Windows Analysis Report
HobLb4ufqE.exe

Overview

General Information

Sample name: HobLb4ufqE.exe
renamed because original name is a hash value
Original sample name: 0222f8da926bf2722f6bef4ac243e5fa.exe
Analysis ID: 1436258
MD5: 0222f8da926bf2722f6bef4ac243e5fa
SHA1: 152144479eb94028ec92e356f99b562fa414e980
SHA256: 98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f
Tags: 32exeRedLineStealertrojan
Infos:

Detection

RedLine
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Installs new ROOT certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer

AV Detection

barindex
Source: HobLb4ufqE.exe Malware Configuration Extractor: RedLine {"C2 url": ["80.79.4.61:27996"], "Bot Id": "uk-ca", "Authorization Header": "27dc49c1e1facde9ccd1ca2ec0c885fd"}
Source: 80.79.4.61:27996 Virustotal: Detection: 9% Perma Link
Source: HobLb4ufqE.exe ReversingLabs: Detection: 60%
Source: HobLb4ufqE.exe Virustotal: Detection: 61% Perma Link
Source: HobLb4ufqE.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: HobLb4ufqE.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000C69000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006543000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.ServiceModel.pdbL source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006543000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ServiceModel.pdb source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006532000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000BF6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb<d source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000BF6000.00000004.00000020.00020000.00000000.sdmp

Networking

barindex
Source: Malware configuration extractor URLs: 80.79.4.61:27996
Source: global traffic TCP traffic: 192.168.2.6:49699 -> 80.79.4.61:27996
Source: Joe Sandbox View IP Address: 80.79.4.61 80.79.4.61
Source: Joe Sandbox View ASN Name: SISTEMEMD SISTEMEMD
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: unknown TCP traffic detected without corresponding DNS query: 80.79.4.61
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9g
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id3LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id3Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8Responsex
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9LR
Source: HobLb4ufqE.exe, 00000000.00000002.3284635466.0000000002A51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9Responsex
Source: HobLb4ufqE.exe String found in binary or memory: https://api.ip.sb/ip
Source: C:\Users\user\Desktop\HobLb4ufqE.exe File created: C:\Users\user\AppData\Local\Temp\Tmp8A0F.tmp Jump to dropped file
Source: C:\Users\user\Desktop\HobLb4ufqE.exe File created: C:\Users\user\AppData\Local\Temp\Tmp8A0E.tmp Jump to dropped file
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_00E2DC74 0_2_00E2DC74
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_061567D8 0_2_061567D8
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_0615A3E8 0_2_0615A3E8
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_06153F50 0_2_06153F50
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_0615A3D8 0_2_0615A3D8
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_06156FF8 0_2_06156FF8
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_06156FE8 0_2_06156FE8
Source: HobLb4ufqE.exe, 00000000.00000000.2043004498.0000000000556000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFleawort.exe8 vs HobLb4ufqE.exe
Source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000B8E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs HobLb4ufqE.exe
Source: HobLb4ufqE.exe Binary or memory string: OriginalFilenameFleawort.exe8 vs HobLb4ufqE.exe
Source: HobLb4ufqE.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal80.troj.winEXE@1/4@0/1
Source: C:\Users\user\Desktop\HobLb4ufqE.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06 Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Mutant created: NULL
Source: C:\Users\user\Desktop\HobLb4ufqE.exe File created: C:\Users\user\AppData\Local\Temp\Tmp8A0E.tmp Jump to behavior
Source: HobLb4ufqE.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: HobLb4ufqE.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\HobLb4ufqE.exe File read: C:\Program Files (x86)\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: HobLb4ufqE.exe ReversingLabs: Detection: 60%
Source: HobLb4ufqE.exe Virustotal: Detection: 61%
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: msvcp140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: esdsip.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: linkinfo.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32 Jump to behavior
Source: Google Chrome.lnk.0.dr LNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
Source: C:\Users\user\Desktop\HobLb4ufqE.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: HobLb4ufqE.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: HobLb4ufqE.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: HobLb4ufqE.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000C69000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006543000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.ServiceModel.pdbL source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006543000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ServiceModel.pdb source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006532000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000BF6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb<d source: HobLb4ufqE.exe, 00000000.00000002.3284074544.0000000000BF6000.00000004.00000020.00020000.00000000.sdmp
Source: HobLb4ufqE.exe Static PE information: 0xE4C1C9DC [Tue Aug 14 04:49:32 2091 UTC]
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_0615E060 push es; ret 0_2_0615E070
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Code function: 0_2_0615ECF2 push eax; ret 0_2_0615ED01

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Memory allocated: DE0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Memory allocated: 2A50000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Memory allocated: 2860000 memory reserve | memory write watch Jump to behavior
Source: HobLb4ufqE.exe, 00000000.00000002.3285282153.0000000006543000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Users\user\Desktop\HobLb4ufqE.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\HobLb4ufqE.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: HobLb4ufqE.exe, type: SAMPLE
Source: Yara match File source: 0.0.HobLb4ufqE.exe.510000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2042978053.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: HobLb4ufqE.exe PID: 4160, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: HobLb4ufqE.exe, type: SAMPLE
Source: Yara match File source: 0.0.HobLb4ufqE.exe.510000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2042978053.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: HobLb4ufqE.exe PID: 4160, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs