Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zn7j8Etem5.exe

Overview

General Information

Sample name:zn7j8Etem5.exe
renamed because original name is a hash value
Original sample name:f72f063babd357ccdc6c346191a305b9.exe
Analysis ID:1402164
MD5:f72f063babd357ccdc6c346191a305b9
SHA1:a7794664194a9087cbf9114d0c33bb88e9ceacc9
SHA256:c90d23214088641431d2a93b6e3dfa26e6f5149bc8028449b7ce2f8edb2a6dd3
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
IP address seen in connection with other malware
May check the online IP address of the machine
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Yara detected Credential Stealer

Classification

  • System is w10x64
  • zn7j8Etem5.exe (PID: 6856 cmdline: C:\Users\user\Desktop\zn7j8Etem5.exe MD5: F72F063BABD357CCDC6C346191A305B9)
    • conhost.exe (PID: 6884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 6012 cmdline: wmic cpu get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • WMIC.exe (PID: 7136 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1687761523.000000C000092000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: zn7j8Etem5.exe PID: 6856JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: zn7j8Etem5.exeVirustotal: Detection: 26%Perma Link
      Source: zn7j8Etem5.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
      Source: unknownDNS query: name: ipinfo.io
      Source: unknownDNS query: name: ipinfo.io
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
      Source: unknownDNS traffic detected: queries for: ipinfo.io
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00010C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.iohttp/1.1Y
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00010C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.iohttp/1.1Yipinfo.io:80HTTP_PROYHTTP_PROXYHTTP_PROXYhttp_proxyHTTPS_PRNO_PROXYHTTPS_PR
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C000110000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C0001CC000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/missingauth
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/missingauthreflect.Value.SetMapIndex
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp, system.txt.0.drString found in binary or memory: https://t.me/Planet_Stealer
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
      Source: classification engineClassification label: mal52.spyw.winEXE@6/10@1/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6884:120:WilError_03
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile created: C:\Users\user\AppData\Local\Temp\system.txtJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Windows\system32\4ae220c5fa8c765e3a9949e9de9ee9081cfb9cd05aba4f7df953ec55563d3ae1AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C0000FA000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1691044965.000001CCB9EF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT a11,a102 FROM nssPrivate;
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C0000FA000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000236000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000;
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C0002E7000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000003.1684758439.000001CCFFB25000.00000004.00000020.00020000.00000000.sdmp, rbmdPfoF.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
      Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000236000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000;PRAGMA locking_mode = %s;PRAGMA locking_mode = NORMAL;PRAGMA synchronous = NORMAL;C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphC:\Users\user\AppData\Local\Temp\Cookies\chrome-default.txtC:\Users\user\AppData\Local\Temp\Cookies\chrome-default.txtC:\Users\user\AppData\Local\Temp\Cookies\chrome-default.txtsupport.microsoft.comTRUE/FALSE13340887735359381.AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuUN
      Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cardsC:\Users\user\AppData\Local\Amigo\User DataC:\Users\user\AppData\Local\Torch\User DataC:\Users\user\AppData\Local\Vivaldi\User DataC:\Users\user\AppData\Local\Orbitum\User DataC:\Users\user\AppData\Local\Kometa\User DataC:\Users\user\AppData\Local\Iridium\User DataPRAGMA synchronous = NORMAL;;pData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release
      Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
      Source: zn7j8Etem5.exeVirustotal: Detection: 26%
      Source: unknownProcess created: C:\Users\user\Desktop\zn7j8Etem5.exe C:\Users\user\Desktop\zn7j8Etem5.exe
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get nameJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get nameJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: zn7j8Etem5.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: zn7j8Etem5.exeStatic file information: File size 5014528 > 1048576
      Source: zn7j8Etem5.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x4c7c00
      Source: zn7j8Etem5.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: zn7j8Etem5.exe, 00000000.00000002.1691115454.000001CCB9F38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll::y
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get nameJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get nameJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rbmdPfoF.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TTCvZxwQ.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\CfBCRUfD.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\zmDmyEGJ.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ioURllJb.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\y91ovJkV.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EbEPnh3e.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BookmarksJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
