Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ViKing-R2.exe

Overview

General Information

Sample name:ViKing-R2.exe
Analysis ID:1467980
MD5:c39554bdab22961d0ac64c5c2e607915
SHA1:ea1d422f6ef34c453d1a72f605051666544994b2
SHA256:6c1563fd7bc5f73b45639867591d05afb944dd7dce4caa94e59fbcfb9a48756c
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for sample
PE file has a writeable .text section
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Creates a DirectInput object (often for capturing keystrokes)
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • ViKing-R2.exe (PID: 1812 cmdline: "C:\Users\user\Desktop\ViKing-R2.exe" MD5: C39554BDAB22961D0AC64C5C2E607915)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ViKing-R2.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      Process Memory Space: ViKing-R2.exe PID: 1812JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        No Sigma rule has matched
        Timestamp:07/05/24-07:59:43.098294
        SID:2830033
        Source Port:49712
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\Users\user\Desktop\libCzf.dllVirustotal: Detection: 13%Perma Link
        Source: ViKing-R2.exeVirustotal: Detection: 45%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
        Source: ViKing-R2.exeJoe Sandbox ML: detected
        Source: ViKing-R2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: Binary string: wkernel32.pdb source: ViKing-R2.exe, 00000000.00000003.2312707983.0000000001508000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wkernelbase.pdb source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2217130178.0000000002DB6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Users\Terod\Documents\d2\Win7Debug\TLibShield64.pdb source: ViKing-R2.exe
        Source: Binary string: wntdll.pdb source: ViKing-R2.exe, 00000000.00000003.2217130178.0000000002DB6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Users\Terod\Documents\d2\Win7Debug\TLibShield32.pdb source: ViKing-R2.exe
        Source: Binary string: E:\OSP\Windows-driver-samples-master\general\obcallback\control\Release\TLibShieldCtrl.pdbf source: ViKing-R2.exe
        Source: Binary string: wuser32.pdb source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: E:\OSP\Windows-driver-samples-master\general\obcallback\control\Release\TLibShieldCtrl.pdb source: ViKing-R2.exe
        Source: Binary string: wkernelbase.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wkernel32.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2312707983.0000000001508000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wuser32.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmp

        Networking

        barindex
        Source: TrafficSnort IDS: 2830033 ETPRO TROJAN Win32/Agent.xxxyeb Connectivity Check 192.168.2.5:49712 -> 103.235.47.188:80
        Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
        Source: Joe Sandbox ViewASN Name: BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd
        Source: global trafficHTTP traffic detected: GET /ipJson.jsp HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: whois.pconline.com.cnCache-Control: no-cache
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: testHost: www.baidu.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /ipJson.jsp HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: whois.pconline.com.cnCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: www.baidu.com
        Source: global trafficDNS traffic detected: DNS query: whois.pconline.com.cn
        Source: ViKing-R2.exeString found in binary or memory: http://.https
        Source: ViKing-R2.exeString found in binary or memory: http://api.ip138.com/ip/?token=
        Source: ViKing-R2.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
        Source: ViKing-R2.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
        Source: ViKing-R2.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
        Source: ViKing-R2.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: ViKing-R2.exeString found in binary or memory: http://crl.thawte.com/ThawtePCA.crl0
        Source: ViKing-R2.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
        Source: ViKing-R2.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
        Source: ViKing-R2.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: ViKing-R2.exeString found in binary or memory: http://ocsp.comodoca.com0
        Source: ViKing-R2.exeString found in binary or memory: http://ocsp.sectigo.com0
        Source: ViKing-R2.exeString found in binary or memory: http://ocsp.sectigo.com00
        Source: ViKing-R2.exeString found in binary or memory: http://ocsp.thawte.com0
        Source: ViKing-R2.exeString found in binary or memory: http://th.symcb.com/th.crl0
        Source: ViKing-R2.exeString found in binary or memory: http://th.symcb.com/th.crt0
        Source: ViKing-R2.exeString found in binary or memory: http://th.symcd.com0&
        Source: ViKing-R2.exe, 00000000.00000003.2537778812.00000000010F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://whois.pconline.com.cn/
        Source: ViKing-R2.exe, 00000000.00000003.2537778812.00000000010F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://whois.pconline.com.cn/Y
        Source: ViKing-R2.exeString found in binary or memory: http://whois.pconline.com.cn/ipJson.jsp
        Source: ViKing-R2.exeString found in binary or memory: http://www.adeds.com
        Source: ViKing-R2.exeString found in binary or memory: https://2023.ipchaxun.com/
        Source: ViKing-R2.exeString found in binary or memory: https://api.ip138.com/ip/?token=
        Source: ViKing-R2.exeString found in binary or memory: https://api.ip138.com/ip/?token=http://api.ip138.com/ip/?token=retokip
        Source: ViKing-R2.exeString found in binary or memory: https://searchplugin.csdn.net/api/v1/ip/get
        Source: ViKing-R2.exeString found in binary or memory: https://searchplugin.csdn.net/api/v1/ip/getaddress:----
        Source: ViKing-R2.exeString found in binary or memory: https://sectigo.com/CPS0
        Source: ViKing-R2.exeString found in binary or memory: https://www.adeds.com
        Source: ViKing-R2.exeString found in binary or memory: https://www.thawte.com/cps0/
        Source: ViKing-R2.exeString found in binary or memory: https://www.thawte.com/repository0
        Source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_8e4265c0-f
        Source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_c576141b-f
        Source: Yara matchFile source: ViKing-R2.exe, type: SAMPLE
        Source: Yara matchFile source: 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ViKing-R2.exe PID: 1812, type: MEMORYSTR

        System Summary

        barindex
        Source: ViKing-R2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess Stats: CPU usage > 49%
        Source: libCzf.dll.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: ViKing-R2.exe, 00000000.00000003.2217130178.0000000002ED9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUpdaterHelper_.exe< vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebszip.dll" vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLZMA.dll, vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.00000000039FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.00000000039FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWXOnlineHooker.exe vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.0000000003C7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIATHook.dll vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.0000000000960000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2312707983.000000000159A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000001.2106476473.0000000000940000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIATHook.dll vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000001.2106476473.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUpdaterHelper_.exe< vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000001.2106476473.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebszip.dll" vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000001.2106476473.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLZMA.dll, vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000001.2106476473.0000000000A5B000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.00000000006C2000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000000.2105578806.00000000006C2000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWXOnlineHooker.exe vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.0000000003D98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdaterHelper_.exe< vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.0000000003D98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebszip.dll" vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.0000000003D98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLZMA.dll, vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.0000000003D98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2449806806.0000000003C9D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2312707983.0000000001508000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs ViKing-R2.exe
        Source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuser32j% vs ViKing-R2.exe
        Source: ViKing-R2.exeBinary or memory string: OriginalFilename$ vs ViKing-R2.exe
        Source: ViKing-R2.exeBinary or memory string: OriginalFilenameWXOnlineHooker.exe vs ViKing-R2.exe
        Source: ViKing-R2.exeBinary or memory string: OriginalFilenameIATHook.dll vs ViKing-R2.exe
        Source: ViKing-R2.exeBinary or memory string: OriginalFilenameUpdaterHelper_.exe< vs ViKing-R2.exe
        Source: ViKing-R2.exeBinary or memory string: OriginalFilenamebszip.dll" vs ViKing-R2.exe
        Source: ViKing-R2.exeBinary or memory string: OriginalFilenameLZMA.dll, vs ViKing-R2.exe
        Source: ViKing-R2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: ViKing-R2.exeBinary string: H:\Device\HarddiskVolume6G:\Device\HarddiskVolume5F:\Device\HarddiskVolume4E:\Device\HarddiskVolume3D:\Device\HarddiskVolume2C:\Device\HarddiskVolume1Q@@@
        Source: ViKing-R2.exeBinary string: \Device\TLibShield\DosDevices\TLibShieldTLibShield: Installing
        Source: ViKing-R2.exeBinary string: \Device\HarddiskVolume6
        Source: ViKing-R2.exeBinary string: \Device\HarddiskVolume5
        Source: ViKing-R2.exeBinary string: \Device\HarddiskVolume4
        Source: ViKing-R2.exeBinary string: \Device\HarddiskVolume3
        Source: ViKing-R2.exeBinary string: \Device\HarddiskVolume2
        Source: ViKing-R2.exeBinary string: \Device\HarddiskVolume1
        Source: ViKing-R2.exeBinary string: \Device\TLibShield
        Source: classification engineClassification label: mal96.evad.winEXE@1/1@2/2
        Source: C:\Users\user\Desktop\ViKing-R2.exeFile created: C:\Users\user\Desktop\libCzf.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: ViKing-R2.exeVirustotal: Detection: 45%
        Source: ViKing-R2.exeString found in binary or memory: TLibShieldCtrl.exe -install -name NameofExe -reject NameofExe -uninstall -deprotect [-?]
