Identifier read attributes | delete
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: 86NKwZGvwn.exe, 00000001.00000002.570719934.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, evcgwtu, 00000006.00000002.629577001.0000000002010000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\evcgwtuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\evcgwtuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\evcgwtuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\evcgwtuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\evcgwtuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\evcgwtuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Windows\explorer.exe TID: 2100Thread sleep count: 428 > 30
              Source: C:\Windows\explorer.exe TID: 4664Thread sleep count: 278 > 30
              Source: C:\Windows\explorer.exe TID: 1008Thread sleep count: 236 > 30
              Source: C:\Windows\explorer.exe TID: 3728Thread sleep time: -60000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 7052Thread sleep count: 255 > 30
              Source: C:\Windows\explorer.exe TID: 7056Thread sleep count: 441 > 30
              Source: C:\Windows\explorer.exe TID: 7088Thread sleep count: 217 > 30
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 428
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 441
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 872
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 853
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatA,GetCharWidthW,GetCharABCWidthsFloatA,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,WritePrivateProfileStructW,VirtualFree,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeSystem information queried: ModuleInformation
              Source: explorer.exe, 00000002.00000000.547860666.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
              Source: explorer.exe, 00000002.00000000.547860666.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000006
              Source: explorer.exe, 00000002.00000000.541257119.00000000059F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
              Source: explorer.exe, 00000002.00000000.539072852.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.547860666.0000000008394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.550540539.000000000CDC8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&
              Source: explorer.exe, 00000002.00000000.547860666.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000000

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\AppData\Roaming\evcgwtuSystem information queried: CodeIntegrityInformation
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00404F2B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0040D2A0 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00730042 push dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_008DF0CC push dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\evcgwtuCode function: 5_2_022A0042 push dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\evcgwtuProcess queried: DebugPort
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_004080BF SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0040D5E8 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00404F2B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00405FB4 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeFile created: evcgwtu.2.drJump to dropped file
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Windows\explorer.exeNetwork Connect: 194.50.153.68 80
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\AppData\Roaming\evcgwtuSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\AppData\Roaming\evcgwtuSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeMemory written: C:\Users\user\Desktop\86NKwZGvwn.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\evcgwtuMemory written: C:\Users\user\AppData\Roaming\evcgwtu base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00730110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeThread created: C:\Windows\explorer.exe EIP: 2A41930
              Source: C:\Users\user\AppData\Roaming\evcgwtuThread created: unknown EIP: 4641930
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeProcess created: C:\Users\user\Desktop\86NKwZGvwn.exe C:\Users\user\Desktop\86NKwZGvwn.exe
              Source: C:\Users\user\AppData\Roaming\evcgwtuProcess created: C:\Users\user\AppData\Roaming\evcgwtu C:\Users\user\AppData\Roaming\evcgwtu
              Source: explorer.exe, 00000002.00000000.539179940.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
              Source: explorer.exe, 00000002.00000000.541894819.0000000005C70000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.539179940.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.547860666.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000002.00000000.539179940.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000002.00000000.539072852.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanath
              Source: explorer.exe, 00000002.00000000.539179940.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_0040922C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
