Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:882700
MD5:daf761fb9aaa34a9c2120003694d88a3
SHA1:47fd2695b6da26f6444799d442662b982d70f783
SHA256:18d4850a10812f3b4d8631939d469b41c1d344a7fa9205acc31b265d0600291b
Tags:NETexeLgoogLoaderMSILx64
Infos:

Detection

lgoogLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Yara detected lgoogLoader
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Writes to foreign memory regions
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sample is not signed and drops a device driver
Machine Learning detection for sample
Injects a PE file into a foreign processes
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to launch a process as a different user
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Contains functionality to load drivers
PE file does not import any functions
Sample file is different than original file name gathered from version info
Enables driver privileges
Drops PE files
Creates driver files
Contains functionality to launch a program with higher privileges
Spawns drivers
Found evaded block containing many API calls
Creates or modifies windows services
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 6988 cmdline: C:\Users\user\Desktop\file.exe MD5: DAF761FB9AAA34A9C2120003694D88A3)
    • ComSvcConfig.exe (PID: 4572 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe MD5: 2778AE0EB674B74FF8028BF4E51F1DF5)
    • jsc.exe (PID: 3068 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe MD5: 2B40A449D6034F41771A460DADD53A60)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
LgoogLoaderLgoogLoader is an installer that drops three files: a batch file, an AutoIt interpreter, and an AutoIt script. After downloading, it executes the batch file.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lgoogloader
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\?????.sysPUA_VULN_Driver_Sysinternalswwwsysinternalscom_procexpsys_ProcessExplorer_HoEPDetects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - 97e3a44ec4ae58c8cc38eefc613e950e.binFlorian Roth
  • 0x6765:$: 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 50 00 72 00 6F 00 63 00 65 00 73 00 73 00 20 00 45 00 78 00 70 00 6C 00 6F 00 72 00 65 ...
  • 0x66fd:$: 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 53 00 79 00 73 00 69 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 73 00 20 00 2D 00 20 00 77 00 77 00 77 00 2E ...
  • 0x67b1:$: 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 31 00 36 00 2E 00 34 00 33
  • 0x6911:$: 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 31 00 36 00 2E 00 34 00 33
  • 0x67dd:$: 00 49 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 70 00 72 00 6F 00 63 00 65 00 78 00 70 00 2E 00 73 00 79 00 73
  • 0x68cd:$: 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 50 00 72 00 6F 00 63 00 65 00 73 00 73 00 20 00 45 00 78 00 70 00 6C 00 6F 00 72 00 65 00 72
  • 0x688d:$: 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 70 00 72 00 6F 00 63 00 65 00 78 00 70 00 2E 00 53 00 79 00 73
  • 0x6815:$: 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 4D 00 61 00 72 ...
SourceRuleDescriptionAuthorStrings
00000002.00000002.492960569.0000000000E30000.00000040.00001000.00020000.00000000.sdmpSUSP_XORed_MSDOS_Stub_MessageDetects suspicious XORed MSDOS stub messageFlorian Roth (Nextron Systems)
  • 0xade:$xo1: \x9E\xA2\xA3\xB9\xEA\xBA\xB8\xA5\xAD\xB8\xAB\xA7\xEA\xA9\xAB\xA4\xA4\xA5\xBE\xEA\xA8\xAF\xEA\xB8\xBF\xA4\xEA\xA3\xA4\xEA\x8E\x85\x99\xEA\xA7\xA5\xAE\xAF
  • 0x6546:$xo1: \x9E\xA2\xA3\xB9\xEA\xBA\xB8\xA5\xAD\xB8\xAB\xA7\xEA\xA9\xAB\xA4\xA4\xA5\xBE\xEA\xA8\xAF\xEA\xB8\xBF\xA4\xEA\xA3\xA4\xEA\x8E\x85\x99\xEA\xA7\xA5\xAE\xAF
00000002.00000002.492960569.0000000000E30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_lGoogLoaderYara detected lgoogLoaderJoe Security
    00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      Process Memory Space: file.exe PID: 6988JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Process Memory Space: file.exe PID: 6988JoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.1f6c773a2a8.2.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            0.2.file.exe.1f6c773a2a8.2.raw.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
            • 0x9d0d:$e1: Microsoft\Windows Defender\Exclusions\Paths
            • 0x9d3c:$e2: Add-MpPreference -ExclusionPath
            0.2.file.exe.1f6c773a2a8.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOMDetects executables embedding command execution via IExecuteCommand COM objectditekSHen
            • 0x9cdd:$r1: Classes\Folder\shell\open\command
            • 0x912c:$k1: DelegateExecute
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: file.exeReversingLabs: Detection: 45%
            Source: file.exeVirustotal: Detection: 56%Perma Link
            Source: http://5.42.94.169/customer/368Avira URL Cloud: Label: malware
            Source: http://109.206.241.33/files/Hadi.config.CfgEncFileMZAvira URL Cloud: Label: malware
            Source: http://5.42.94.169Virustotal: Detection: 7%Perma Link
            Source: http://5.42.94.169/customer/368Virustotal: Detection: 8%Perma Link
            Source: file.exeJoe Sandbox ML: detected