        Source: ViKing-R2.exeString found in binary or memory: -install install driver
        Source: ViKing-R2.exeString found in binary or memory: Unknown exceptionbad array new lengthbad caststring too longinvalid stoi argumentstoi argument out of range(unknown)(unknown source location):%ld in function ': iostreamsystem:%dUnknown error (%d)std:unknownUnknown interop error %dbad locale nameios_base::badbit setios_base::failbit setios_base::eofbit setstd: [ at ]No message text available for error %dasio.miscAlready openEnd of fileElement not foundThe descriptor does not fit into the select call's fd_setasio.misc errortsswinsockUsage: TLibShieldCtrl.exe -install -name NameofExe -reject NameofExe -uninstall -deprotect [-?] -install install driver -uninstall uninstall driver -name NameofExe protect/filter access to NameofExe -reject NameofExe prevents execution of NameofExe -deprotect unprotect/unfilter-iCALL POSE:\OSP\Windows-driver-samples-master\general\obcallback\control\main.cpp %d
        Source: ViKing-R2.exeString found in binary or memory: PCAUTODROP.BIN -addr=%s -port=%d -guid=%s -type=%d
        Source: ViKing-R2.exeString found in binary or memory: PCAUTODROP.BIN -addr=%s -port=%d -guid=%s -type=%dPCAUTODROP.BIN
        Source: ViKing-R2.exeString found in binary or memory: -addr
        Source: ViKing-R2.exeString found in binary or memory: <http://www.adeds.com - QQ:778716166> =-addr-port-guid-type127.0.0.1{1268EEDD-41FE-4e88-B5CE-33D2E1692024}
        Source: C:\Users\user\Desktop\ViKing-R2.exeFile read: C:\Users\user\Desktop\ViKing-R2.exeJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: oledlg.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: ext-ms-win-gdi-desktop-l1-1-0.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeSection loaded: olepro32.dllJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: ViKing-R2.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: ViKing-R2.exeStatic file information: File size 12681216 > 1048576
        Source: ViKing-R2.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xb0b000
        Source: ViKing-R2.exeStatic PE information: Raw size of .sedata is bigger than: 0x100000 < 0x106000
        Source: Binary string: wkernel32.pdb source: ViKing-R2.exe, 00000000.00000003.2312707983.0000000001508000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wkernelbase.pdb source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2217130178.0000000002DB6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Users\Terod\Documents\d2\Win7Debug\TLibShield64.pdb source: ViKing-R2.exe
        Source: Binary string: wntdll.pdb source: ViKing-R2.exe, 00000000.00000003.2217130178.0000000002DB6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Users\Terod\Documents\d2\Win7Debug\TLibShield32.pdb source: ViKing-R2.exe
        Source: Binary string: E:\OSP\Windows-driver-samples-master\general\obcallback\control\Release\TLibShieldCtrl.pdbf source: ViKing-R2.exe
        Source: Binary string: wuser32.pdb source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: E:\OSP\Windows-driver-samples-master\general\obcallback\control\Release\TLibShieldCtrl.pdb source: ViKing-R2.exe
        Source: Binary string: wkernelbase.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wkernel32.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2312707983.0000000001508000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wuser32.pdbUGP source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmp
        Source: initial sampleStatic PE information: section where entry point is pointing to: .sedata
        Source: libCzf.dll.0.drStatic PE information: real checksum: 0x12096 should be: 0x1ec26
        Source: ViKing-R2.exeStatic PE information: section name: .sedata
        Source: ViKing-R2.exeStatic PE information: section name: .sedata
        Source: ViKing-R2.exeStatic PE information: section name: .sedata entropy: 7.459508118890517
        Source: C:\Users\user\Desktop\ViKing-R2.exeFile created: C:\Users\user\Desktop\libCzf.dllJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow searched: window name: RegmonclassJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow searched: window name: FilemonclassJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow searched: window name: FilemonclassJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\ViKing-R2.exeAPI/Special instruction interceptor: Address: F37685
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F2A9B4 second address: F2AA9C instructions: 0x00000000 rdtsc 0x00000002 mov edx, ebx 0x00000004 jmp 00007F1C39389402h 0x00000006 lea eax, dword ptr [00000000h+eax*4] 0x0000000d setnb cl 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 jmp 00007F1C393893DAh 0x00000019 cmc 0x0000001a jmp 00007F1C39389476h 0x0000001c mov ah, byte ptr [esp] 0x0000001f lea esp, dword ptr [esp+20h] 0x00000023 dec esi 0x00000024 not ecx 0x00000026 lea edx, dword ptr [edi+ebp] 0x00000029 jmp 00007F1C3938942Dh 0x0000002b setle dl 0x0000002e bt eax, eax 0x00000031 jc 00007F1C39389485h 0x00000033 push esp 0x00000034 pop word ptr [esp] 0x00000038 mov dx, word ptr [esp+01h] 0x0000003d xchg word ptr [esp], ax 0x00000041 lea esp, dword ptr [esp+02h] 0x00000045 call 00007F1C393895B3h 0x0000004a shr eax, 1Fh 0x0000004d add ecx, 9BD8A65Eh 0x00000053 xchg cx, ax 0x00000056 mov dx, B974h 0x0000005a mov ah, byte ptr [esp] 0x0000005d jmp 00007F1C3938940Fh 0x0000005f xchg dword ptr [esp], ebx 0x00000062 push ebp 0x00000063 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F35619 second address: F36692 instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [esp+1Ch], edi 0x00000006 lea ecx, dword ptr [ecx+edi] 0x00000009 jmp 00007F1C395684BDh 0x0000000b mov cx, dx 0x0000000e lea ecx, dword ptr [edx+ebx] 0x00000011 popad 0x00000012 mov dword ptr [eax], edx 0x00000014 bsf cx, sp 0x00000018 js 00007F1C395683EBh 0x0000001a jns 00007F1C39568477h 0x0000001c mov ax, E463h 0x00000020 mov cl, byte ptr [esp] 0x00000023 neg eax 0x00000025 call 00007F1C395693B6h 0x0000002a rcl edx, 00000000h 0x0000002d mov eax, dword ptr [esp] 0x00000030 jmp 00007F1C3956845Ah 0x00000032 lea ecx, dword ptr [esp+00006F25h] 0x00000039 bt ax, dx 0x0000003d xchg dword ptr [esp], esi 0x00000040 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F3781C second address: F378CC instructions: 0x00000000 rdtsc 0x00000002 mov cl, dh 0x00000004 mov dl, byte ptr [esp] 0x00000007 jmp 00007F1C393894A3h 0x00000009 mov esi, dword ptr [edi] 0x0000000b neg ecx 0x0000000d je 00007F1C39389436h 0x0000000f lea edx, dword ptr [00000000h+eax*4] 0x00000016 mov dh, 8Eh 0x00000018 jmp 00007F1C3938946Ch 0x0000001a add edi, 04h 0x0000001d mov cx, word ptr [esp] 0x00000021 mov