Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cOQD62FceM.exe

Overview

General Information

Sample name:cOQD62FceM.exe
renamed because original name is a hash value
Original sample name:17b420104131c59619411e4732743ec8e9c373228613ee23731c1fd239fac7dd.exe
Analysis ID:1450352
MD5:af412b399914b80044340ade572bf2ab
SHA1:448557087815068ea337905a61f83f02eee47c07
SHA256:17b420104131c59619411e4732743ec8e9c373228613ee23731c1fd239fac7dd
Tags:exeRustyStealer
Infos:

Detection

Luca Stealer
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Luca Stealer
AI detected suspicious sample
AV process strings found (often used to terminate AV products)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • cOQD62FceM.exe (PID: 7248 cmdline: "C:\Users\user\Desktop\cOQD62FceM.exe" MD5: AF412B399914B80044340ADE572BF2AB)
    • WerFault.exe (PID: 7740 cmdline: C:\Windows\system32\WerFault.exe -u -p 7248 -s 668 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
cOQD62FceM.exeJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
      00000000.00000000.1692619924.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
        Process Memory Space: cOQD62FceM.exe PID: 7248JoeSecurity_LucaStealerYara detected Luca StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.cOQD62FceM.exe.7ff6a8b90000.0.unpackJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
            0.0.cOQD62FceM.exe.7ff6a8b90000.0.unpackJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: cOQD62FceM.exeAvira: detected
              Source: cOQD62FceM.exeReversingLabs: Detection: 50%
              Source: cOQD62FceM.exeVirustotal: Detection: 54%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.9% probability
              Source: cOQD62FceM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: global trafficHTTP traffic detected: GET /?output=json HTTP/1.1accept: */*host: ipwho.is
              Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
              Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
              Source: unknownDNS query: name: ipwho.is
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /?output=json HTTP/1.1accept: */*host: ipwho.is
              Source: global trafficDNS traffic detected: DNS query: ipwho.is
              Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
              Source: cOQD62FceM.exe, 00000000.00000002.2337269465.000000CF5FEF3000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsonT
              Source: cOQD62FceM.exe, 00000000.00000002.2337269465.000000CF5FEF3000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsonTE
              Source: cOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsone
              Source: cOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsoners
              Source: cOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmp, cOQD62FceM.exe, 00000000.00000002.2337432600.000002B576713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsons
              Source: cOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsonsof=C
              Source: cOQD62FceM.exe, 00000000.00000002.2337432600.000002B576713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is/?output=jsonspacef
              Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
              Source: cOQD62FceM.exeString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-supportCalling
              Source: C:\Users\user\Desktop\cOQD62FceM.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7248 -s 668
              Source: cOQD62FceM.exeBinary string: \Device\Afd\Mio
              Source: cOQD62FceM.exeBinary string: Failed to open \Device\Afd\Mio: `
              Source: classification engineClassification label: mal68.troj.winEXE@2/6@1/1
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7248
              Source: C:\Users\user\Desktop\cOQD62FceM.exeFile created: C:\Users\user\AppData\Local\Temp\O3PKy1BHGBD81AmSo5gc6vIrXIpZh6\Jump to behavior
              Source: cOQD62FceM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\cOQD62FceM.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
              Source: cOQD62FceM.exe, 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
              Source: cOQD62FceM.exeReversingLabs: Detection: 50%
              Source: cOQD62FceM.exeVirustotal: Detection: 54%
              Source: unknownProcess created: C:\Users\user\Desktop\cOQD62FceM.exe "C:\Users\user\Desktop\cOQD62FceM.exe"
              Source: C:\Users\user\Desktop\cOQD62FceM.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7248 -s 668
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: cOQD62FceM.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: cOQD62FceM.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: cOQD62FceM.exeStatic file information: File size 5484544 > 1048576
              Source: cOQD62FceM.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3ba600
              Source: cOQD62FceM.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x15d000