            Exploits

            barindex
            Source: Yara matchFile source: 0.2.file.exe.1f6c773a2a8.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 6988, type: MEMORYSTR
            Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Purala\source\repos\Particle-Filter\obj\x86\Debug\FastSLAM.pdb source: file.exe
            Source: Binary string: c:\src\ShellRunas\Release\ShellRunas.pdb source: file.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, jsc.exe, 00000002.00000002.492840110.0000000000400000.00000040.00000400.00020000.00000000.sdmp
            Source: Binary string: <c:\src\ShellRunas\Release\ShellRunas.pdb source: file.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.492840110.0000000000400000.00000040.00000400.00020000.00000000.sdmp
            Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.dr
            Source: global trafficHTTP traffic detected: GET /customer/368 HTTP/1.1Host: 5.42.94.169Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 5.42.94.169 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
            Source: jsc.exe, 00000002.00000002.492997621.0000000000E50000.00000040.00001000.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.493023944.0000000000E66000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://109.206.241.33/files/Hadi.config.CfgEncFileMZ
            Source: file.exe, 00000000.00000002.493841709.000001F6C7685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.94.169
            Source: file.exe, 00000000.00000002.493841709.000001F6C7685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.94.169/customer/368
            Source: file.exe, 00000000.00000002.493841709.000001F6C7685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: jsc.exeString found in binary or memory: http://www.sysinternals.com
            Source: file.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.492840110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.sysinternals.comopen/?ICONSHELLRUNASAboutUsage/raw/netonlyRunAsInvoker__COMPAT_LAYERcmd
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.drString found in binary or memory: https://www.sysinternals.com0
            Source: global trafficHTTP traffic detected: GET /customer/368 HTTP/1.1Host: 5.42.94.169Connection: Keep-Alive

            System Summary

            barindex
            Source: 0.2.file.exe.1f6c773a2a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
            Source: 0.2.file.exe.1f6c773a2a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
            Source: 0.2.file.exe.1f6c773a2a8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
            Source: 0.2.file.exe.1f6c773a2a8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
            Source: 00000002.00000002.492960569.0000000000E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_MSDOS_Stub_Message date = 2019-10-28, author = Florian Roth (Nextron Systems), description = Detects suspicious XORed MSDOS stub message, score = , reference = https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
            Source: C:\Users\user\AppData\Local\Temp\?????.sys, type: DROPPEDMatched rule: PUA_VULN_Driver_Sysinternalswwwsysinternalscom_procexpsys_ProcessExplorer_HoEP date = 2023-05-19, author = Florian Roth, description = Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - 97e3a44ec4ae58c8cc38eefc613e950e.bin, score = , reference = https://github.com/magicsword-io/LOLDrivers, hash = 440883cd9d6a76db5e53517d0ec7fe13d5a50d2f6a7f91ecfc863bc3490e4f5c
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CFAA577
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CF90E58
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CFA1208
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CF96A17
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CFA3AF5
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00404AF0
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_004084B7
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00402050 _memset,_memset,_memset,_memset,_memset,__wcsicmp,__wcsicmp,__wcsicmp,SetEnvironmentVariableW,_memset,_wcscpy_s,_wcscat_s,CreateProcessW,GetLastError,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,_wcscpy_s,_memset,_memset,_memset,CreateProcessWithLogonW,GetLastError,EnumWindows,Sleep,Sleep,EnumWindows,CloseHandle,CloseHandle,CloseHandle,LoadIconW,LoadIconW,LoadIconW,LoadCursorW,RegisterClassExW,CreateDialogParamW,GetMessageW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetMessageW,LocalFree,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CFA5870 NtLoadDriver,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CFA5870 NtLoadDriver,
            Source: file.exeStatic PE information: No import functions for PE file found
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprocexp.SysB vs file.exe
            Source: file.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShellRunasP vs file.exe
            Source: file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShellRunasP vs file.exe
            Source: file.exe, 00000000.00000002.495389743.000001F6D7771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRunpeX.Stub.Framework.exeL vs file.exe
            Source: file.exe, 00000000.00000002.493612039.000001F6C5C50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRunpeX.Stub.Framework.exeL vs file.exe
            Source: file.exe, 00000000.00000002.493115383.000001F6C58BA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameeroxipe4 vs file.exe
            Source: file.exe, 00000000.00000002.493218018.000001F6C5AF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
            Source: file.exeBinary or memory string: OriginalFilenameeroxipe4 vs file.exe
            Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Load Driver
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to behavior
            Source: C:\Users\user\Desktop\file.exeDriver loaded: \Registry\Machine\System\CurrentControlSet\Services\TaskKill
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\?????.sys 440883CD9D6A76DB5E53517D0EC7FE13D5A50D2F6A7F91ECFC863BC3490E4F5C
            Source: file.exeReversingLabs: Detection: 45%
            Source: file.exeVirustotal: Detection: 56%
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CFA58C4 AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.logJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to behavior
            Source: ?????.sys.0.drBinary string: \DosDevices\PROCEXP152\ObjectTypes\\Device\PROCEXP152PsAcquireProcessExitSynchronizationPsReleaseProcessExitSynchronizationMmGetMaximumNonPagedPoolInBytesObGetObjectTypeMutantIoCreateDeviceSecureIoValidateDeviceIoControlAccessD:P
            Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@5/2@0/1
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_004029C0 _memset,_memset,SHGetMalloc,SHGetDesktopFolder,SearchPathW,GetLastError,CoInitialize,CoCreateInstance,#217,#173,CoUninitialize,
            Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: file.exe, ????????/?????????.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Purala\source\repos\Particle-Filter\obj\x86\Debug\FastSLAM.pdb source: file.exe
            Source: Binary string: c:\src\ShellRunas\Release\ShellRunas.pdb source: file.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, jsc.exe, 00000002.00000002.492840110.0000000000400000.00000040.00000400.00020000.00000000.sdmp
            Source: Binary string: <c:\src\ShellRunas\Release\ShellRunas.pdb source: file.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.492840110.0000000000400000.00000040.00000400.00020000.00000000.sdmp
            Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.dr

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000002.00000002.492960569.0000000000E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000001F6C58B8762 push rsp; retn 0009h
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFC9CF967E9 push ebx; retf
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00404ACD push ecx; ret
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00402CB0 _memset,_memset,_wcscpy_s,_wcscat_s,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,GetLastError,LoadLibraryW,GetProcAddress,_wcschr,_wcscpy_s,GetComputerNameW,CredUIParseUserNameW,CoTaskMemFree,