edx, FE7663B8h 0x00000026 jmp 00007F1C3938942Ah 0x00000028 xchg ah, dh 0x0000002a mov ah, bl 0x0000002c jmp 00007F1C393894E5h 0x00000031 mov cl, D4h 0x00000033 lea eax, dword ptr [ecx-000060CCh] 0x00000039 call 00007F1C3938940Ah 0x0000003e mov ecx, 5B6801A9h 0x00000043 mov dword ptr [esp], ebx 0x00000046 clc 0x00000047 jmp 00007F1C3938946Ch 0x00000049 jns 00007F1C39389415h 0x0000004b rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F378CC second address: F378CE instructions: 0x00000000 rdtsc 0x00000002 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F427C8 second address: F428E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C39389463h 0x00000004 dec esi 0x00000005 btc eax, edi 0x00000008 jmp 00007F1C39389499h 0x0000000a jo 00007F1C3938940Dh 0x0000000c mov dh, ch 0x0000000e mov ax, word ptr [esp] 0x00000012 jmp 00007F1C39389432h 0x00000014 mov ax, dx 0x00000017 sub esp, 0Bh 0x0000001a mov dl, byte ptr [esp+06h] 0x0000001e jmp 00007F1C39389429h 0x00000020 sub esp, 02h 0x00000023 jmp 00007F1C39389507h 0x00000028 bsf dx, dx 0x0000002c jns 00007F1C393893E5h 0x0000002e pop dx 0x00000030 sub esp, 1Ch 0x00000033 jmp 00007F1C39389435h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 jmp 00007F1C3938947Fh 0x0000003b rol cl, 00000000h 0x0000003e xor edx, 46F3B00Ah 0x00000044 jnbe 00007F1C39389431h 0x00000046 setb dl 0x00000049 jmp 00007F1C3938948Dh 0x0000004b mov ax, di 0x0000004e sub esp, 12h 0x00000051 lea edx, dword ptr [00000000h+edx*4] 0x00000058 jmp 00007F1C3938948Ah 0x0000005a mov byte ptr [esp+0Dh], ch 0x0000005e xchg ax, dx 0x00000060 lea esp, dword ptr [esp+02h] 0x00000064 lea esp, dword ptr [esp+34h] 0x00000068 jmp 00007F1C3938942Ch 0x0000006a sub cl, FFFFFF9Ch 0x0000006d bsr eax, ecx 0x00000070 jno 00007F1C39389470h 0x00000072 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F428E8 second address: F42931 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ebp-00008B49h] 0x00000008 jmp 00007F1C39568793h 0x0000000d neg dl 0x0000000f lea edx, dword ptr [eax+ebx] 0x00000012 neg cl 0x00000014 jmp 00007F1C39568338h 0x00000019 xor dx, 6196h 0x0000001e jng 00007F1C395682FBh 0x00000024 setne al 0x00000027 push esp 0x00000028 push dword ptr [esp+02h] 0x0000002c xchg byte ptr [esp+05h], al 0x00000030 mov dx, FDC8h 0x00000034 jmp 00007F1C3956820Eh 0x00000039 lea esp, dword ptr [esp+08h] 0x0000003d neg cl 0x0000003f rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F2800E second address: F28095 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [ebx+esi] 0x00000005 adc dh, bh 0x00000007 jnbe 00007F1C39389428h 0x00000009 jmp 00007F1C3938949Ah 0x0000000b dec eax 0x0000000c sub esp, 08h 0x0000000f push dword ptr [esp+06h] 0x00000013 jmp 00007F1C39389400h 0x00000015 pop dword ptr [esp+01h] 0x00000019 pop word ptr [esp+02h] 0x0000001e setnle ah 0x00000021 lea esp, dword ptr [esp+02h] 0x00000025 jmp 00007F1C393894C1h 0x00000027 lea esp, dword ptr [esp+04h] 0x0000002b xor ebp, 7F5A9E0Eh 0x00000031 not ch 0x00000033 sub ecx, 8F082D72h 0x00000039 jbe 00007F1C39389428h 0x0000003b lea eax, dword ptr [eax+eax] 0x0000003e neg ax 0x00000041 setnle dl 0x00000044 dec dh 0x00000046 not ch 0x00000048 jmp 00007F1C39389494h 0x0000004a dec ebp 0x0000004b jmp 00007F1C39389423h 0x0000004d inc cx 0x0000004f jnl 00007F1C39389438h 0x00000051 not ah 0x00000053 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F34550 second address: F345B5 instructions: 0x00000000 rdtsc 0x00000002 bswap edx 0x00000004 call 00007F1C39568446h 0x00000009 setl ah 0x0000000c xchg eax, edx 0x0000000d mov al, byte ptr [esp] 0x00000010 mov dh, bh 0x00000012 xchg dword ptr [esp], ecx 0x00000015 jmp 00007F1C395684A8h 0x00000017 not edx 0x00000019 pushfd 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e mov edx, dword ptr [esp] 0x00000021 mov dh, dl 0x00000023 lea esp, dword ptr [esp+02h] 0x00000027 jmp 00007F1C39568401h 0x00000029 lea ecx, dword ptr [ecx-00000025h] 0x0000002f bsf eax, ebp 0x00000032 lea eax, dword ptr [00000000h+ebp*4] 0x00000039 xchg dword ptr [esp], ecx 0x0000003c mov edx, dword ptr [esp] 0x0000003f rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F345B5 second address: F346A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C39389422h 0x00000004 bsr dx, sp 0x00000008 mov al, dh 0x0000000a push dword ptr [esp] 0x0000000d retn 0004h 0x00000010 bsf dx, si 0x00000014 xchg dword ptr [esp+08h], eax 0x00000018 jmp 00007F1C3938950Fh 0x0000001d mov ax, word ptr [esp+1Fh] 0x00000022 jmp 00007F1C39389430h 0x00000024 cmc 0x00000025 rol ecx, 00000000h 0x00000028 bswap edx 0x0000002a mov eax, 595FFF3Bh 0x0000002f lea edx, dword ptr [00000000h+ecx*4] 0x00000036 jmp 00007F1C39389460h 0x00000038 mov dword ptr [edi], ecx 0x0000003a mov eax, dword ptr [esp] 0x0000003d mov ecx, CEC89CB5h 0x00000042 mov cl, byte ptr [esp] 0x00000045 jmp 00007F1C393894E2h 0x0000004a rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F368B9 second address: F36BB6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C39568420h 0x00000004 mov al, byte ptr [esp] 0x00000007 jmp 00007F1C3956845Fh 0x00000009 add edi, 04h 0x0000000c bsf cx, ax 0x00000010 jp 00007F1C39568ED3h 0x00000016 lea eax, dword ptr [edi+00000548h] 0x0000001c jmp 00007F1C39567C99h 0x00000021 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F39806 second address: F2800E instructions: 0x00000000 rdtsc 0x00000002 mov dx, 2C96h 0x00000006 mov ch, bl 0x00000008 jmp 00007F1C3938B25Ah 0x0000000d xchg dword ptr [esp], eax 0x00000010 cmp ecx, 2F7A7201h 0x00000016 mov edx, dword ptr [esp] 0x00000019 xchg dl, ch 0x0000001b dec edx 0x0000001c mov cl, 24h 0x0000001e jmp 00007F1C393877DAh 0x00000023 lea eax, dword ptr [eax+01h] 0x00000026 rol ecx, cl 0x00000028 xchg ecx, edx 0x0000002a mov edx, ebx 0x0000002c xchg dword ptr [esp], eax 0x0000002f sub esp, 1Ch 0x00000032 jmp 00007F1C393893CDh 0x00000037 bswap eax 0x00000039 dec edx 0x0000003a pop dx 0x0000003c add esp, 16h 0x0000003f push dword ptr [esp+04h] 0x00000043 retn 0008h 0x00000046 inc cx 0x00000048 jno 00007F1C39389585h 0x0000004e jmp 00007F1C3938941Eh 0x00000050 xchg ax, cx 0x00000052 jmp 00007F1C39377BD4h 0x00000057 mov ebx, ebp 0x00000059 jmp 00007F1C39389400h 0x0000005b sets cl 0x0000005e mov ch, byte ptr [esp] 0x00000061 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F37599 second address: F37685 instructions: 0x00000000 rdtsc 0x00000002 mov dx, 87B0h 0x00000006 jmp 00007F1C39568475h 0x00000008 mov dx, word ptr [esp] 0x0000000c jmp 00007F1C39568509h 0x00000011 mov dx, 57B4h 0x00000015 mov cx, word ptr [esp] 0x00000019 lea ebp, dword ptr [00000000h+ecx*4] 0x00000020 mov ebp, dword ptr [esp] 0x00000023 mov cx, DB09h 0x00000027 jmp 00007F1C395683C4h 0x00000029 mov dx, ax 0x0000002c dec dh 0x0000002e jbe 