              Source: cOQD62FceM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: cOQD62FceM.exeStatic PE information: section name: _RDATA
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exe TID: 7252Thread sleep time: -35000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeThread delayed: delay time: 35000Jump to behavior
              Source: Amcache.hve.7.drBinary or memory string: VMware
              Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: cOQD62FceM.exe, 00000000.00000002.2337432600.000002B576713000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.7.drBinary or memory string: vmci.sys
              Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.7.drBinary or memory string: VMware20,1
              Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\cOQD62FceM.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\cOQD62FceM.exeCode function: 0_2_00007FF6A8F3B52C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6A8F3B52C
              Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: cOQD62FceM.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.cOQD62FceM.exe.7ff6a8b90000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.cOQD62FceM.exe.7ff6a8b90000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1692619924.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: cOQD62FceM.exe PID: 7248, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: cOQD62FceM.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.cOQD62FceM.exe.7ff6a8b90000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.cOQD62FceM.exe.7ff6a8b90000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1692619924.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: cOQD62FceM.exe PID: 7248, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              Process Injection
              1
              Disable or Modify Tools
              OS Credential Dumping1
              System Time Discovery
              Remote ServicesData from Local System2
              Non-Application Layer Protocol
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              11
              Virtualization/Sandbox Evasion
              LSASS Memory11
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media2
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Process Injection
              Security Account Manager11
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              cOQD62FceM.exe50%ReversingLabsWin32.Trojan.Generic
              cOQD62FceM.exe54%VirustotalBrowse
              cOQD62FceM.exe100%AviraHEUR/AGEN.1353232
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              bg.microsoft.map.fastly.net0%VirustotalBrowse
              ipwho.is0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://upx.sf.net0%URL Reputationsafe
              https://docs.rs/getrandom#nodejs-es-module-supportCalling0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.214.172
              truefalseunknown
              ipwho.is
              195.201.57.90
              truefalseunknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://ipwho.is/?output=jsonerscOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://upx.sf.netAmcache.hve.7.drfalse
                • URL Reputation: safe
                unknown
                http://ipwho.is/?output=jsonsof=CcOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://ipwho.is/?output=jsonecOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://ipwho.is/?output=jsonspacefcOQD62FceM.exe, 00000000.00000002.2337432600.000002B576713000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://ipwho.is/?output=jsonTcOQD62FceM.exe, 00000000.00000002.2337269465.000000CF5FEF3000.00000004.00000010.00020000.00000000.sdmpfalse
                        unknown
                        http://ipwho.is/?output=jsonTEcOQD62FceM.exe, 00000000.00000002.2337269465.000000CF5FEF3000.00000004.00000010.00020000.00000000.sdmpfalse
                          unknown
                          http://ipwho.is/?output=jsonscOQD62FceM.exe, 00000000.00000002.2337432600.000002B5766EC000.00000004.00000020.00020000.00000000.sdmp, cOQD62FceM.exe, 00000000.00000002.2337432600.000002B576713000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://docs.rs/getrandom#nodejs-es-module-supportCallingcOQD62FceM.exefalseunknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            195.201.57.90
                            ipwho.isGermany
                            24940HETZNER-ASDEfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1450352
                            Start date and time:2024-06-01 18:44:37 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 42s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:13
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:cOQD62FceM.exe
                            renamed because original name is a hash value
                            Original Sample Name:17b420104131c59619411e4732743ec8e9c373228613ee23731c1fd239fac7dd.exe
                            Detection:MAL