      Source: C:\Users\user\Desktop\zn7j8Etem5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
      Source: Yara matchFile source: 00000000.00000002.1687761523.000000C000092000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: zn7j8Etem5.exe PID: 6856, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
      Windows Management Instrumentation
      1
      DLL Side-Loading
      11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      1
      OS Credential Dumping
      11
      Security Software Discovery
      Remote Services1
      Data from Local System
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Obfuscated Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Software Packing
      NTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets13
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1402164 Sample: zn7j8Etem5.exe Startdate: 03/03/2024 Architecture: WINDOWS Score: 52 17 ipinfo.io 2->17 21 Multi AV Scanner detection for submitted file 2->21 7 zn7j8Etem5.exe 1 11 2->7         started        signatures3 process4 dnsIp5 19 ipinfo.io 34.117.186.192, 49730, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 7->19 23 Tries to harvest and steal browser information (history, passwords, etc) 7->23 11 WMIC.exe 1 7->11         started        13 WMIC.exe 1 7->13         started        15 conhost.exe 7->15         started        signatures6 process7

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      zn7j8Etem5.exe26%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://ipinfo.iohttp/1.1Y0%Avira URL Cloudsafe
      http://ipinfo.iohttp/1.1Yipinfo.io:80HTTP_PROYHTTP_PROXYHTTP_PROXYhttp_proxyHTTPS_PRNO_PROXYHTTPS_PR0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      ipinfo.io
      34.117.186.192
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ipinfo.io/false
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://ac.ecosia.org/autocomplete?q=zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
            high
            https://duckduckgo.com/chrome_newtabzn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
              high
              https://ipinfo.io/missingauthzn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C000110000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C0001CC000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                  high
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icozn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                    high
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchzn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                      high
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                        high
                        http://ipinfo.iohttp/1.1Yzn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00010C000.00000004.00001000.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                          high
                          https://t.me/Planet_Stealerzn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp, system.txt.0.drfalse
                            high
                            https://www.ecosia.org/newtab/zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                              high
                              http://ipinfo.iohttp/1.1Yipinfo.io:80HTTP_PROYHTTP_PROXYHTTP_PROXYhttp_proxyHTTPS_PRNO_PROXYHTTPS_PRzn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00010C000.00000004.00001000.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.drfalse
                                high
                                https://ipinfo.io/missingauthreflect.Value.SetMapIndexzn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  34.117.186.192
                                  ipinfo.ioUnited States
                                  139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1402164
                                  Start date and time:2024-03-03 15:57:06 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 2m 43s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:4
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:zn7j8Etem5.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:f72f063babd357ccdc6c346191a305b9.exe
                                  Detection:MAL
                                  Classification:mal52.spyw.winEXE@6/10@1/1
                                  EGA Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Stop behavior analysis, all processes terminated
                                  • Not all processes where analyzed, report is missing behavior information
                                  TimeTypeDescription
                                  15:57:56API Interceptor2x Sleep call for process: WMIC.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  34.117.186.192SecuriteInfo.com.Win32.TrojanX-gen.3480.22759.exeGet hashmaliciousUnknownBrowse
                                  • ipinfo.io/geo
                                  SecuriteInfo.com.Win32.TrojanX-gen.3480.22759.exeGet hashmaliciousUnknownBrowse
                                  • ipinfo.io/geo
                                  SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeGet hashmaliciousUnknownBrowse
                                  • ipinfo.io/
                                  SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeGet hashmaliciousUnknownBrowse
                                  • ipinfo.io/
                                  5qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                  • ipinfo.io/ip
                                  5qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                  • ipinfo.io/ip
                                  9ndYaphcNr.exeGet hashmaliciousXClient StealerBrowse
                                  • ipinfo.io/ip
                                  9ndYaphcNr.exeGet hashmaliciousXClient StealerBrowse
                                  • ipinfo.io/ip
                                  KyRojfL3Fw.exeGet hashmaliciousUnknownBrowse
                                  • ipinfo.io/ip
                                  KyRojfL3Fw.exeGet hashmaliciousUnknownBrowse
                                  • ipinfo.io/ip
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ipinfo.iorKYmlnOolQ.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                  • 34.117.186.192
                                  ry4836TEeV.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                  • 34.117.186.192
                                  ry4836TEeV.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                  • 34.117.186.192
                                  SecuriteInfo.com.Win32.TrojanX-gen.3480.22759.exeGet hashmaliciousUnknownBrowse
                                  • 34.117.186.192
                                  SecuriteInfo.com.Win32.TrojanX-gen.3480.22759.exeGet hashmaliciousUnknownBrowse
                                  • 34.117.186.192
                                  hB1H6NAR3D.exeGet hashmaliciousRisePro StealerBrowse
                                  • 34.117.186.192
                                  nrCacbQns5.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                  • 34.117.186.192
                                  ZQaTB8aHvD.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                  • 34.117.186.192
                                  Build.exeGet hashmaliciousUnknownBrowse
                                  • 34.117.186.192
                                  co3iTfZr1o.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                  • 34.117.186.192
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  GOOGLE-AS-APGoogleAsiaPacificPteLtdSGrKYmlnOolQ.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                  • 34.117.186.192
                                  ry4836TEeV.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                  • 34.117.186.192
                                  ry4836TEeV.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                  • 34.117.186.192
                                  SecuriteInfo.com.Win32.TrojanX-gen.3480.22759.exeGet hashmaliciousUnknownBrowse
                                  • 34.117.186.192
                                  SecuriteInfo.com.Win32.TrojanX-gen.3480.22759.exeGet hashmaliciousUnknownBrowse
                                  • 34.117.186.192
                                  hB1H6NAR3D.exeGet hashmaliciousRisePro StealerBrowse
                                  • 34.117.186.192
                                  nrCacbQns5.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                  • 34.117.186.192
                                  ZQaTB8aHvD.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                  • 34.117.186.192
                                  Build.exeGet hashmaliciousUnknownBrowse
                                  • 34.117.186.192
                                  co3iTfZr1o.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                  • 34.117.186.192
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):106496
                                  Entropy (8bit):1.1358696453229276
                                  Encrypted:false
                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:ASCII text, with very long lines (522)
                                  Category:dropped
                                  Size (bytes):3308
                                  Entropy (8bit):5.837392962472899
                                  Encrypted:false
                                  SSDEEP:96:jJfsoO2j8cRhAZFJaRJSztv3uGkyUBFn5s5HwPR2cvsdc:N5dRSRKeoP
                                  MD5:B19EC0DEAEE5949DE17ECF3443819B98
                                  SHA1:24EDD6FE835B6FF8C597A21A459E16016936C218
                                  SHA-256:0F11DDDE75E50C35CAE2D9BAB63282A352B878C134D5FB2BBDBE8A62570CB76E
                                  SHA-512:7EA513D2D9F96E63BB4D9DB0689FDD28BD47A98DD60E51B2A1C942FC71D195EF0C439FAE84838EF621CD0BE36D4C017369779DC3B329C73D38947E7F255D520D
                                  Malicious:false
                                  Reputation:low
                                  Preview:.google.com.TRUE./.FALSE.13356618603686193.NID.511=j8SQUTltnVU5cOAeyzqSxW-qHOakRuBHDQGLTGeceC9Z5rRzk5trMKb4CuZC_CFmc7KFwQcRJL-qGz8MvkkzMZmElvXAFWLO-TPZ9PMqBYA78ZAuaepnXIRHe-TAolVoW6Z7dQnqpgyX0m-TmS72bebAgoqZv5GkpRFUcZIw1Kk.support.microsoft.com.TRUE./.FALSE.13340887435186329..AspNetCore.AuthProvider.True.support.microsoft.com.TRUE./.FALSE.13340887735359381..AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuU.N.support.microsoft.com.TRUE./.FALSE.13340887735359334..AspNetCore.OpenIdConnect.Nonce.CfDJ8Kiuy_B5JgFMo7PeP95NLhqwcJ8koDy5pXkfoWsb5SbbU2hVCbsH2qt9GF_OVCqFkLEwhvzeADNQOF5RSmkDfh5RqfqlOkx5QWo4Lltvwb0CvwBFD8ujlm3BAglOeGca3ZatkLMUkHB6alahUr8qJ7G_3AejtooymTWCzyO89hshJeX8Gh78kohbIw0IQY4v6LZriT4P2fGeBSMjrvqODB4H_bs2nbfsSfL7aN-SiX4Yyn3iFo5fv-Rsj0cGE-FFrP1uXNT7Y1VSMOfm-L0RnS8.N.support.office.com.TRUE./.FALSE.13372509232238068.EXPID.8e067c40-5461-4aef-885f-2c92ce6a5474..microsoft.com.TRUE./.FALSE.13372422837017624.MC1.GUID=749eee6039c5489b9db3000c7ab3f399&HASH=749e&LV=202310