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to dropped file
            Source: C:\Users\user\Desktop\file.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TaskKillJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 6988, type: MEMORYSTR
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\file.exe TID: 7068Thread sleep time: -6456360425798339s >= -30000s
            Source: C:\Users\user\Desktop\file.exe TID: 4672Thread sleep count: 9612 > 30
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
            Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\?????.sysJump to dropped file
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 9612
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeEvaded block: after key decision
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeAPI coverage: 4.4 %
            Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeAPI call chain: ExitProcess graph end node
            Source: jsc.exe, 00000002.00000002.492997621.0000000000E50000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMware
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: jsc.exe, 00000002.00000002.492997621.0000000000E50000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Chrome/HEADIsWow64Processkernel32X:\Windows\SysWOW64\ntdll.dllntdll.dllRtlInitUnicodeStringZwOpenFileZwCreateSectionZwMapViewOfSectionNtUnmapViewOfSectionNtQueryInformationProcess{%08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X}RtlRandomExntdll:y--\Driver\Device ParametersEDID(IsActive)(NotActive)BAD EDID!No EDID!--Nm:SYSTEM\ControlSet001\Enum\DISPLAY\\.\PhysicalDrive%d---VMwareVirtualBoxVBoxQEMUDisplay AdapterNon-PnPVMwareVirtualBoxVBoxQEMUWestern Disk HARDDISK(1):(2):text/*Mozilla / 5.0 (SymbianOS / 9.1; U; [en]; SymbianOS / 91 Series60 / 3.0) AppleWebkit / 413 (KHTML, like Gecko) Safari / 413
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: file.exe, 00000000.00000002.493218018.000001F6C5BD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllQQ
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00405700 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00402CB0 _memset,_memset,_wcscpy_s,_wcscat_s,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,GetLastError,LoadLibraryW,GetProcAddress,_wcschr,_wcscpy_s,GetComputerNameW,CredUIParseUserNameW,CoTaskMemFree,
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_004039C0 GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,
            Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guard
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00407219 SetUnhandledExceptionFilter,
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00405700 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_0040C52A _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 400000
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 401000
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 40D000
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 413000
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 416000
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 418000
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: B12008
            Source: file.exe, ????????/???????????.csReference to suspicious API methods: ('???????????', 'GetProcAddress@kernel32.dll'), ('????????', 'LoadLibrary@kernel32.dll'), ('?????????', 'VirtualProtect@kernel32.dll'), ('????????????', 'VirtualAlloc@kernel32.dll')
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 400000 value starts with: 4D5A
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00402050 _memset,_memset,_memset,_memset,_memset,__wcsicmp,__wcsicmp,__wcsicmp,SetEnvironmentVariableW,_memset,_wcscpy_s,_wcscat_s,CreateProcessW,GetLastError,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,__wcsicmp,_wcscpy_s,_memset,_memset,_memset,CreateProcessWithLogonW,GetLastError,EnumWindows,Sleep,Sleep,EnumWindows,CloseHandle,CloseHandle,CloseHandle,LoadIconW,LoadIconW,LoadIconW,LoadCursorW,RegisterClassExW,CreateDialogParamW,GetMessageW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetMessageW,LocalFree,
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformation
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_0040C66D cpuid
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_00407ACC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 2_2_004039C0 GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Valid Accounts
            13
            Native API
            1
            Valid Accounts
            1
            Valid Accounts
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/Job2
            Windows Service
            1
            Exploitation for Privilege Escalation
            1
            Valid Accounts
            LSASS Memory121
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)2
            LSASS Driver
            11
            Access Token Manipulation
            1
            Disable or Modify Tools
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)2
            Windows Service
            21
            Virtualization/Sandbox Evasion
            NTDS21
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon Script211
            Process Injection
            11
            Access Token Manipulation
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.common2
            LSASS Driver
            211
            Process Injection
            Cached Domain Credentials34
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Deobfuscate/Decode Files or Information
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Obfuscated Files or Information
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe46%ReversingLabsWin64.Trojan.Pwsx
            file.exe56%VirustotalBrowse
            file.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\?????.sys0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.sysinternals.comopen/?ICONSHELLRUNASAboutUsage/raw/netonlyRunAsInvoker__COMPAT_LAYERcmd0%URL Reputationsafe
            https://www.sysinternals.com00%URL Reputationsafe
            http://5.42.94.1690%Avira URL Cloudsafe
            http://5.42.94.169/customer/368100%Avira URL Cloudmalware
            http://5.42.94.1698%VirustotalBrowse
            http://5.42.94.169/customer/3689%VirustotalBrowse
            http://109.206.241.33/files/Hadi.config.CfgEncFileMZ0%VirustotalBrowse
            http://109.206.241.33/files/Hadi.config.CfgEncFileMZ100%Avira URL Cloudmalware
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://5.42.94.169/customer/368true
            • 9%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.sysinternals.comjsc.exefalse
              high
              http://www.sysinternals.comopen/?ICONSHELLRUNASAboutUsage/raw/netonlyRunAsInvoker__COMPAT_LAYERcmdfile.exe, 00000000.00000002.495389743.000001F6D7691000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.493841709.000001F6C77A3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.492840110.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://109.206.241.33/files/Hadi.config.CfgEncFileMZjsc.exe, 00000002.00000002.492997621.0000000000E50000.00000040.00001000.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.493023944.0000000000E66000.00000040.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              http://5.42.94.169file.exe, 00000000.00000002.493841709.000001F6C7685000.00000004.00000800.00020000.00000000.sdmpfalse