                            Classification:mal68.troj.winEXE@2/6@1/1
                            EGA Information:Failed
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.189.173.20, 93.184.221.240
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net
                            • Execution Graph export aborted for target cOQD62FceM.exe, PID 7248 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            TimeTypeDescription
                            12:45:30API Interceptor1x Sleep call for process: cOQD62FceM.exe modified
                            12:46:34API Interceptor1x Sleep call for process: WerFault.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            195.201.57.90Cryptor.exeGet hashmaliciousLuca StealerBrowse
                            • /?output=json
                            Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                            • /?output=json
                            rust-stealer-xss.exeGet hashmaliciousDiscord Token Stealer, Luca StealerBrowse
                            • /?output=json
                            Build.exeGet hashmaliciousLuca Stealer, QuasarBrowse
                            • /?output=json
                            rust-stealer-xss.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                            • /?output=json
                            3r3usOVGsa.exeGet hashmaliciousBlackGuardBrowse
                            • ipwhois.app/xml/
                            KvVXVfYvlF.exeGet hashmaliciousBlackGuard, SmokeLoaderBrowse
                            • ipwhois.app/xml/
                            file.exeGet hashmaliciousBlackGuardBrowse
                            • ipwhois.app/xml/
                            file.exeGet hashmaliciousBlackGuardBrowse
                            • ipwhois.app/xml/
                            file.exeGet hashmaliciousBlackGuardBrowse
                            • ipwhois.app/xml/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ipwho.isCryptor.exeGet hashmaliciousLuca StealerBrowse
                            • 195.201.57.90
                            Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                            • 195.201.57.90
                            rust-stealer-xss.exeGet hashmaliciousDiscord Token Stealer, Luca StealerBrowse
                            • 195.201.57.90
                            Build.exeGet hashmaliciousLuca Stealer, QuasarBrowse
                            • 195.201.57.90
                            KR6nDu9fLhop1bFe.exeGet hashmaliciousQuasarBrowse
                            • 195.201.57.90
                            rust-stealer-xss.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                            • 195.201.57.90
                            http://nxxoui9ah5qto.pages.dev/smart89Get hashmaliciousUnknownBrowse
                            • 195.201.57.90
                            01vwXiyQ8K.exeGet hashmaliciousQuasarBrowse
                            • 195.201.57.90
                            http://amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/Get hashmaliciousUnknownBrowse
                            • 195.201.57.90
                            SecuriteInfo.com.Trojan.PWS.Stealer.36926.32356.23713.exeGet hashmaliciousUnknownBrowse
                            • 147.135.36.89
                            bg.microsoft.map.fastly.net140000000.MSBuild.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            • 199.232.214.172
                            https://1drv.ms/o/s!Ale5u7cgFrqDgrU1Y9FuTirE1RVPjA?e=U3XZbQGet hashmaliciousSharepointPhisherBrowse
                            • 199.232.214.172
                            QT-2402078.scr.exeGet hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            https://login.palmspringsvrbo.comGet hashmaliciousUnknownBrowse
                            • 199.232.214.172
                            CT200.cmd.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 199.232.214.172
                            WxWorkApis.dllGet hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            ajb5QcGVGK.exeGet hashmaliciousDCRatBrowse
                            • 199.232.210.172
                            https://dprocure.bh.yokogawa.com/Get hashmaliciousUnknownBrowse
                            • 199.232.214.172
                            https://download2.easeus.com/installer_rss_new.phpGet hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            https://track.cornzself.com/bad38662-656e-4aa6-ae91-6bf2d0472a97?%7Bvar1%7D=txt1&%7Bvar2%7D=mz&%7Bvar3%7D=19189907751Get hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            HETZNER-ASDECryptor.exeGet hashmaliciousLuca StealerBrowse
                            • 195.201.57.90
                            Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                            • 195.201.57.90
                            SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                            • 159.69.102.132