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                  Category:dropped
                                  Size (bytes):114688
                                  Entropy (8bit):0.9746603542602881
                                  Encrypted:false
                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                  Category:dropped
                                  Size (bytes):28672
                                  Entropy (8bit):2.5793180405395284
                                  Encrypted:false
                                  SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                  MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                  SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                  SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                  SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):0.8180424350137764
                                  Encrypted:false
                                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                  MD5:349E6EB110E34A08924D92F6B334801D
                                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):40960
                                  Entropy (8bit):0.8553638852307782
                                  Encrypted:false
                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):514
                                  Entropy (8bit):4.790536425561486
                                  Encrypted:false
                                  SSDEEP:6:GkiLAMp3XhFHiAFQUhh2AFQM55RE9/y6BThbXEzUwWc6Ju8e:0b3XTHP/h2oQM5bENTBhWWc6JBe
                                  MD5:D032E295E6C6C700815F2F6964B4F6D0
                                  SHA1:6035853A839D298A3303DC088C9BF63829811624
                                  SHA-256:D49D248DC76F40BD3B77822BA6918A0EE1E5191A0B4D8FC9B8D85B3F91119656
                                  SHA-512:2B93A4FCFC297122FB4D3F9D1440C4FE340A73517801183AEC7CD4C0328F39A504BD70CBD92AAF72476921D005F64C05B5713B8125B81151E3E38FA1A9A6C542
                                  Malicious:false
                                  Preview:. ,MMM8&&&....... _...MMMMM88&&&&..._.... .::'''MMMMM88&&&&&&'''::..... :: MMMMM88&&&&&& ::... '::....MMMMM88&&&&&&....::'... `''''MMMMM88&&&&'''''`.... 'MMM8&&&'.......[Planet Stealer: https://t.me/Planet_Stealer].. - IP: 154.16.192.203. - Country: US. - Username: user. - Hostname: user-PC. - Windows Version: Windows 10 Pro. - Hwid: 9e146be9-c76a-4720-bcdb-53011b87bd06. - CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz. - GPU: 8BCHLW_.
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                  Category:dropped
                                  Size (bytes):114688
                                  Entropy (8bit):0.9746603542602881
                                  Encrypted:false
                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):106496
                                  Entropy (8bit):1.1358696453229276
                                  Encrypted:false
                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  File Type:GLS_BINARY_LSB_FIRST
                                  Category:dropped
                                  Size (bytes):160
                                  Entropy (8bit):4.438743916256937
                                  Encrypted:false
                                  SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
                                  MD5:E467C82627F5E1524FDB4415AF19FC73
                                  SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
                                  SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
                                  SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
                                  Malicious:false
                                  Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
                                  File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                  Entropy (8bit):7.921083232034107
                                  TrID:
                                  • UPX compressed Win32 Executable (30571/9) 65.62%
                                  • Win64 Executable (generic) (12005/4) 25.77%
                                  • Generic Win/DOS Executable (2004/3) 4.30%
                                  • DOS Executable Generic (2002/1) 4.30%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.02%
                                  File name:zn7j8Etem5.exe
                                  File size:5'014'528 bytes
                                  MD5:f72f063babd357ccdc6c346191a305b9
                                  SHA1:a7794664194a9087cbf9114d0c33bb88e9ceacc9
                                  SHA256:c90d23214088641431d2a93b6e3dfa26e6f5149bc8028449b7ce2f8edb2a6dd3
                                  SHA512:5d0af8e363af7d5aa17fd9a8ca0123bfbe45f20dd416830c26ac62a183e6b3bbc1ecceabaedfa1a1ef0c3b1a8abbed7cfbfaa1152395dd0ec9d67cc400617596
                                  SSDEEP:98304:NxI7qGEiHBIf+0OgrqA5uillvHsO1733e1pDoEnIVWQd5jZWEFx:nIuGThIfVOgGAIillPsiruDXIwQ/Zx
                                  TLSH:C736338DAB926FF7D244FA38A78868953EAC191B648C7A213D4DC74D0B7D2411EB3F11
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$..L......@.......P.....@..........................................`... ............................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x140e7c810