              Source: C:\Users\user\Desktop\86NKwZGvwn.exeCode function: 0_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatA,GetCharWidthW,GetCharABCWidthsFloatA,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,WritePrivateProfileStructW,VirtualFree,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.86NKwZGvwn.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.evcgwtu.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.evcgwtu.22a15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.86NKwZGvwn.exe.7315a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.2.86NKwZGvwn.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.evcgwtu.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.evcgwtu.22a15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.86NKwZGvwn.exe.7315a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              512
              Process Injection
              11
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts2
              Native API
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              12
              Virtualization/Sandbox Evasion
              LSASS Memory421
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth2
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)Logon Script (Windows)512
              Process Injection
              Security Account Manager12
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Deobfuscate/Decode Files or Information
              NTDS3
              Process Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common3
              Obfuscated Files or Information
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items12
              Software Packing
              DCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc Filesystem14
              System Information Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
              File Deletion
              /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 877010 Sample: 86NKwZGvwn.exe Startdate: 28/05/2023 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 6 other signatures 2->36 7 86NKwZGvwn.exe 2->7         started        10 evcgwtu 2->10         started        process3 signatures4 46 Detected unpacking (changes PE section rights) 7->46 48 Contains functionality to inject code into remote processes 7->48 50 Injects a PE file into a foreign processes 7->50 12 86NKwZGvwn.exe 7->12         started        52 Multi AV Scanner detection for dropped file 10->52 54 Machine Learning detection for dropped file 10->54 15 evcgwtu 10->15         started        process5 signatures6 56 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->56 58 Maps a DLL or memory area into another process 12->58 60 Checks if the current machine is a virtual machine (disk enumeration) 12->60 17 explorer.exe 2 3 12->17 injected 62 Creates a thread in another existing process (thread injection) 15->62 process7 dnsIp8 26 host-file-host6.com 194.50.153.68, 49695, 80 GAZ-IS-ASRU United Kingdom 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\evcgwtu, PE32 17->22 dropped 24 C:\Users\user\...\evcgwtu:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              86NKwZGvwn.exe38%ReversingLabs
              86NKwZGvwn.exe38%VirustotalBrowse
              86NKwZGvwn.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\evcgwtu100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\evcgwtu38%ReversingLabs
              No Antivirus matches
              SourceDetectionScannerLabelLink
              host-file-host6.com22%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov0%URL Reputationsafe
              http://host-file-host6.com/0%URL Reputationsafe
              http://host-host-file8.com/100%URL Reputationmalware
              http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              host-file-host6.com
              194.50.153.68
              truetrueunknown
              host-host-file8.com
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groovexplorer.exe, 00000002.00000000.569722517.00007FF883839000.00000002.00000001.01000000.00000007.sdmpfalse
                • URL Reputation: safe
                unknown
                http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.groexplorer.exe, 00000002.00000000.569722517.00007FF883839000.00000002.00000001.01000000.00000007.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                194.50.153.68
                host-file-host6.comUnited Kingdom
                198526GAZ-IS-ASRUtrue
                Joe Sandbox Version:37.1.0 Beryl
                Analysis ID:877010
                Start date and time:2023-05-28 14:26:09 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 34s
                Hypervisor based Inspection enabled:false
                Report type:light
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:86NKwZGvwn.exe
                Original Sample Name:40dcb3614c663e7ef659044a6514d446.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@6/2@4/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 89.1% (good quality ratio 81.3%)
                • Quality average: 69.6%
                • Quality standard deviation: 32.5%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
                • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                14:27:41Task SchedulerRun new task: Firefox Default Browser Agent 8C147AAD391B03BE path: C:\Users\user\AppData\Roaming\evcgwtu
                14:27:41API Interceptor558x Sleep call for process: explorer.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\explorer.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):289792
                Entropy (8bit):6.556546845015486
                Encrypted:false
                SSDEEP:3072:5NifDzAVBXaRLmIuLQO4RfI0NlusQ8+kdMEuj8hxdd5gWw9KDD5Qj:afDzA6RcefIq3Q/kWEu4GZYDDej
                MD5:40DCB3614C663E7EF659044A6514D446
                SHA1:4C25245DDBEA2D5FB5330CE333D313A4973E5B98
                SHA-256:069B749DC167BAE6560EA3F73A461184F0380F6AE3FFCFC095488063DA4F9554
                SHA-512:06520E1BB1C3F06428738BA5F10DD0445BC2FEDAA461E5D53F2A5727718F88B138DAFC08658D3598B317A06C97BD26B543B8685F52F948952384939A715ECFD4
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 38%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&.v.b...b...b...|......|......|..H...EXc.k...b......|..c...|..c...|..c...Richb...........PE..L.....b.................~...&&.....IJ............@...........................(.....l~..........................................d.....&.......................(..... ...............................P1..@............................................text...R}.......~.................. ..`.data...DX$.........................@....rsrc.........&.....................@..@.reloc..,3....(..4...8..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\explorer.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Reputation:high, very likely benign file
                Preview:[ZoneTransfer]....ZoneId=0
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.556546845015486
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:86NKwZGvwn.exe
                File size:289792
                MD5:40dcb3614c663e7ef659044a6514d446
                SHA1:4c25245ddbea2d5fb5330ce333d313a4973e5b98
                SHA256:069b749dc167bae6560ea3f73a461184f0380f6ae3ffcfc095488063da4f9554
                SHA512:06520e1bb1c3f06428738ba5f10dd0445bc2fedaa461e5d53f2a5727718f88b138dafc08658d3598b317a06c97bd26b543b8685f52f948952384939a715ecfd4
                SSDEEP:3072:5NifDzAVBXaRLmIuLQO4RfI0NlusQ8+kdMEuj8hxdd5gWw9KDD5Qj:afDzA6RcefIq3Q/kWEu4GZYDDej
                TLSH:FB54185392E17D54E9764B729F2FC7F87A1EF2508E5977A912189E2F04B03B2C263702
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&.v.b...b...b...|.......|.......|...H...EXc.k...b.......|...c...|...c...|...c...Richb...........PE..L......b.................~.
                Icon Hash:455145455155691d
                Entrypoint:0x404a49
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:TERMINAL_SERVER_AWARE
                Time Stamp:0x62E7B3D1 [Mon Aug 1 11:06:57 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:0
                File Version Major:5
                File Version Minor:0
                Subsystem Version Major:5
                Subsystem Version Minor:0
                Import Hash:937554e81340ac479b370382e43a74d4
                Instruction
                call 00007F5790DA6B23h
                jmp 00007F5790DA21BDh
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                mov ecx, dword ptr [esp+04h]
                test ecx, 00000003h
                je 00007F5790DA2366h
                mov al, byte ptr [ecx]
                add ecx, 01h
                test al, al
                je 00007F5790DA2390h
                test ecx, 00000003h
                jne 00007F5790DA2331h
                add eax, 00000000h
                lea esp, dword ptr [esp+00000000h]
                lea esp, dword ptr [esp+00000000h]
                mov eax, dword ptr [ecx]
                mov edx, 7EFEFEFFh
                add edx, eax
                xor eax, FFFFFFFFh
                xor eax, edx
                add ecx, 04h
                test eax, 81010100h
                je 00007F5790DA232Ah
                mov eax, dword ptr [ecx-04h]
                test al, al
                je 00007F5790DA2374h
                test ah, ah
                je 00007F5790DA2366h
                test eax, 00FF0000h
                je 00007F5790DA2355h
                test eax, FF000000h
                je 00007F5790DA2344h
                jmp 00007F5790DA230Fh
                lea eax, dword ptr [ecx-01h]
                mov ecx, dword ptr [esp+04h]
                sub eax, ecx
                ret
                lea eax, dword ptr [ecx-02h]
                mov ecx, dword ptr [esp+04h]
                sub eax, ecx
                ret
                lea eax, dword ptr [ecx-03h]
                mov ecx, dword ptr [esp+04h]
                sub eax, ecx
                ret
                lea eax, dword ptr [ecx-04h]
                mov ecx, dword ptr [esp+04h]
                sub eax, ecx
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                sub esp, 20h
                mov eax, dword ptr [ebp+08h]
                push esi
                push edi
                push 00000008h
                pop ecx
                mov esi, 004012D8h
                lea edi, dword ptr [ebp-20h]
                rep movsd
                mov dword ptr [ebp-08h], eax
                mov eax, dword ptr [ebp+0Ch]
                pop edi
                mov dword ptr [ebp-04h], eax
                pop esi
                Programming Language:
                • [ASM] VS2008 build 21022
                • [ C ] VS2008 build 21022
                • [C++] VS2008 build 21022
                • [IMP] VS2005 build 50727
                • [RES] VS2008 build 21022
                • [LNK] VS2008 build 21022
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x282a80x64.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x26f0000x197f8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x2890000xde4.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x31500x40.text
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d0.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x27d520x27e00False0.7870910070532915data7.5850231403020265IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x290000x2458440x1e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x26f0000x197f80x19800False0.3793370863970588data4.201292392897118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x2890000x332c0x3400False0.22874098557692307data2.527933420000788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x26f7300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                RT_ICON0x2705d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                RT_ICON0x270e800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                RT_ICON0x2734280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                RT_ICON0x2744d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                RT_ICON0x2749880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                RT_ICON0x2758300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                RT_ICON0x2760d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                RT_ICON0x2766400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                RT_ICON0x278be80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                RT_ICON0x279c900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                RT_ICON0x27a6180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                RT_ICON0x27aae80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                RT_ICON0x27b9900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                RT_ICON0x27c2380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
                RT_ICON0x27c9000x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                RT_ICON0x27ce680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                RT_ICON0x27f4100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                RT_ICON0x2804b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                RT_ICON0x2809880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                RT_ICON0x2818300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                RT_ICON0x2820d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                RT_ICON0x2826400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                RT_ICON0x284be80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                RT_ICON0x285c900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                RT_ICON0x2866180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                RT_STRING0x286d200x5c4data
                RT_STRING0x2872e80x710data
                RT_STRING0x2879f80x558data
                RT_STRING0x287f500x29cdata
                RT_STRING0x2881f00x606data
                RT_GROUP_ICON0x286a800x68data
                RT_GROUP_ICON0x2749380x4cdata
                RT_GROUP_ICON0x2809200x68data
                RT_GROUP_ICON0x27aa800x68data
                RT_VERSION0x286ae80x238data
                DLLImport
                KERNEL32.dllGetModuleHandleW, VirtualFree, IsBadReadPtr, GetConsoleAliasesLengthA, WaitForMultipleObjectsEx, GetPrivateProfileIntA, FreeConsole, GetVersionExW, WritePrivateProfileStructW, MulDiv, GetModuleFileNameW, CreateActCtxA, WritePrivateProfileStringW, ReplaceFileA, GetStringTypeExA, GetStdHandle, GetLogicalDriveStringsA, OpenMutexW, GetLastError, ReadConsoleOutputCharacterA, GetProcAddress, SleepEx, VirtualAlloc, _hwrite, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, GetFileType, CreateFileMappingW, FindFirstVolumeMountPointW, GetNumberFormatW, CreateEventW, GetModuleFileNameA, lstrcmpiW, GetModuleHandleA, CreateMutexA, GetFileAttributesExW, GetConsoleCursorInfo, ScrollConsoleScreenBufferA, GetCurrentThreadId, FindAtomW, EnumResourceLanguagesW, DebugBreak, FindNextVolumeA, AddConsoleAliasW, CancelWaitableTimer, GetCommState, WaitForSingleObject, AttachConsole, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapFree, WideCharToMultiByte, SetHandleCount, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, Sleep, ExitProcess, WriteFile, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, SetFilePointer, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, HeapSize, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, CreateFileA, CloseHandle
                USER32.dllCharLowerBuffA
                GDI32.dllEnumFontsW, GetCharABCWidthsFloatA, GetCharWidthW
                ADVAPI32.dllMapGenericMask
                TimestampSource PortDest PortSource IPDest IP
                May 28, 2023 14:27:41.523880005 CEST4969580192.168.2.4194.50.153.68