                            3Lf408k9mg.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                            • 116.202.102.103
                            PAYMENT RECEIPT.exeGet hashmaliciousFormBookBrowse
                            • 178.63.50.103
                            RFQ price list.scr.exeGet hashmaliciousUnknownBrowse
                            • 88.99.137.18
                            Revised Order.exeGet hashmaliciousDarkTortilla, FormBookBrowse
                            • 135.181.212.206
                            RFQ price list.scr.exeGet hashmaliciousUnknownBrowse
                            • 88.99.137.18
                            QT-2402078.scr.exeGet hashmaliciousUnknownBrowse
                            • 88.99.137.18
                            QT-2402078.scr.exeGet hashmaliciousUnknownBrowse
                            • 88.99.137.18
                            No context
                            No context
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:modified
                            Size (bytes):65536
                            Entropy (8bit):0.8674025019462056
                            Encrypted:false
                            SSDEEP:96:QcF5uOi/sthqrP7qOnSKQXIDcQWc6zOcE1cw3O+HbHg/uAnQe88jDWps8OvJZ4E9:xTc/jC50I+PjjMzzuiFNZ24lO84q
                            MD5:1E9FAF99C763B6B1A68CD9729F3A7711
                            SHA1:3B071891B9284FC780F851151AA56FC364EC4F6F
                            SHA-256:62A2CAE90AC5227934FC36A3EB57F5C823B7DEE544D687858890A6610489A8F9
                            SHA-512:58C07C8BAF261510CC97EBE1172828F1E9418044B578AF2A60EF844F8C6A31ED3B459E24780635303949BB3C4A4D2DFE929DB617CDA7E0BF46B96C947A4334DD
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.7.3.3.9.6.1.1.8.7.3.1.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.7.3.3.9.6.2.9.5.2.9.3.9.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.e.0.b.d.6.c.d.-.1.0.6.a.-.4.b.d.0.-.a.3.1.4.-.4.a.d.1.2.b.0.0.5.1.e.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.f.1.9.e.6.3.-.4.9.4.3.-.4.6.a.8.-.8.d.6.a.-.3.c.f.5.a.c.1.f.4.8.5.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.c.O.Q.D.6.2.F.c.e.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.5.0.-.0.0.0.1.-.0.0.1.4.-.c.e.2.e.-.c.1.1.c.4.3.b.4.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.2.c.0.e.f.2.f.6.5.0.0.0.b.9.7.0.5.d.5.7.f.2.b.f.4.0.c.0.5.9.e.0.0.0.0.f.f.f.f.!.0.0.0.0.4.4.8.5.5.7.0.8.7.8.1.5.0.6.8.e.a.3.3.7.9.0.5.a.6.1.f.8.3.f.0.2.e.e.e.4.7.c.0.7.!.c.O.Q.D.6.2.F.c.e.M...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.5././.2.4.:.0.1.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Mini DuMP crash report, 15 streams, Sat Jun 1 16:46:02 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):140822
                            Entropy (8bit):1.5132979853737807
                            Encrypted:false
                            SSDEEP:768:RXs3ulutzOOQcUZoPCGUS6/c9f0dwvcynkMUf9:RizbQcUZoPCGUS6/c9f0dwvcynkMUf9
                            MD5:21181287BD092DD3BE3907E2861F267D
                            SHA1:FFF847976D858C4A5613FAE0124E84C5EB6B2C6B
                            SHA-256:2C1B231B5AA3C7FFBDEA38DF1E436320EC6128D97D991E31F56D85250BEDB56C
                            SHA-512:1B812B3694C84571B4862BF1AE5AE514B427347EC8D70DBE424C33F943F93FFB74C384C85366CB1FF0A1B4B7A425E484CA1E57C37C7C05717DA2FCD0CD2F8E95
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .......JP[f....................................T...BP..........`.......8...........T...............N...........h...........T.......@...................................................................................eJ......,.......Lw......................T.......P...)P[f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8842
                            Entropy (8bit):3.6986413782992114
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJ4bH36Y9VVHgmfmmpDx89bmUlfKWCm:R6lXJEX6YPVHgmfmlmefK6
                            MD5:E8E3F023462751A9A52FF0B7FD89EB02
                            SHA1:259E3E758DE9BD35A98CC56EF71C899D33CAA5BD
                            SHA-256:86EBA37541E6C5FB4A50B18F06273C02EE5D5B1C383C05AB81A5ED2D1427A092
                            SHA-512:3FDC13331223675267E2F14516FA78E7245D997E56224C1CE3EA0045D08220D5323781CD069B83745976F5EBAE6582A22740C7A832A9388667E8B6C45E5BDFEA
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.4.8.<./.P.i.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4756
                            Entropy (8bit):4.457675053493731
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsWtJg771I90HnWpW8VYxYm8M4JhxV2BFNyq8vcV2GieJfd:uIjfWHI7P27VBJhxwJWcwGieJfd
                            MD5:5D7EB885169DB3C8C5A8EF6712790DC4
                            SHA1:DAD3170BD69FE35F611C75216F818D597049E718
                            SHA-256:0411E6DA3C328C53F0B9BA7E0375C5698B98F4421037B3409DB7D11288AFA0AD
                            SHA-512:3883C48F8BB6245F283B176C29296A3B23D095C9DFD580970A52CEAF8EEC845AC2B088DAE7735CAAED95DD2B81684147F3DFE0B6C19ED5B6B8A2617F3106BB3A
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="348948" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):338
                            Entropy (8bit):3.4620383296566426
                            Encrypted:false
                            SSDEEP:6:kK8mD8EDkaJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:JDVDkpkPlE99SCQl2DUevat
                            MD5:73DEBB44BAD8331B38513559E50069CC
                            SHA1:18118F53A7D99D22D964BE41A86BB458FC5092A2
                            SHA-256:E98412021F6C5A8ED57DAD3E04992798A35010F9C9FB449ABFB11F47F6C0D686
                            SHA-512:E3521F3771FD47487D3707235ED7F46D4E5F9BA7D3AC62C1C56AE3FF1CA7F85360D6367518B11CB4B813712269DD817AC899F0CCE2062E70CB79E21FDF5669F5
                            Malicious:false
                            Reputation:low
                            Preview:p...... ........==)CC...(................................................&..@... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.465595466941929
                            Encrypted:false
                            SSDEEP:6144:NIXfpi67eLPU9skLmb0b4eWSPKaJG8nAgejZMMhA2gX4WABl0uNLdwBCswSbt:eXD94eWlLZMM6YFHx+t
                            MD5:570293C1F1D1AB07BED7982C48560567
                            SHA1:6F00F05444632FCAC6B117CF503109111E23789C
                            SHA-256:31862ACFBBC4AFA7C4B5122BFA3A186D58BBE060D6353E6A51E440D19146F71A
                            SHA-512:FA08C908A11F7608C816DC3FCE344C4A3BA424185DE6F5932DD258F9AF7EE502AF33553603B64B35C1FA25F1CE942788EED12AD4F2BA88D2AE660FB179FAC89A
                            Malicious:false
                            Reputation:low
                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..B/C...............................................................................................................................................................................................................................................................................................................................................C.T.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32+ executable (GUI) x86-64, for MS Windows
                            Entropy (8bit):6.370985643803525
                            TrID:
                            • Win64 Executable GUI (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:cOQD62FceM.exe
                            File size:5'484'544 bytes
                            MD5:af412b399914b80044340ade572bf2ab
                            SHA1:448557087815068ea337905a61f83f02eee47c07
                            SHA256:17b420104131c59619411e4732743ec8e9c373228613ee23731c1fd239fac7dd
                            SHA512:f0b96f922abcf9ede936073142690b53848ea8787730936d73ea6d0ac57174efbe730388b164c83b63d3dd4c93f17fface89fac24f107dd21b46f83ca9cc9f76
                            SSDEEP:98304:YVbklhGDTqHiSYvbuVqvxKBWwD3ZLr9IKynfJy:YqluBudBW4Lr9IKm
                            TLSH:84468C43F6A581E9C0AEC174875B9323FB32BC890621B79B5BD49A213F23B605F5D358
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......{.dC?...?...?...6...-..._......._...2..._...6.......)...+...<...?.......[...%...?...8...[...>...Rich?..........................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x1403aaee0
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x664FF26D [Fri May 24 01:50:37 2024 UTC]
                            TLS Callbacks:0x4023b620, 0x1
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:a570918faa90d4e27bbdd3bedba90c46
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007FD8147C3458h
                            dec eax
                            add esp, 28h
                            jmp 00007FD8147C2C87h
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            nop word ptr [eax+eax+00000000h]
                            dec eax
                            sub esp, 10h
                            dec esp
                            mov dword ptr [esp], edx
                            dec esp
                            mov dword ptr [esp+08h], ebx
                            dec ebp
                            xor ebx, ebx
                            dec esp
                            lea edx, dword ptr [esp+18h]
                            dec esp
                            sub edx, eax
                            dec ebp
                            cmovb edx, ebx
                            dec esp
                            mov ebx, dword ptr [00000010h]
                            dec ebp
                            cmp edx, ebx
                            jnc 00007FD8147C2E28h
                            inc cx
                            and edx, 8D4DF000h
                            wait
                            add al, dh
                            Programming Language:
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x516d4c0x1a4.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5200000x14850.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5360000x8690.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x509b800x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5099d00x140.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x3ba4a00x3ba60059c3b5cdba585309d77d3d21420617a2unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x3bc0000x15ce580x15d000456be673f895c7841b9ff24db19bc678False0.3754728912965616data5.463600247898426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x5190000x6f200x62008134a298a1419e24cdaa56b31e4d9614False0.41091358418367346data4.28387814324599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x5200000x148500x14a00d27f4caab6529c6dfe1916079dc1a9fcFalse0.4869554924242424data6.221562344961173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            _RDATA0x5350000x15c0x20006c074d6698e3a07b60ecedaea074193False0.408203125data3.30133477618048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x5360000x86900x88003f1e4d07439f66c364e78743f87a5010False0.26803768382352944data5.452811289047903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            DLLImport
                            KERNEL32.DLLGetConsoleMode, WriteConsoleW, WaitForSingleObjectEx, LoadLibraryA, CreateMutexA, GetCurrentProcess, ReleaseMutex, GetEnvironmentVariableW, GetModuleHandleW, FormatMessageW, GetTempPathW, SetFilePointerEx, GetFileInformationByHandleEx, GetFullPathNameW, FlushFileBuffers, FindNextFileW, CreateDirectoryW, FindFirstFileW, GetSystemInfo, WakeConditionVariable, GetStdHandle, SetFileCompletionNotificationModes, CreateIoCompletionPort, SetHandleInformation, TryAcquireSRWLockExclusive, GetEnvironmentStringsW, FreeEnvironmentStringsW, CompareStringOrdinal, GetSystemDirectoryW, GetWindowsDirectoryW, CreateProcessW, GetFileAttributesW, DuplicateHandle, GetCurrentProcessId, CreateNamedPipeW, CreateThread, ReadFileEx, SleepEx, WriteFileEx, ReleaseSRWLockExclusive, GetCurrentThread, WaitForMultipleObjects, GetOverlappedResult, CreateEventW, CancelIo, ReadFile, ExitProcess, GetProcAddress, QueryPerformanceFrequency, GetSystemTimeAsFileTime, GetCurrentDirectoryW, AcquireSRWLockShared, ReleaseSRWLockShared, DeleteFileW, LoadLibraryExW, SleepConditionVariableSRW, PostQueuedCompletionStatus, GetFinalPathNameByHandleW, SetLastError, GetQueuedCompletionStatusEx, WakeAllConditionVariable, GetModuleHandleA, SwitchToThread, CreateFileW, SetFileInformationByHandle, GetModuleFileNameW, HeapReAlloc, GetProcessHeap, HeapAlloc, Sleep, GetExitCodeProcess, GetTickCount, MapViewOfFile, CreateFileMappingW, FormatMessageA, GetSystemTime, WideCharToMultiByte, FreeLibrary, SystemTimeToFileTime, GetFileSize, LockFileEx, LocalFree, UnlockFile, HeapDestroy, HeapCompact, LoadLibraryW, DeleteFileA, CreateFileA, FlushViewOfFile, OutputDebugStringW, GetFileAttributesExW, GetFileAttributesA, GetDiskFreeSpaceA, GetTempPathA, MultiByteToWideChar, HeapSize, HeapValidate, UnmapViewOfFile, CreateMutexW, UnlockFileEx, SetEndOfFile, GetFullPathNameA, SetFilePointer, LockFile, OutputDebugStringA, GetDiskFreeSpaceW, WriteFile, HeapCreate, AreFileApisANSI, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, GetCurrentThreadId, WaitForSingleObject, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetFileInformationByHandle, TerminateProcess, SetThreadStackGuarantee, AddVectoredExceptionHandler, CloseHandle, FindClose, QueryPerformanceCounter, IsProcessorFeaturePresent, InitializeSListHead, IsDebuggerPresent, GetLastError, AcquireSRWLockExclusive, HeapFree, EncodePointer, RaiseException, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CopyFileExW
                            advapi32.dllAllocateAndInitializeSid, RegQueryValueExW, SystemFunction036, RegOpenKeyExW, FreeSid, RegCloseKey, CheckTokenMembership
                            api-ms-win-crt-heap-l1-1-0.dll_msize, malloc, _set_new_mode, realloc, calloc, free
                            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                            api-ms-win-crt-math-l1-1-0.dllexp2f, _dclass, log, roundf, pow, ceil, __setusermatherr, powf, truncf
                            api-ms-win-crt-runtime-l1-1-0.dll_configure_narrow_argv, _initialize_narrow_environment, _get_initial_narrow_environment, _seh_filter_exe, _initterm_e, _endthreadex, _register_onexit_function, _crt_atexit, _beginthreadex, abort, exit, _exit, terminate, __p___argc, _initialize_onexit_table, __p___argv, _initterm, _cexit, _c_exit, _set_app_type, _register_thread_local_exe_atexit_callback
                            api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
                            api-ms-win-crt-string-l1-1-0.dllstrlen, strncmp, strcspn, strcpy_s, strcmp, wcsncmp
                            api-ms-win-crt-time-l1-1-0.dll_localtime64_s
                            api-ms-win-crt-utility-l1-1-0.dll_rotl64, qsort
                            bcrypt.dllBCryptCloseAlgorithmProvider, BCryptOpenAlgorithmProvider, BCryptGenRandom