              • 8%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.493841709.000001F6C7685000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://www.sysinternals.com0file.exe, 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.drfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                5.42.94.169
                unknownRussian Federation
                39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                Joe Sandbox Version:37.1.0 Beryl
                Analysis ID:882700
                Start date and time:2023-06-06 17:13:55 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 0s
                Hypervisor based Inspection enabled:false
                Report type:light
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:3
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:file.exe
                Detection:MAL
                Classification:mal100.troj.expl.evad.winEXE@5/2@0/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 28.5% (good quality ratio 26.2%)
                • Quality average: 72.8%
                • Quality standard deviation: 31.3%
                HCA Information:
                • Successful, ratio: 76%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Stop behavior analysis, all processes terminated
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • TCP Packets have been reduced to 100
                TimeTypeDescription
                17:14:52API Interceptor62x Sleep call for process: file.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\file.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1595
                Entropy (8bit):5.378294470225564
                Encrypted:false
                SSDEEP:48:MxHKn1qHGiD0HKeGiYHKGD8AoiHd+vxpNStHTG1hAHKKPz:iqnwmI0qerYqGgAoi0ZPStzG1eqKPz
                MD5:3D4F5C31B249A99B5AC79BB49D9894F3
                SHA1:C7F66B88EB5A896E235CB6C37CC752C225119173
                SHA-256:472C344E0D0AB687ED38440FCE12C0E010957CF27C4514710C0683F15DC0DEC5
                SHA-512:CF6805ACC8DAEBFB21DC467BF533D6D68BC9EF5BED519D1DF0833BFB5E982E54828702A672EBD971EFE4FC7B828818B8DB57FAC70B673AA5A884B5AB9130CA1E
                Malicious:true
                Reputation:low
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..2,"System.Web, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neut
                Process:C:\Users\user\Desktop\file.exe
                File Type:PE32+ executable (DLL) (native) x86-64, for MS Windows
                Category:dropped
                Size (bytes):36208
                Entropy (8bit):6.284053631838433
                Encrypted:false
                SSDEEP:768:tKCM0IWRhm8LiES4cT4iZ923OMqUD6Q4KICJw4:t7/Vhzb3pL4GJw4
                MD5:97E3A44EC4AE58C8CC38EEFC613E950E
                SHA1:BC47E15537FA7C32DFEFD23168D7E1741F8477ED
                SHA-256:440883CD9D6A76DB5E53517D0EC7FE13D5A50D2F6A7F91ECFC863BC3490E4F5C
                SHA-512:8EF7FC489B6FFED9EC14746E526AE87F44C39D5EAFFF0D4C3BFA0B3F0D28450F76D1066F446C766F4C9A20842A7F084FE4A9F94659D5487EA88959FCCB2A96EB
                Malicious:true
                Yara Hits:
                • Rule: PUA_VULN_Driver_Sysinternalswwwsysinternalscom_procexpsys_ProcessExplorer_HoEP, Description: Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - 97e3a44ec4ae58c8cc38eefc613e950e.bin, Source: C:\Users\user\AppData\Local\Temp\?????.sys, Author: Florian Roth
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3...w.{.w.{.w.{.~...p.{.w.z.H.{.~...t.{.~...t.{.~...t.{."...v.{."..v.{.".y.v.{.Richw.{.........PE..d...l..a.........." .....L..........X.......................................................................................................x...(............`.......l..p!......0....I..T............................................@...............................text....%.......&.................. ..h.rdata.......@.......*..............@..H.data...,....P.......:..............@....pdata.......`.......<..............@..HPAGE.........p.......@.............. ..`INIT.................\.............. ..b.rsrc................f..............@..B.reloc..0............j..............@..B................................................................................................................................................................................................
                File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                Entropy (8bit):5.697202938635302
                TrID:
                • Win64 Executable GUI (202006/5) 92.65%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:file.exe
                File size:30720
                MD5:daf761fb9aaa34a9c2120003694d88a3
                SHA1:47fd2695b6da26f6444799d442662b982d70f783
                SHA256:18d4850a10812f3b4d8631939d469b41c1d344a7fa9205acc31b265d0600291b
                SHA512:1ddf3c0b4dcbb4103d24b6a5bb3308dff706c9d9277d411be3f9356e9040e67b04c0c02c9c927ba60c5723a50d746287de34cff5545003a0aed3596ec13fd7b2
                SSDEEP:768:uwVMApolbUGPPMdwdunhdH15FIU/ogyejq:bVLoljn8nhj5FF1jq
                TLSH:68D20800A3F98767EAFB4BF64871124447BA7ABB7936E75D0DC460DB1A637404A01BA3
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Lx}d.........."...0.Uk............... ....@...... ....................................`................................
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x400000
                Entrypoint Section:
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x647D784C [Mon Jun 5 05:53:16 2023 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:
                Instruction
                dec ebp
                pop edx
                nop
                add byte ptr [ebx], al
                add byte ptr [eax], al
                add byte ptr [eax+eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x8f4.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x8ad80x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x6b550x6c00False0.5057146990740741data5.791232238044552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0xa0000x8f40xa00False0.2921875data4.376579543169947IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_VERSION0xa0b80x328data
                RT_VERSION0xa3e00x328dataEnglishUnited States