                May 28, 2023 14:27:41.549113035 CEST8049695194.50.153.68192.168.2.4
                May 28, 2023 14:27:41.549222946 CEST4969580192.168.2.4194.50.153.68
                May 28, 2023 14:27:41.549535036 CEST4969580192.168.2.4194.50.153.68
                May 28, 2023 14:27:41.549597979 CEST4969580192.168.2.4194.50.153.68
                May 28, 2023 14:27:41.574449062 CEST8049695194.50.153.68192.168.2.4
                May 28, 2023 14:27:41.672564983 CEST8049695194.50.153.68192.168.2.4
                May 28, 2023 14:27:41.672703028 CEST4969580192.168.2.4194.50.153.68
                May 28, 2023 14:27:41.673958063 CEST4969580192.168.2.4194.50.153.68
                May 28, 2023 14:27:41.698729992 CEST8049695194.50.153.68192.168.2.4
                TimestampSource PortDest PortSource IPDest IP
                May 28, 2023 14:27:41.495443106 CEST5223953192.168.2.48.8.8.8
                May 28, 2023 14:27:41.516335011 CEST53522398.8.8.8192.168.2.4
                May 28, 2023 14:27:41.683769941 CEST5680753192.168.2.48.8.8.8
                May 28, 2023 14:27:42.720056057 CEST5680753192.168.2.48.8.8.8
                May 28, 2023 14:27:43.720438957 CEST5680753192.168.2.48.8.8.8
                May 28, 2023 14:27:45.723534107 CEST53568078.8.8.8192.168.2.4
                May 28, 2023 14:27:46.765328884 CEST53568078.8.8.8192.168.2.4
                May 28, 2023 14:27:47.753593922 CEST53568078.8.8.8192.168.2.4
                TimestampSource IPDest IPChecksumCodeType
                May 28, 2023 14:27:46.765438080 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
                May 28, 2023 14:27:47.753828049 CEST192.168.2.48.8.8.8cff7(Port unreachable)Destination Unreachable
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                May 28, 2023 14:27:41.495443106 CEST192.168.2.48.8.8.80x71e2Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                May 28, 2023 14:27:41.683769941 CEST192.168.2.48.8.8.80x2ad8Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                May 28, 2023 14:27:42.720056057 CEST192.168.2.48.8.8.80x2ad8Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                May 28, 2023 14:27:43.720438957 CEST192.168.2.48.8.8.80x2ad8Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                May 28, 2023 14:27:41.516335011 CEST8.8.8.8192.168.2.40x71e2No error (0)host-file-host6.com194.50.153.68A (IP address)IN (0x0001)false
                May 28, 2023 14:27:45.723534107 CEST8.8.8.8192.168.2.40x2ad8Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                May 28, 2023 14:27:46.765328884 CEST8.8.8.8192.168.2.40x2ad8Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                May 28, 2023 14:27:47.753593922 CEST8.8.8.8192.168.2.40x2ad8Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                • tclyyrvk.com
                  • host-file-host6.com

                Click to jump to process

                Target ID:0
                Start time:14:26:59
                Start date:28/05/2023
                Path:C:\Users\user\Desktop\86NKwZGvwn.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\86NKwZGvwn.exe
                Imagebase:0x400000
                File size:289792 bytes
                MD5 hash:40DCB3614C663E7EF659044A6514D446
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.528146469.0000000000808000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:1
                Start time:14:26:59
                Start date:28/05/2023
                Path:C:\Users\user\Desktop\86NKwZGvwn.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\86NKwZGvwn.exe
                Imagebase:0x400000
                File size:289792 bytes
                MD5 hash:40DCB3614C663E7EF659044A6514D446
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.570702599.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.570658568.0000000000530000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:2
                Start time:14:27:04
                Start date:28/05/2023
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Explorer.EXE
                Imagebase:0x7ff618f60000
                File size:3933184 bytes
                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:14:27:41
                Start date:28/05/2023
                Path:C:\Users\user\AppData\Roaming\evcgwtu
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\evcgwtu
                Imagebase:0x400000
                File size:289792 bytes
                MD5 hash:40DCB3614C663E7EF659044A6514D446
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.618725202.00000000008D8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 38%, ReversingLabs
                Reputation:low

                Target ID:6
                Start time:14:27:41
                Start date:28/05/2023
                Path:C:\Users\user\AppData\Roaming\evcgwtu
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\evcgwtu
                Imagebase:0x400000
                File size:289792 bytes
                MD5 hash:40DCB3614C663E7EF659044A6514D446
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.629532527.0000000001F30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.629561581.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                Reputation:low

                No disassembly