                                  Entrypoint Section:UPX1
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                  TLS Callbacks:0x40e7ca60, 0x1
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:1
                                  File Version Major:6
                                  File Version Minor:1
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:1
                                  Import Hash:9aebf3da4677af9275c461261e5abde3
                                  Instruction
                                  push ebx
                                  push esi
                                  push edi
                                  push ebp
                                  dec eax
                                  lea esi, dword ptr [FFB3880Ah]
                                  dec eax
                                  lea edi, dword ptr [esi-009B4025h]
                                  dec eax
                                  lea eax, dword ptr [edi+00E47ECCh]
                                  push dword ptr [eax]
                                  mov dword ptr [eax], 0AF15506h
                                  push eax
                                  push edi
                                  xor ebx, ebx
                                  xor ecx, ecx
                                  dec eax
                                  or ebp, FFFFFFFFh
                                  call 00007FF071327565h
                                  add ebx, ebx
                                  je 00007FF071327514h
                                  rep ret
                                  mov ebx, dword ptr [esi]
                                  dec eax
                                  sub esi, FFFFFFFCh
                                  adc ebx, ebx
                                  mov dl, byte ptr [esi]
                                  rep ret
                                  dec eax
                                  lea eax, dword ptr [edi+ebp]
                                  cmp ecx, 05h
                                  mov dl, byte ptr [eax]
                                  jbe 00007FF071327533h
                                  dec eax
                                  cmp ebp, FFFFFFFCh
                                  jnbe 00007FF07132752Dh
                                  sub ecx, 04h
                                  mov edx, dword ptr [eax]
                                  dec eax
                                  add eax, 04h
                                  sub ecx, 04h
                                  mov dword ptr [edi], edx
                                  dec eax
                                  lea edi, dword ptr [edi+04h]
                                  jnc 00007FF071327501h
                                  add ecx, 04h
                                  mov dl, byte ptr [eax]
                                  je 00007FF071327522h
                                  dec eax
                                  inc eax
                                  mov byte ptr [edi], dl
                                  sub ecx, 01h
                                  mov dl, byte ptr [eax]
                                  dec eax
                                  lea edi, dword ptr [edi+01h]
                                  jne 00007FF071327502h
                                  rep ret
                                  cld
                                  inc ecx
                                  pop ebx
                                  jmp 00007FF07132751Ah
                                  dec eax
                                  inc esi
                                  mov byte ptr [edi], dl
                                  dec eax
                                  inc edi
                                  mov dl, byte ptr [esi]
                                  add ebx, ebx
                                  jne 00007FF07132751Ch
                                  mov ebx, dword ptr [esi]
                                  dec eax
                                  sub esi, FFFFFFFCh
                                  adc ebx, ebx
                                  mov dl, byte ptr [esi]
                                  jc 00007FF0713274F8h
                                  lea eax, dword ptr [ecx+01h]
                                  jmp 00007FF071327519h
                                  dec eax
                                  inc ecx
                                  call ebx
                                  adc eax, eax
                                  inc ecx
                                  call ebx
                                  adc eax, eax
                                  add ebx, ebx
                                  jne 00007FF07132751Ch
                                  mov ebx, dword ptr [esi]
                                  dec eax
                                  sub esi, FFFFFFFCh
                                  adc ebx, ebx
                                  mov dl, byte ptr [esi]
                                  jnc 00007FF0713274F6h
                                  sub eax, 03h
                                  jc 00007FF07132752Bh
                                  shl eax, 08h
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0xe4a0000x159UPX1
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe7d4ec0xd0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe7d0000x4ec.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xd7e0000x2ae4cUPX1
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xe7d5bc0x14.rsrc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0xe7ca880x28UPX1
