Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Wo0CkmOz64.exe

Overview

General Information

Sample name:Wo0CkmOz64.exe
renamed because original name is a hash value
Original sample name:06b81c8edd7f620513a06e3a5cc11483.exe
Analysis ID:1459120
MD5:06b81c8edd7f620513a06e3a5cc11483
SHA1:af4ffbf3510bb2e86387d26a6de309736548b340
SHA256:65082d1a97a4636a529d3a52248ec1eed728fa78c1a3b3e34986e0378b393f1c
Tags:32exetrojan
Infos:

Detection

PureLog Stealer
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Wo0CkmOz64.exe (PID: 2752 cmdline: "C:\Users\user\Desktop\Wo0CkmOz64.exe" MD5: 06B81C8EDD7F620513A06E3A5CC11483)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3380383003.000000001BBA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.3379202075.000000001B690000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Wo0CkmOz64.exe.1bba0000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.Wo0CkmOz64.exe.1b690000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.Wo0CkmOz64.exe.1b690000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.Wo0CkmOz64.exe.130312b8.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 6 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Wo0CkmOz64.exeAvira: detected
                      Source: Wo0CkmOz64.exeReversingLabs: Detection: 71%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                      Source: Wo0CkmOz64.exeJoe Sandbox ML: detected
                      Source: Wo0CkmOz64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: Msajjuwub.pdb source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: 74130c7c-3821-4585-8a44-d82d54fb894c<Module>costura.costura.dll.compressedcostura.dotnetzip.dll.compressedcostura.dotnetzip.pdb.compressedcostura.protobuf-net.dll.compressedMsajjuwub.g.resourcesaR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed8 source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp
                      Source: global trafficTCP traffic: 192.168.2.6:49711 -> 80.76.49.148:7702
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: unknownTCP traffic detected without corresponding DNS query: 80.76.49.148
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                      System Summary