                            crypt32.dllCertDuplicateStore, CryptUnprotectData, CertFreeCertificateChain, CertDuplicateCertificateChain, CertAddCertificateContextToStore, CertEnumCertificatesInStore, CertDuplicateCertificateContext, CertCloseStore, CertVerifyCertificateChainPolicy, CertGetCertificateChain, CertOpenStore, CertFreeCertificateContext
                            gdi32.dllCreateCompatibleBitmap, SelectObject, SetStretchBltMode, StretchBlt, GetDIBits, GetObjectW, DeleteObject, GetDeviceCaps, CreateCompatibleDC, CreateDCW, DeleteDC
                            ntdll.dllNtDeviceIoControlFile, NtCreateFile, RtlLookupFunctionEntry, RtlCaptureContext, RtlNtStatusToDosError, NtCancelIoFileEx, RtlUnwindEx, RtlPcToFileHeader, RtlVirtualUnwind
                            ole32.dllCoInitializeSecurity, CoCreateInstance, CoSetProxyBlanket, CoInitializeEx
                            oleaut32.dllSafeArrayDestroy, VariantClear, SafeArrayAccessData, SafeArrayGetUBound, SysAllocStringLen, SafeArrayUnaccessData, SysFreeString, SafeArrayGetLBound
                            rstrtmgr.dllRmStartSession, RmRegisterResources, RmGetList
                            secur32.dllDecryptMessage, ApplyControlToken, EncryptMessage, DeleteSecurityContext, FreeCredentialsHandle, AcquireCredentialsHandleA, QueryContextAttributesW, InitializeSecurityContextW, AcceptSecurityContext, FreeContextBuffer
                            user32.dllGetMonitorInfoW, EnumDisplaySettingsExW, EnumDisplayMonitors
                            ws2_32.dllioctlsocket, WSASocketW, getsockname, getpeername, setsockopt, WSAIoctl, socket, getaddrinfo, freeaddrinfo, WSAStartup, WSACleanup, WSAGetLastError, accept, closesocket, listen, bind, select, getsockopt, recv, send, WSASend, connect, shutdown
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 1, 2024 18:45:30.871589899 CEST4973980192.168.2.4195.201.57.90
                            Jun 1, 2024 18:45:30.876455069 CEST8049739195.201.57.90192.168.2.4
                            Jun 1, 2024 18:45:30.876528978 CEST4973980192.168.2.4195.201.57.90
                            Jun 1, 2024 18:45:30.877512932 CEST4973980192.168.2.4195.201.57.90
                            Jun 1, 2024 18:45:30.882333994 CEST8049739195.201.57.90192.168.2.4
                            Jun 1, 2024 18:46:00.882113934 CEST8049739195.201.57.90192.168.2.4
                            Jun 1, 2024 18:46:00.882194996 CEST4973980192.168.2.4195.201.57.90
                            Jun 1, 2024 18:46:00.882411957 CEST4973980192.168.2.4195.201.57.90
                            Jun 1, 2024 18:46:00.887202978 CEST8049739195.201.57.90192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 1, 2024 18:45:30.860646963 CEST6460353192.168.2.41.1.1.1
                            Jun 1, 2024 18:45:30.867563009 CEST53646031.1.1.1192.168.2.4
                            Jun 1, 2024 18:46:16.024581909 CEST53579941.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jun 1, 2024 18:45:30.860646963 CEST192.168.2.41.1.1.10xebebStandard query (0)ipwho.isA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jun 1, 2024 18:45:30.867563009 CEST1.1.1.1192.168.2.40xebebNo error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                            Jun 1, 2024 18:46:58.272906065 CEST1.1.1.1192.168.2.40x979aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                            Jun 1, 2024 18:46:58.272906065 CEST1.1.1.1192.168.2.40x979aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                            • ipwho.is
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449739195.201.57.90807248C:\Users\user\Desktop\cOQD62FceM.exe
                            TimestampBytes transferredDirectionData
                            Jun 1, 2024 18:45:30.877512932 CEST59OUTGET /?output=json HTTP/1.1
                            accept: */*
                            host: ipwho.is


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:12:45:29
                            Start date:01/06/2024
                            Path:C:\Users\user\Desktop\cOQD62FceM.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\cOQD62FceM.exe"
                            Imagebase:0x7ff6a8b90000
                            File size:5'484'544 bytes
                            MD5 hash:AF412B399914B80044340ADE572BF2AB
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_LucaStealer, Description: Yara detected Luca Stealer, Source: 00000000.00000002.2337800577.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_LucaStealer, Description: Yara detected Luca Stealer, Source: 00000000.00000000.1692619924.00007FF6A8FA0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:7
                            Start time:12:46:00
                            Start date:01/06/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 7248 -s 668
                            Imagebase:0x7ff6c1b40000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            No disassembly