00007F1C39568425h 0x00000030 mov ax, 646Ah 0x00000034 jmp 00007F1C3956845Dh 0x00000036 lea esp, dword ptr [esp+04h] 0x0000003a push ebx 0x0000003b push word ptr [esp+02h] 0x00000040 jmp 00007F1C3956841Bh 0x00000042 dec ecx 0x00000043 jmp 00007F1C3956847Ch 0x00000045 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F37685 second address: F3764F instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 add esp, 04h 0x00000009 jp 00007F1C3938940Dh 0x0000000b jnp 00007F1C3938940Bh 0x0000000d jmp 00007F1C39389474h 0x0000000f mov ebx, dword ptr [esp] 0x00000012 not si 0x00000015 not esi 0x00000017 lea esp, dword ptr [esp+04h] 0x0000001b mov dh, ah 0x0000001d jmp 00007F1C39389420h 0x0000001f mov ch, CDh 0x00000021 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F3764F second address: F2800E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C395684BEh 0x00000004 pop esi 0x00000005 jmp 00007F1C39558DC6h 0x0000000a mov ebx, ebp 0x0000000c jmp 00007F1C395683F0h 0x0000000e sets cl 0x00000011 mov ch, byte ptr [esp] 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F72D2A second address: F72D49 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C39389466h 0x00000004 lea edx, dword ptr [00000000h+eax*4] 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F72D49 second address: F72EF7 instructions: 0x00000000 rdtsc 0x00000002 mov dx, word ptr [esp] 0x00000006 mov edx, 8DD8D877h 0x0000000b xchg dword ptr [esp+24h], ebp 0x0000000f jmp 00007F1C39568475h 0x00000011 or edx, C95B0182h 0x00000017 mov dx, 3462h 0x0000001b cmp ax, cx 0x0000001e mov dx, word ptr [esp] 0x00000022 push dword ptr [esp+24h] 0x00000026 retn 0028h 0x00000029 lea edx, dword ptr [00000000h+edi*4] 0x00000030 call 00007F1C395684F3h 0x00000035 lea eax, dword ptr [00000000h+eax*4] 0x0000003c not ax 0x0000003f mov eax, dword ptr [esp] 0x00000042 xchg dh, dl 0x00000044 xchg dword ptr [esp], ecx 0x00000047 jmp 00007F1C395683FCh 0x00000049 xchg al, ah 0x0000004b not ah 0x0000004d bt dx, ax 0x00000051 bsr dx, cx 0x00000055 lea ecx, dword ptr [ecx+0Ah] 0x00000058 mov eax, 2F6AAD75h 0x0000005d jmp 00007F1C39568405h 0x0000005f not edx 0x00000061 mov al, ch 0x00000063 bsr edx, esp 0x00000066 xchg dword ptr [esp], ecx 0x00000069 sets al 0x0000006c lea edx, dword ptr [esp+edx] 0x0000006f jmp 00007F1C3956846Dh 0x00000071 adc ax, 0000576Bh 0x00000075 push dword ptr [esp] 0x00000078 retn 0004h 0x0000007b mov ah, bh 0x0000007d jmp 00007F1C395685BBh 0x00000082 mov word ptr [edi], cx 0x00000085 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F574E4 second address: F346A1 instructions: 0x00000000 rdtsc 0x00000002 mov edx, dword ptr [esp] 0x00000005 jmp 00007F1C39389430h 0x00000007 neg dx 0x0000000a jno 00007F1C39389488h 0x0000000c mov ecx, edi 0x0000000e mov edi, dword ptr [ecx] 0x00000010 jmp 00007F1C393665E9h 0x00000015 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F36852 second address: F36BB6 instructions: 0x00000000 rdtsc 0x00000002 mov al, byte ptr [esp] 0x00000005 jmp 00007F1C395684A6h 0x00000007 add edi, 04h 0x0000000a bsf cx, ax 0x0000000e jp 00007F1C39568ED3h 0x00000014 lea eax, dword ptr [edi+00000548h] 0x0000001a jmp 00007F1C39567C99h 0x0000001f rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F27B51 second address: F2800E instructions: 0x00000000 rdtsc 0x00000002 lea esi, dword ptr [esp+ebx] 0x00000005 mov ebp, dword ptr [esp] 0x00000008 bswap eax 0x0000000a jmp 00007F1C39389456h 0x0000000c mov ebp, dword ptr [esp+2Ch] 0x00000010 lea esi, dword ptr [00000000h+eax*4] 0x00000017 mov dh, B5h 0x00000019 mov eax, ebp 0x0000001b call 00007F1C3938947Bh 0x00000020 jmp 00007F1C39389438h 0x00000022 lea edi, dword ptr [esp+04h] 0x00000026 cmc 0x00000027 jns 00007F1C3938947Eh 0x00000029 xchg ebx, edx 0x0000002b bswap eax 0x0000002d sub esp, 000000BCh 0x00000033 mov esi, esp 0x00000035 mov al, byte ptr [esp] 0x00000038 jmp 00007F1C39389456h 0x0000003a lea ebx, dword ptr [00000000h+esi*4] 0x00000041 neg edx 0x00000043 ja 00007F1C393898CFh 0x00000049 mov bh, byte ptr [esp] 0x0000004c jmp 00007F1C393898C9h 0x00000051 mov ebx, ebp 0x00000053 jmp 00007F1C39389400h 0x00000055 sets cl 0x00000058 mov ch, byte ptr [esp] 0x0000005b rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F34512 second address: F346A1 instructions: 0x00000000 rdtsc 0x00000002 bswap edx 0x00000004 bsf dx, si 0x00000008 xchg dword ptr [esp+08h], eax 0x0000000c mov ax, word ptr [esp+1Fh] 0x00000011 jmp 00007F1C395684FDh 0x00000016 cmc 0x00000017 rol ecx, 00000000h 0x0000001a bswap edx 0x0000001c mov eax, 595FFF3Bh 0x00000021 lea edx, dword ptr [00000000h+ecx*4] 0x00000028 jmp 00007F1C39568450h 0x0000002a mov dword ptr [edi], ecx 0x0000002c mov eax, dword ptr [esp] 0x0000002f mov ecx, CEC89CB5h 0x00000034 mov cl, byte ptr [esp] 0x00000037 jmp 00007F1C395684D2h 0x0000003c rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F657CE second address: F657E7 instructions: 0x00000000 rdtsc 0x00000002 mov dx, sp 0x00000005 lea eax, dword ptr [00000000h+eax*4] 0x0000000c jmp 00007F1C3938946Eh 0x0000000e xchg dword ptr [esp], edx 0x00000011 mov ah, byte ptr [esp] 0x00000014 push si 0x00000016 xchg cx, ax 0x00000019 mov cx, 107Fh 0x0000001d xchg word ptr [esp], cx 0x00000021 jmp 00007F1C39389486h 0x00000023 lea esp, dword ptr [esp+02h] 0x00000027 lea edx, dword ptr [edx+54h] 0x0000002a setnp cl 0x0000002d bswap eax 0x0000002f lea eax, dword ptr [00000000h+ebx*4] 0x00000036 mov cx, dx 0x00000039 jmp 00007F1C39389424h 0x0000003b bswap ecx 0x0000003d xchg dword ptr [esp], edx 0x00000040 lea eax, dword ptr [00000000h+edx*4] 0x00000047 lea eax, dword ptr [edx+ebx] 0x0000004a jmp 00007F1C39389485h 0x0000004c mov edx, 65381AEFh 0x00000051 call 00007F1C39389435h 0x00000056 lea eax, dword ptr [00000000h+edx*4] 0x0000005d push dword ptr [esp+04h] 0x00000061 retn 0008h 0x00000064 pop dword ptr [edi] 0x00000066 setb ch 0x00000069 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F72ECC second address: F72ED6 instructions: 0x00000000 rdtsc 0x00000002 mov edx, eax 0x00000004 jmp 00007F1C39568446h 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F83EC9 second address: F346A1 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 08h 0x00000005 jnbe 00007F1C3938942Fh 0x00000007 mov byte ptr [esp+05h], al 0x0000000b jmp 00007F1C393894A0h 0x0000000d sub edi, 08h 0x00000010 stc 0x00000011 jne 00007F1C393893FEh 0x00000013 push eax 0x00000014 jmp 00007F1C39389472h 0x00000016 pop word ptr [esp] 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e xchg edx, ecx 0x00000020 jmp 00007F1C39389456h 0x00000022 push bx 0x00000024 pushfd 0x00000025 lea esp, dword ptr [esp] 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007F1C39389488h 0x0000002e mov dword ptr [edi], ecx 0x00000030 dec ecx 0x00000031 jno 00007F1C39389437h 0x00000033 setnle cl 0x00000036 jmp 00007F1C39389487h 0x00000038 bswap ecx 0x0000003a mov cx, word ptr [esp] 0x0000003e mov dword ptr [edi+04h], eax 0x00000041 jmp 00007F1C393895C8h 0x00000046 clc 0x00000047 jnl 00007F1C39389341h 0x0000004d rcl ecx, cl 0x0000004f ror al, cl 0x00000051 jmp 00007F1C39339B2Eh 0x00000056 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F6F66D second address: F6F66F instructions: 0x00000000 rdtsc 0x00000002 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F8ECF9 second address: F8EDC3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C39389511h 0x00000007 not eax 0x00000009 mov edx, edi 0x0000000b mov cx, word ptr [edx] 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: FAC844 second address: FAC875 instructions: 0x00000000 rdtsc 0x00000002 not ecx 0x00000004 jmp 00007F1C3956846Ah 0x00000006 sub edi, 02h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F322B8 second address: F322BA instructions: 0x00000000 rdtsc 0x00000002 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: F0C0EA second address: F0C135 instructions: 0x00000000 rdtsc 0x00000002 mov byte ptr [esp+02h], dh 0x00000006 xchg dword ptr [esp+04h], ebp 0x0000000a jmp 00007F1C3956847Eh 0x0000000c mov ecx, dword ptr [esp] 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeRDTSC instruction interceptor: First address: FF7E17 second address: FF7DB4 instructions: 0x00000000 rdtsc 0x00000002 xchg dx, ax 0x00000005 mov ah, EEh 0x00000007 lea edx, dword ptr [ebx+ebp] 0x0000000a not ah 0x0000000c jmp 00007F1C393893D6h 0x0000000e mov ch, byte ptr [esp] 0x00000011 mov dx, DB0Bh 0x00000015 mov ecx, dword ptr [esp+04h] 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow / User API: threadDelayed 723Jump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow / User API: threadDelayed 712Jump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow / User API: threadDelayed 795Jump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow / User API: threadDelayed 752Jump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeWindow / User API: threadDelayed 858Jump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeDropped PE file which has not been started: C:\Users\user\Desktop\libCzf.dllJump to dropped file
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 1576Thread sleep time: -1446000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 4080Thread sleep time: -1424000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 5636Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 6340Thread sleep time: -252000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 2820Thread sleep time: -1590000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 5456Thread sleep time: -80000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 6592Thread sleep time: -1504000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exe TID: 4292Thread sleep time: -1716000s >= -30000sJump to behavior
        Source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
        Source: ViKing-R2.exe, 00000000.00000003.2537778812.00000000010F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: ViKing-R2.exe, 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
        Source: ViKing-R2.exe, 00000000.00000003.2537778812.00000000010F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeOpen window title or class name: regmonclass
        Source: C:\Users\user\Desktop\ViKing-R2.exeOpen window title or class name: filemonclass
        Source: C:\Users\user\Desktop\ViKing-R2.exeFile opened: NTICE
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\ViKing-R2.exeProcess token adjusted: DebugJump to behavior
        Source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
        Source: ViKing-R2.exe, 00000000.00000003.2359095459.0000000003120000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        Process Injection
        1
        Masquerading
        21
        Input Capture
        621
        Security Software Discovery
        Remote Services21
        Input Capture
        1
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        23
        Virtualization/Sandbox Evasion
        LSASS Memory23
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive12
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Software Packing
        LSA Secrets21
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ViKing-R2.exe46%VirustotalBrowse
        ViKing-R2.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\Desktop\libCzf.dll33%ReversingLabsWin32.Adware.Amonetize
        C:\Users\user\Desktop\libCzf.dll14%VirustotalBrowse
        No Antivirus matches
        SourceDetectionScannerLabelLink
        www.wshifen.com0%VirustotalBrowse
        whois.pconline.com.cn.ctadns.cn1%VirustotalBrowse
        whois.pconline.com.cn0%VirustotalBrowse
        www.baidu.com1%VirustotalBrowse
        SourceDetectionScannerLabelLink
        https://sectigo.com/CPS00%URL Reputationsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://ocsp.thawte.com00%URL Reputationsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        https://www.thawte.com/cps0/0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        https://api.ip138.com/ip/?token=http://api.ip138.com/ip/?token=retokip0%Avira URL Cloudsafe
        http://ocsp.sectigo.com000%Avira URL Cloudsafe
        http://.https0%Avira URL Cloudsafe
        http://whois.pconline.com.cn/ipJson.jsp0%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%Avira URL Cloudsafe
        http://whois.pconline.com.cn/0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%Avira URL Cloudsafe
        https://2023.ipchaxun.com/0%Avira URL Cloudsafe
        https://api.ip138.com/ip/?token=http://api.ip138.com/ip/?token=retokip0%VirustotalBrowse
        http://whois.pconline.com.cn/ipJson.jsp0%VirustotalBrowse
        http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%VirustotalBrowse
        https://api.ip138.com/ip/?token=0%Avira URL Cloudsafe
        https://searchplugin.csdn.net/api/v1/ip/get0%Avira URL Cloudsafe
        https://www.adeds.com0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%VirustotalBrowse
        https://2023.ipchaxun.com/0%VirustotalBrowse
        http://www.baidu.com/0%Avira URL Cloudsafe
        https://api.ip138.com/ip/?token=0%VirustotalBrowse
        http://whois.pconline.com.cn/0%VirustotalBrowse
        http://crl.thawte.com/ThawtePCA.crl00%Avira URL Cloudsafe
        http://whois.pconline.com.cn/Y0%Avira URL Cloudsafe
        https://www.adeds.com0%VirustotalBrowse
        https://searchplugin.csdn.net/api/v1/ip/get0%VirustotalBrowse
        http://api.ip138.com/ip/?token=0%Avira URL Cloudsafe
        http://www.adeds.com0%Avira URL Cloudsafe
        http://crl.thawte.com/ThawtePCA.crl00%VirustotalBrowse
        https://searchplugin.csdn.net/api/v1/ip/getaddress:----0%Avira URL Cloudsafe
        https://www.thawte.com/repository00%Avira URL Cloudsafe
        https://www.thawte.com/repository00%VirustotalBrowse
        http://whois.pconline.com.cn/Y0%VirustotalBrowse
        https://searchplugin.csdn.net/api/v1/ip/getaddress:----0%VirustotalBrowse
        http://www.adeds.com0%VirustotalBrowse
        http://www.baidu.com/1%VirustotalBrowse
        http://api.ip138.com/ip/?token=0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        www.wshifen.com
        103.235.47.188
        truetrueunknown
        whois.pconline.com.cn.ctadns.cn
        14.29.101.160
        truefalseunknown
        whois.pconline.com.cn
        unknown
        unknownfalseunknown
        www.baidu.com
        unknown
        unknownfalseunknown
        NameMaliciousAntivirus DetectionReputation
        http://whois.pconline.com.cn/ipJson.jspfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.baidu.com/true
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://ocsp.sectigo.com00ViKing-R2.exefalse
        • Avira URL Cloud: safe
        unknown
        https://api.ip138.com/ip/?token=http://api.ip138.com/ip/?token=retokipViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://sectigo.com/CPS0ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        http://.httpsViKing-R2.exefalse
        • Avira URL Cloud: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com0ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        http://ocsp.thawte.com0ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        http://whois.pconline.com.cn/ViKing-R2.exe, 00000000.00000003.2537778812.00000000010F2000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://2023.ipchaxun.com/ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://api.ip138.com/ip/?token=ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://searchplugin.csdn.net/api/v1/ip/getViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        https://www.adeds.comViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        https://www.thawte.com/cps0/ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        http://crl.thawte.com/ThawtePCA.crl0ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://whois.pconline.com.cn/YViKing-R2.exe, 00000000.00000003.2537778812.00000000010F2000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.adeds.comViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#ViKing-R2.exefalse
        • URL Reputation: safe
        unknown
        http://api.ip138.com/ip/?token=ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://www.thawte.com/repository0ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://searchplugin.csdn.net/api/v1/ip/getaddress:----ViKing-R2.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        103.235.47.188
        www.wshifen.comHong Kong
        55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdtrue
        14.29.101.160
        whois.pconline.com.cn.ctadns.cnChina
        58466CT-GUANGZHOU-IDCCHINANETGuangdongprovincenetworkCNfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1467980
        Start date and time:2024-07-05 08:06:04 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 27s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Sample name:ViKing-R2.exe
        Detection:MAL
        Classification:mal96.evad.winEXE@1/1@2/2
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        02:08:10API Interceptor5047x Sleep call for process: ViKing-R2.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        103.235.47.188Tas8.dllGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        Tas10_WL.dllGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        Tas10.dllGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        14.29.101.160setup.exeGet hashmaliciousUnknownBrowse
        • whois.pconline.com.cn/ipJson.jsp
        setup.exeGet hashmaliciousUnknownBrowse
        • whois.pconline.com.cn/ipJson.jsp
        #U67e5#U8be2#U5165#U53e3.exeGet hashmaliciousUnknownBrowse
        • whois.pconline.com.cn/ipJson.jsp
        7r7iKqMM88.exeGet hashmaliciousUnknownBrowse
        • whois.pconline.com.cn/jsFunction.jsp?callback=jsShow
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        whois.pconline.com.cn.ctadns.cnC7jdH7geD6.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.168
        setup.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.169
        setup.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.168
        setup.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.160
        #U67e5#U8be2#U5165#U53e3.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.160
        #U67e5#U8be2#U5165#U53e3.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.160
        sample.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.169
        sample.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.169
        sample.exeGet hashmaliciousUnknownBrowse
        • 14.29.101.169
        www.wshifen.comTas8.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.47.188
        Tas10.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        Tas8.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        Tas8_WL.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        Tas10_WL.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.47.188
        Tas10.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.47.188
        https://www.bmlenin.com/Get hashmaliciousUnknownBrowse
        • 103.235.47.188
        https://www.bmlenin.com/Get hashmaliciousUnknownBrowse
        • 103.235.46.96
        https://www.bmlenin.com/Get hashmaliciousUnknownBrowse
        • 103.235.46.96
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdhttp://www.telegramkv.com/Get hashmaliciousUnknownBrowse
        • 182.61.201.163
        http://www.telegramkv.com/Get hashmaliciousUnknownBrowse
        • 182.61.201.163
        Tas8.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.47.188
        Tas10.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        Tas8.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        Tas8_WL.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        Tas10_WL.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.47.188
        Tas10.dllGet hashmaliciousBlackMoonBrowse
        • 103.235.47.188
        https://www.bmlenin.com/Get hashmaliciousUnknownBrowse
        • 180.76.59.213
        CT-GUANGZHOU-IDCCHINANETGuangdongprovincenetworkCNjhpg1LVUrZ.elfGet hashmaliciousMiraiBrowse
        • 125.88.193.121