                      barindex
                      Source: Wo0CkmOz64.exe, Program.csLarge array initialization: Main: array initializer size 849520
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD346772D3
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD346743B0
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD346734D3
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD346740FA
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD346729FA
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD34673387
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD347713D4
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD347705D4
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsajjuwub.dll" vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exe, 00000000.00000000.2130169567.0000000000A54000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDniblceid.exe" vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsajjuwub.dll" vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exeBinary or memory string: OriginalFilenameDniblceid.exe" vs Wo0CkmOz64.exe
                      Source: Wo0CkmOz64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Wo0CkmOz64.exe, Program.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, ixTk49fcGhAJ2sgoDPl.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, ixTk49fcGhAJ2sgoDPl.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, ixTk49fcGhAJ2sgoDPl.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, ixTk49fcGhAJ2sgoDPl.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, ixTk49fcGhAJ2sgoDPl.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, ixTk49fcGhAJ2sgoDPl.csCryptographic APIs: 'CreateDecryptor'
                      Source: classification engineClassification label: mal92.troj.evad.winEXE@1/0@0/1
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeMutant created: \Sessions\1\BaseNamedObjects\f1bf4db99626c2f2
                      Source: Wo0CkmOz64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Wo0CkmOz64.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: Wo0CkmOz64.exeReversingLabs: Detection: 71%
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: version.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: amsi.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                      Source: Wo0CkmOz64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Wo0CkmOz64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Wo0CkmOz64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: Msajjuwub.pdb source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: 74130c7c-3821-4585-8a44-d82d54fb894c<Module>costura.costura.dll.compressedcostura.dotnetzip.dll.compressedcostura.dotnetzip.pdb.compressedcostura.protobuf-net.dll.compressedMsajjuwub.g.resourcesaR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed8 source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, ixTk49fcGhAJ2sgoDPl.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, ixTk49fcGhAJ2sgoDPl.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: Wo0CkmOz64.exe, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Wo0CkmOz64.exe.2bb0000.1.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.Wo0CkmOz64.exe.2bb0000.1.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.Wo0CkmOz64.exe.2bb0000.1.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.Wo0CkmOz64.exe.2bb0000.1.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.Wo0CkmOz64.exe.2bb0000.1.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.1bba0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.131712f0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.13281328.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3380383003.000000001BBA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Wo0CkmOz64.exe PID: 2752, type: MEMORYSTR
                      Source: Wo0CkmOz64.exeStatic PE information: 0xC8E3E1A2 [Tue Oct 20 00:00:34 2076 UTC]
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD3467BDDA push es; iretd
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD34670E55 push ebx; ret
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeCode function: 0_2_00007FFD347739B8 pushad ; retf
                      Source: Wo0CkmOz64.exeStatic PE information: section name: .text entropy: 7.999487700871465
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, Y2lLZcbSYWt9UP9rF7.csHigh entropy of concatenated method names: 'OPE0mL6RM', 'amhzaWG7D', 'xSK4X3fqaj', 'weU44KmgRV', 'x7X4KrV49G', 'LLS4evHfen', 'z3U4darRRK', 'Nlr4m7yH7I', 'wXL4JU8I4P', 'PZW4Y9DtVn'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'ibP1P0u5rrp3VJbKq47'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, gAeOsta063lyJEOOAwv.csHigh entropy of concatenated method names: 'EDKs6mxP25', 'e2FsLaSBvn', 'Q2ksTi1BIb', 'ND1s5Juqq7', 'sIbs8MwiEE', 'YqVs1vbi9w', 'sbusAYPU96', 'XXxhpSv9Dy', 'v9gsH604Ok', 'l68suULumv'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, ixTk49fcGhAJ2sgoDPl.csHigh entropy of concatenated method names: 'SQQ9SLDtcCWavixBCma', 'EO6PV9D7VYR6pQw11Me', 'xmbaCCGGr7', 'NsKJigDPaVWkLp0vcVV', 'rSxuMPDndnPj8eZrpdR', 'QGTD51DWCjyUP69NmQk', 'isk9ngDUqv54HqZOvx8', 'wXgJa5DwvBWhCUB4dHF', 'T4WiVKDZR5U4nsojT33', 'FFHa4ADRcIhMkabc29V'
                      Source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, W4sJouaB4OvhNNX2KbG.csHigh entropy of concatenated method names: 'DHbaFapw8d', 'YBiaPYQbOS', 'nQManmQEs3', 'WnjaWkekEO', 'QE8aUmC191', 'pqeawkLeP0', 'xCIaZAU4y3', 'DdnaR0f1KN', 'xx6abZpsSB', 'i0yakyWOe3'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, Y2lLZcbSYWt9UP9rF7.csHigh entropy of concatenated method names: 'OPE0mL6RM', 'amhzaWG7D', 'xSK4X3fqaj', 'weU44KmgRV', 'x7X4KrV49G', 'LLS4evHfen', 'z3U4darRRK', 'Nlr4m7yH7I', 'wXL4JU8I4P', 'PZW4Y9DtVn'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'ibP1P0u5rrp3VJbKq47'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, gAeOsta063lyJEOOAwv.csHigh entropy of concatenated method names: 'EDKs6mxP25', 'e2FsLaSBvn', 'Q2ksTi1BIb', 'ND1s5Juqq7', 'sIbs8MwiEE', 'YqVs1vbi9w', 'sbusAYPU96', 'XXxhpSv9Dy', 'v9gsH604Ok', 'l68suULumv'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, ixTk49fcGhAJ2sgoDPl.csHigh entropy of concatenated method names: 'SQQ9SLDtcCWavixBCma', 'EO6PV9D7VYR6pQw11Me', 'xmbaCCGGr7', 'NsKJigDPaVWkLp0vcVV', 'rSxuMPDndnPj8eZrpdR', 'QGTD51DWCjyUP69NmQk', 'isk9ngDUqv54HqZOvx8', 'wXgJa5DwvBWhCUB4dHF', 'T4WiVKDZR5U4nsojT33', 'FFHa4ADRcIhMkabc29V'
                      Source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, W4sJouaB4OvhNNX2KbG.csHigh entropy of concatenated method names: 'DHbaFapw8d', 'YBiaPYQbOS', 'nQManmQEs3', 'WnjaWkekEO', 'QE8aUmC191', 'pqeawkLeP0', 'xCIaZAU4y3', 'DdnaR0f1KN', 'xx6abZpsSB', 'i0yakyWOe3'
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeMemory allocated: 1080000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeMemory allocated: 1AC10000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeWindow / User API: threadDelayed 3907
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeWindow / User API: threadDelayed 6028
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exe TID: 4900Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exe TID: 4156Thread sleep count: 3907 > 30
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exe TID: 4156Thread sleep count: 6028 > 30
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exe TID: 4900Thread sleep time: -922337203685477s >= -30000s
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeThread delayed: delay time: 922337203685477
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                      Source: Wo0CkmOz64.exe, 00000000.00000002.3379823672.000000001BAC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeProcess token adjusted: Debug
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeQueries volume information: C:\Users\user\Desktop\Wo0CkmOz64.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Wo0CkmOz64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.1b690000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.1b690000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.130312b8.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.131712f0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.12fdae80.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3379202075.000000001B690000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.1b690000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.1b690000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.130312b8.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.130312b8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.131712f0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.12fdae80.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Wo0CkmOz64.exe.131712f0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3379202075.000000001B690000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      OS Credential Dumping11
                      Security Software Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager1
                      Application Window Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Obfuscated Files or Information
                      NTDS12
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
                      Software Packing
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Timestomp
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Wo0CkmOz64.exe71%ReversingLabsByteCode-MSIL.Trojan.PureLogStealer
                      Wo0CkmOz64.exe100%AviraTR/Dropper.Gen
                      Wo0CkmOz64.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://github.com/mgravell/protobuf-netJ0%Avira URL Cloudsafe
                      https://github.com/mgravell/protobuf-neti0%Avira URL Cloudsafe
                      https://github.com/mgravell/protobuf-net0%Avira URL Cloudsafe
                      https://stackoverflow.com/q/14436606/233540%Avira URL Cloudsafe
                      https://stackoverflow.com/q/2152978/233540%Avira URL Cloudsafe
                      https://stackoverflow.com/q/11564914/23354;0%Avira URL Cloudsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://github.com/mgravell/protobuf-netWo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/mgravell/protobuf-netiWo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://stackoverflow.com/q/14436606/23354Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/mgravell/protobuf-netJWo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://stackoverflow.com/q/11564914/23354;Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://stackoverflow.com/q/2152978/23354Wo0CkmOz64.exe, 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3371838921.0000000002BB0000.00000004.08000000.00040000.00000000.sdmp, Wo0CkmOz64.exe, 00000000.00000002.3376338658.000000001336B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      80.76.49.148
                      unknownBulgaria
                      43659CLOUDCOMPUTINGDEfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1459120
                      Start date and time:2024-06-18 21:17:12 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 51s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Wo0CkmOz64.exe
                      renamed because original name is a hash value
                      Original Sample Name:06b81c8edd7f620513a06e3a5cc11483.exe
                      Detection:MAL
                      Classification:mal92.troj.evad.winEXE@1/0@0/1
                      EGA Information:Failed
                      HCA Information:Failed
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target Wo0CkmOz64.exe, PID 2752 because it is empty
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: Wo0CkmOz64.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.998288715406636
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:Wo0CkmOz64.exe
                      File size:856'064 bytes
                      MD5:06b81c8edd7f620513a06e3a5cc11483
                      SHA1:af4ffbf3510bb2e86387d26a6de309736548b340
                      SHA256:65082d1a97a4636a529d3a52248ec1eed728fa78c1a3b3e34986e0378b393f1c
                      SHA512:9d80d9208d778779538cf5075b4018dc8b8d037a9d07c961ce2389580290df050929876d1adc2489f7dc5f6c1466cde7d21b9152185e88ba0601e4dd2da4aec7
                      SSDEEP:24576:fI0eDXhXsbQSa0t2xiewR2rpXN/L+9+dClWdD9:AVebQzxieHpXNL+jWdD
                      TLSH:8E05336341660B90EC3B31B91B5CBB85D3B4F45DB278AB7184FD3745D6C2D4C8A2A8E8
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............&/... ...@....@.. ....................................@................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x402f26
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0xC8E3E1A2 [Tue Oct 20 00:00:34 2076 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      popfd
                      mov ah, 28h
                      xor edi, dword ptr [ebx+1A3F4A74h]
                      add dword ptr [ebp-2Ah], edx
                      mov ah, FBh
                      mov ebp, 50AC891Eh
                      push ecx
                      int D0h
                      popfd
                      mov eax, dword ptr [E5F0278Dh]
                      inc ebp
                      or dword ptr [eax], ecx
                      fld tbyte ptr [edi+125D0849h]
                      cmp al, C9h
                      add ecx, dword ptr [ebx-16h]
                      xchg eax, esi
                      push cs
                      retn FD36h
                      insd
                      mov edi, ebp
                      xchg eax, edx
                      sbb dl, byte ptr [eax]
                      inc eax
                      salc
                      scasd
                      add dword ptr [ecx+ecx*8], 11CB4B64h
                      cmp eax, C89BE90Dh
                      out dx, eax
                      scasd
                      add byte ptr [edx-346D90F2h], ch
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2ed40x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x56c.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2eb80x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xd05a00xd0600770641f1a98083bf31fa95fdbdd86bf1False0.9987686056538693data7.999487700871465IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0xd40000x56c0x6008a873b0a97c1a8a85796cbb4935c6f9cFalse0.3997395833333333data3.9339981650904186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xd60000xc0x20034aa1c7f786d5445ac690bf61d2e9e0fFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0xd40900x2dcdata0.43306010928961747