                RT_MANIFEST0xa7080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Jun 6, 2023 17:14:51.786187887 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.835110903 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.835464001 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.860167980 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.911331892 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911371946 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911385059 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911403894 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911417961 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911432028 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911446095 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911465883 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911478996 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911498070 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.911545992 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.911638021 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.960335970 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960397005 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960416079 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960436106 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960455894 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960474014 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960494041 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960513115 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960531950 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960550070 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960567951 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960586071 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960602999 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960619926 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960633993 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.960639000 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960656881 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960675001 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960676908 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.960692883 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960701942 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.960711002 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960728884 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:51.960736990 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:51.960772038 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009464979 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009502888 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009522915 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009541035 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009560108 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009574890 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009582043 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009602070 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009619951 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009625912 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009648085 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009649992 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009670973 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009673119 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009691954 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009711027 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009721994 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009732962 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009752989 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009766102 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009774923 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009789944 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009798050 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009819984 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009838104 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009859085 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009860039 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009879112 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009897947 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009902954 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009924889 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009946108 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009948969 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009964943 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.009972095 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.009987116 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010001898 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010008097 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010026932 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010050058 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010062933 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010071039 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010092974 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010097980 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010113955 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010133028 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010142088 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010154963 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010174990 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010181904 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010196924 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010215998 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010221958 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010241985 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010260105 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010277033 CEST4970880192.168.2.65.42.94.169
                Jun 6, 2023 17:14:52.010282993 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010303020 CEST80497085.42.94.169192.168.2.6
                Jun 6, 2023 17:14:52.010312080 CEST4970880192.168.2.65.42.94.169
                • 5.42.94.169

                Click to jump to process

                Target ID:0
                Start time:17:14:48
                Start date:06/06/2023
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\Desktop\file.exe
                Imagebase:0x1f6c58b0000
                File size:30720 bytes
                MD5 hash:DAF761FB9AAA34A9C2120003694D88A3
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.493841709.000001F6C76CC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:1
                Start time:17:14:59
                Start date:06/06/2023
                Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                Imagebase:0x13570130000
                File size:173672 bytes
                MD5 hash:2778AE0EB674B74FF8028BF4E51F1DF5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                Target ID:2
                Start time:17:14:59
                Start date:06/06/2023
                Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                Imagebase:0x8b0000
                File size:46688 bytes
                MD5 hash:2B40A449D6034F41771A460DADD53A60
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: SUSP_XORed_MSDOS_Stub_Message, Description: Detects suspicious XORed MSDOS stub message, Source: 00000002.00000002.492960569.0000000000E30000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                • Rule: JoeSecurity_lGoogLoader, Description: Yara detected lgoogLoader, Source: 00000002.00000002.492960569.0000000000E30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:moderate

                No disassembly