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  UPX00x10000x9b40000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  UPX10x9b50000x4c80000x4c7c003bc4a8dec5adb94a727119fdbb930b0funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0xe7d0000x10000x60004c00db8a944cbba29a2cea4832bd5afFalse0.4231770833333333data5.203042233936599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_MANIFEST0xe7d05c0x48fXML 1.0 document, ASCII text0.40102827763496146
                                  DLLImport
                                  KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                  msvcrt.dllexit
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 3, 2024 15:57:58.627331972 CET4973080192.168.2.434.117.186.192
                                  Mar 3, 2024 15:57:58.756158113 CET804973034.117.186.192192.168.2.4
                                  Mar 3, 2024 15:57:58.756304979 CET4973080192.168.2.434.117.186.192
                                  Mar 3, 2024 15:57:58.757092953 CET4973080192.168.2.434.117.186.192
                                  Mar 3, 2024 15:57:58.885881901 CET804973034.117.186.192192.168.2.4
                                  Mar 3, 2024 15:57:58.906702042 CET804973034.117.186.192192.168.2.4
                                  Mar 3, 2024 15:57:58.961610079 CET4973080192.168.2.434.117.186.192
                                  Mar 3, 2024 15:57:59.890698910 CET4973080192.168.2.434.117.186.192
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 3, 2024 15:57:58.531363010 CET5483953192.168.2.41.1.1.1
                                  Mar 3, 2024 15:57:58.620604038 CET53548391.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Mar 3, 2024 15:57:58.531363010 CET192.168.2.41.1.1.10x6d60Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Mar 3, 2024 15:57:58.620604038 CET1.1.1.1192.168.2.40x6d60No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                  • ipinfo.io
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.44973034.117.186.192806856C:\Users\user\Desktop\zn7j8Etem5.exe
                                  TimestampBytes transferredDirectionData
                                  Mar 3, 2024 15:57:58.757092953 CET90OUTGET / HTTP/1.1
                                  Host: ipinfo.io
                                  User-Agent: Go-http-client/1.1
                                  Accept-Encoding: gzip
                                  Mar 3, 2024 15:57:58.906702042 CET704INHTTP/1.1 200 OK
                                  server: nginx/1.24.0
                                  date: Sun, 03 Mar 2024 14:57:58 GMT
                                  content-type: application/json; charset=utf-8
                                  Content-Length: 267
                                  access-control-allow-origin: *
                                  x-frame-options: SAMEORIGIN
                                  x-xss-protection: 1; mode=block
                                  x-content-type-options: nosniff
                                  referrer-policy: strict-origin-when-cross-origin
                                  x-envoy-upstream-service-time: 2
                                  via: 1.1 google
                                  strict-transport-security: max-age=2592000; includeSubDomains
                                  Data Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 31 35 34 2e 31 36 2e 31 39 32 2e 32 30 33 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 0a 20 20 22 72 65 61 64 6d 65 22 3a 20 22 68 74 74 70 73 3a 2f 2f 69 70 69 6e 66 6f 2e 69 6f 2f 6d 69 73 73 69 6e 67 61 75 74 68 22 0a 7d
                                  Data Ascii: { "ip": "154.16.192.203", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS174 Cogent Communications", "postal": "10001", "timezone": "America/New_York", "readme": "https://ipinfo.io/missingauth"}


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:15:57:56
                                  Start date:03/03/2024
                                  Path:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Desktop\zn7j8Etem5.exe
                                  Imagebase:0x7ff605320000
                                  File size:5'014'528 bytes
                                  MD5 hash:F72F063BABD357CCDC6C346191A305B9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Go lang
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1687761523.000000C000092000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:15:57:56
                                  Start date:03/03/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:15:57:56
                                  Start date:03/03/2024
                                  Path:C:\Windows\System32\wbem\WMIC.exe
                                  Wow64 process (32bit):false
                                  Commandline:wmic cpu get name
                                  Imagebase:0x7ff68a980000
                                  File size:576'000 bytes
                                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:3
                                  Start time:15:57:57
                                  Start date:03/03/2024
                                  Path:C:\Windows\System32\wbem\WMIC.exe
                                  Wow64 process (32bit):false
                                  Commandline:wmic path win32_VideoController get name
                                  Imagebase:0x7ff68a980000
                                  File size:576'000 bytes
                                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  No disassembly