                      RT_MANIFEST0xd437c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 18, 2024 21:18:09.141510963 CEST497117702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:09.146845102 CEST77024971180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:09.146953106 CEST497117702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:10.540179014 CEST77024971180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:10.540246010 CEST497117702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:10.549874067 CEST497117702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:10.554729939 CEST77024971180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:10.560682058 CEST497137702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:10.566210032 CEST77024971380.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:10.566281080 CEST497137702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:11.982278109 CEST77024971380.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:11.982376099 CEST497137702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:11.982599974 CEST497137702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:11.983155012 CEST497147702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:11.987298012 CEST77024971380.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:11.987919092 CEST77024971480.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:11.987993956 CEST497147702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.382674932 CEST77024971480.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.382740021 CEST497147702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.382854939 CEST497147702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.383271933 CEST497157702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.388106108 CEST77024971480.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.388565063 CEST77024971580.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.388863087 CEST497157702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.396214008 CEST77024971580.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.396260977 CEST497157702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.396333933 CEST497157702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.396646976 CEST497167702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.401057005 CEST77024971580.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.401371002 CEST77024971680.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.401473045 CEST497167702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.409975052 CEST77024971680.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.410023928 CEST497167702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.991096973 CEST497167702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.991787910 CEST497177702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:13.996259928 CEST77024971680.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.996879101 CEST77024971780.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:13.997111082 CEST497177702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:14.323818922 CEST497177702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:14.329365015 CEST77024971780.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:14.329411983 CEST497177702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:14.334270000 CEST77024971780.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:15.399308920 CEST77024971780.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:15.399378061 CEST497177702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:15.399513006 CEST497177702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:15.399935961 CEST497187702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:15.405038118 CEST77024971780.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:15.405102968 CEST77024971880.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:15.405189991 CEST497187702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:15.581182003 CEST497187702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:15.586077929 CEST77024971880.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:15.586124897 CEST497187702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:15.593799114 CEST77024971880.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:16.790262938 CEST77024971880.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:16.790333986 CEST497187702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:16.790457964 CEST497187702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:16.790992022 CEST497197702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:16.800076962 CEST77024971880.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:16.801033020 CEST77024971980.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:16.801131964 CEST497197702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:17.002578020 CEST497197702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:17.009890079 CEST77024971980.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:17.009975910 CEST497197702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:17.019483089 CEST77024971980.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.194920063 CEST77024971980.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.195035934 CEST497197702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.195199013 CEST497197702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.195784092 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.200634956 CEST77024971980.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.200651884 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.200747013 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.393647909 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.398709059 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.398766994 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.403701067 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.408972025 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.413930893 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:18.413995028 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:18.418946981 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.002813101 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.007709980 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.007766962 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.013520956 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.652283907 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.652350903 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.652503014 CEST497217702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.652857065 CEST497227702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.666204929 CEST77024972180.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.666533947 CEST77024972280.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.666600943 CEST497227702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.697191954 CEST77024972280.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.697257996 CEST497227702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.697381973 CEST497227702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.697760105 CEST497237702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.705105066 CEST77024972280.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.705118895 CEST77024972380.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.705209970 CEST497237702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.719852924 CEST77024972380.76.49.148192.168.2.6
                      Jun 18, 2024 21:18:19.719932079 CEST497237702192.168.2.680.76.49.148
                      Jun 18, 2024 21:18:19.720067978 CEST497237702192.168.2.680.76.49.148
                      No statistics
                      Target ID:0
                      Start time:15:18:06
                      Start date:18/06/2024
                      Path:C:\Users\user\Desktop\Wo0CkmOz64.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\Wo0CkmOz64.exe"
                      Imagebase:0x980000
                      File size:856'064 bytes
                      MD5 hash:06B81C8EDD7F620513A06E3A5CC11483
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.3380383003.000000001BBA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3379202075.000000001B690000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3376338658.0000000012F41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3376338658.0000000013171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.3371913837.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:false

                      No disassembly