        https://www.qcc.com/web/cms/overseaApply?opsriskcountry=%E7%BE%8E%E5%9B%BD&ip=155.190.35.6&back=%2Fweblogin%3Fback%3D%2Ffirm%2F1ef8635d382a741aaca689243a486673.htmlGet hashmaliciousUnknownBrowse
        • 14.215.183.79
        ikFn0h3xhF.elfGet hashmaliciousMiraiBrowse
        • 119.147.167.54
        fPqdDUeLwj.elfGet hashmaliciousMirai, MoobotBrowse
        • 113.102.254.123
        zQ35ev2Uw0.elfGet hashmaliciousMiraiBrowse
        • 14.18.115.224
        https://towallet.io/Get hashmaliciousUnknownBrowse
        • 14.215.183.79
        HTUyCRuDev.elfGet hashmaliciousUnknownBrowse
        • 113.105.112.161
        jzXBbfutn2.elfGet hashmaliciousUnknownBrowse
        • 14.22.222.67
        https://edgetunnel-2no.pages.dev/Get hashmaliciousUnknownBrowse
        • 14.215.183.79
        No context
        No context
        Process:C:\Users\user\Desktop\ViKing-R2.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):66048
        Entropy (8bit):6.333621993901875
        Encrypted:false
        SSDEEP:768:maGHTyDNMoH4Dyo6RJ3yLTdkc3vPEq37RJ8IDp5pEq8fknpDRik0mohIw9TGzaZo:mUA9+MXdkIvM2NSIppqI4KzaZMDEnfc
        MD5:0FEECF918DE81C9B174D663867F63ED0
        SHA1:C33A72B855A978E40C2F3705899D1BE6DE06F787
        SHA-256:1F97936E56D01845E7FA3162F1A6594B770016E0050325678543B6D612B58182
        SHA-512:1803D0F0CC2EA8FD0EB985582F8AE29B9C949FBB835CD02441A192B08C0AA6D5B6035E7E7476263D646F23F2E76F5645DC0FF48B63469CEB60B5BD2D8BF942E2
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 33%
        • Antivirus: Virustotal, Detection: 14%, Browse
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8D..|%`.|%`.|%`.g...u%`.g...w%`.u]...%`.|%a.6%`.g...>%`.g...}%`.g...}%`.g...}%`.Rich|%`.........PE..L...^..S...........!.........@..............................................@....... ....@.........................P...d...L...(.... ..D....................0..P.......................................@............................................text...b........................... ..`.rdata...!......."..................@..@.data...D...........................@....rsrc...D.... ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.2413259133579695
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.66%
        • UPX compressed Win32 Executable (30571/9) 0.30%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:ViKing-R2.exe
        File size:12'681'216 bytes
        MD5:c39554bdab22961d0ac64c5c2e607915
        SHA1:ea1d422f6ef34c453d1a72f605051666544994b2
        SHA256:6c1563fd7bc5f73b45639867591d05afb944dd7dce4caa94e59fbcfb9a48756c
        SHA512:0e8f2be91f7d859e9bd204df6c5bcd4fdfcd79db3335f4432174c3a0109aec05bfd576e762dea19f4022ac7e89378cf56ac3a0d5edabca14d0fc849e18da4ad6
        SSDEEP:196608:Ib7evKc810eta6eylh97NSqCDJVzN1O/jN/O:Inevv81K1whnOR1Op/O
        TLSH:E7D67C52663D887DCC1AF4718A22E1B9D1789F009F146AC3B3AEB5597AB31DC5E33D02
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x..K<...<...<...S...5...S...:...G...9...j...............^..."...<...........?.......................I.......!...<...D.......=..
        Icon Hash:33e8f499f8ec6933
        Entrypoint:0x100fe38
        Entrypoint Section:.sedata
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x6616A340 [Wed Apr 10 14:33:36 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:dd51c91fd9a2e73ba8991e77f1ccede1
        Instruction
        call 00007F1C39304121h
        push ebx
        popad
        outsb
        imul ebp, dword ptr [bp+65h], 69685320h
        insb
        outsb
        and byte ptr [esi+32h], dh
        xor al, 2Eh
        xor byte ptr [esi], ch
        xor byte ptr [eax], al
        jmp 00007F1C393040C7h
        lea esp, dword ptr [esp+02h]
        mov dword ptr [esp], edi
        call 00007F1C3930412Eh
        xchg eax, esp
        or eax, BC17E49Dh
        sbb al, 6Fh
        jbe 00007F1C39304163h
        pop word ptr [esp]
        call 00007F1C393040E6h
        dec edi
        bswap edi
        pop edi
        push ecx
        xchg ecx, edi
        bsf ecx, ecx
        jmp 00007F1C39304141h
        mov edx, 22D7B022h
        xchg eax, ebp
        jecxz 00007F1C3930411Ch
        jne 00007F1C39304166h
        mov di, dx
        adc edi, 52CD9E99h
        jmp 00007F1C393040E1h
        mov word ptr [ebx], ds
        mov ebp, esi
        sbb eax, 127CE29Ch
        jne 00007F1C39304086h
        add ecx, ecx
        push FFC2E8F5h
        Programming Language:
        • [C++] VS98 (6.0) SP6 build 8804
        • [ C ] VS98 (6.0) SP6 build 8804
        • [C++] VS98 (6.0) build 8168
        • [ C ] VS98 (6.0) build 8168
        • [EXP] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xc120e00x190.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc150000x2000.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x1b80000x8a4.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xb0b0000xb0b000f4e4c388b5e8a8e02526fc2775a89f18unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .sedata0xb0c0000x1060000x10600090671ee3d49e3b4a47a8ff60a3d94f9aFalse0.7892013433325382data7.459508118890517IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0xc120000x30000x3000befc1b1a06ba537dfb54bf96d1a3c8f8False0.3653157552083333data4.908959229193993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0xc150000x20000x20009e41b7e9c1b994255298a297db2b8cc1False0.3001708984375data4.991228977865284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .sedata0xc170000x10000x10001fc93487359c1b1d6304f9be9bc93b3dFalse0.78076171875data7.983609715626119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xc151180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.848826714801444
        RT_ICON0xc159c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.848826714801444
        RT_GROUP_ICON0xc162680x14data1.15
        RT_GROUP_ICON0xc1627c0x14dataChineseChina1.15
        RT_MANIFEST0xc162900x2b9XML 1.0 document, ASCII text, with very long lines (697), with no line terminators0.5279770444763271
        DLLImport
        iphlpapi.dllGetAdaptersInfo
        WINMM.dllwaveOutRestart, midiOutUnprepareHeader, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, midiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, waveOutOpen, waveOutGetNumDevs, waveOutClose
        WS2_32.dllgethostname, inet_addr, inet_ntoa, WSAStartup, select, send, closesocket, WSAAsyncSelect, htons, socket, recvfrom, ioctlsocket, connect, recv, getpeername, accept, ntohl, WSACleanup, gethostbyname
        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA, VerLanguageNameA
        RASAPI32.dllRasGetConnectStatusA, RasHangUpA
        KERNEL32.dllTerminateProcess, OpenProcess, GetWindowsDirectoryA, GetSystemDirectoryA, SetLastError, GetTimeZoneInformation, GetVersion, TerminateThread, SetSystemPowerState, GetCurrentProcess, CreateMutexA, ReleaseMutex, SuspendThread, GetACP, InterlockedIncrement, InterlockedDecrement, LocalFree, FormatMessageA, FileTimeToLocalFileTime, lstrcpynA, DuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, GetStringTypeExA, GetThreadLocale, lstrcmpiA, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, lstrcmpA, LocalAlloc, TlsAlloc, GlobalHandle, TlsFree, TlsSetValue, LocalReAlloc, TlsGetValue, GetFileTime, GetCurrentThread, GlobalFlags, SetErrorMode, GetProcessVersion, GetCPInfo, GetOEMCP, GetStartupInfoA, RtlUnwind, GetSystemTime, GetLocalTime, RaiseException, HeapSize, SetStdHandle, GetFileType, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, VirtualAlloc, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, GetFileSize, SetFilePointer, CreateToolhelp32Snapshot, Process32First, Process32Next, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, RemoveDirectoryA, GetModuleFileNameA, WideCharToMultiByte, MultiByteToWideChar, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GetDriveTypeA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, ExpandEnvironmentStringsA, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, SetFileAttributesA, GetFileAttributesA, DeleteFileA, CopyFileA, CreateDirectoryA, GetCurrentDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, GetDiskFreeSpaceA, MulDiv, GetCommandLineA, GetTickCount, CreateProcessA, WaitForSingleObject, CloseHandle, InterlockedExchange, VirtualProtect, VirtualQuery, GetSystemInfo, InterlockedCompareExchange, FileTimeToSystemTime
        USER32.dllCharNextA, SetWindowContextHelpId, MapDialogRect, LoadStringA, GetSysColorBrush, GetNextDlgGroupItem, PostThreadMessageA, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, ScrollWindow, GetScrollInfo, SetScrollInfo, ShowScrollBar, GetScrollPos, RegisterClassA, GetMenuItemCount, GetMenuItemID, CreateWindowExA, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, CallWindowProcA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamA, UnregisterClassA, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, CharUpperA, GetWindowTextLengthA, SetWindowTextA, ExitWindowsEx, GetForegroundWindow, GetWindowTextA, FindWindowExA, GetDlgItem, FindWindowA, GetWindowThreadProcessId, GetClassNameA, GetDesktopWindow, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, IntersectRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBeep, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, WaitForInputIdle, GetMenuCheckMarkDimensions, CreateIconFromResource, GetMenuState, ReleaseCapture, DestroyWindow
        GDI32.dllGetStockObject, CreateFontIndirectA, CreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, MoveToEx, GetObjectA, EndPage, ExtSelectClipRgn, GetViewportExtEx, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, GetTextMetricsA, GetMapMode, SetBkColor, CreateRectRgnIndirect, CreateDIBSection, SetPixel, ExtCreateRegion, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, GetPixel, CreateCompatibleDC, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, SetTextColor, SetROP2, SetPolyFillMode, SetBkMode, RestoreDC, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, SaveDC, GetTextExtentPoint32A, LineTo, GetDeviceCaps, GetDIBits, GetWindowExtEx, GetViewportOrgEx
        WINSPOOL.DRVClosePrinter, DocumentPropertiesA, OpenPrinterA
        comdlg32.dllGetFileTitleA, GetSaveFileNameA, GetOpenFileNameA, ChooseColorA
        ADVAPI32.dllLookupPrivilegeValueA, AdjustTokenPrivileges, RegCreateKeyExA, OpenProcessToken, RegQueryValueA, RegSetValueExA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey
        SHELL32.dllSHGetSpecialFolderPathA, Shell_NotifyIconA, ShellExecuteA
        ole32.dllOleIsCurrentClipboard, OleFlushClipboard, CoRevokeClassObject, CoRegisterMessageFilter, CoFreeUnusedLibraries, CreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CoDisconnectObject, CoTaskMemFree, CoTaskMemAlloc, CLSIDFromProgID, OleInitialize, OleUninitialize, CLSIDFromString, CoCreateInstance, OleRun
        OLEAUT32.dllVariantInit, VariantCopyInd, SafeArrayAccessData, SafeArrayUnaccessData, SysAllocString, SafeArrayGetLBound, SafeArrayGetUBound, VariantChangeType, VariantClear, VariantCopy, SafeArrayCreate, RegisterTypeLib, SafeArrayGetDim, VariantTimeToSystemTime, SysStringLen, SysAllocStringLen, LHashValOfNameSys, LoadTypeLib, OleCreateFontIndirect, SysFreeString, SafeArrayGetElemsize, SysAllocStringByteLen, UnRegisterTypeLib
        COMCTL32.dllImageList_Destroy
        oledlg.dll
        WININET.dllInternetCloseHandle, InternetOpenA, InternetGetConnectedState, InternetSetOptionA, InternetConnectA, InternetReadFile, HttpQueryInfoA, InternetCanonicalizeUrlA, InternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, InternetOpenUrlA
        MSVCRT.dllstrncpy
        PSAPI.DLLGetMappedFileNameW
        Language of compilation systemCountry where language is spokenMap
        ChineseChina
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        07/05/24-07:59:43.098294TCP2830033ETPRO TROJAN Win32/Agent.xxxyeb Connectivity Check4971280192.168.2.5103.235.47.188
        TimestampSource PortDest PortSource IPDest IP
        Jul 5, 2024 08:07:41.595711946 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:41.601608038 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:41.601711988 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:41.601829052 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:41.606612921 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506494999 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506520987 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506532907 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506545067 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506556034 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506567001 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506580114 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506603956 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.506660938 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506675005 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506726980 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.506727934 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.506727934 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.506750107 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.506794930 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.511569023 CEST8049711103.235.47.188192.168.2.5
        Jul 5, 2024 08:07:42.511656046 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.520713091 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.520755053 CEST4971180192.168.2.5103.235.47.188
        Jul 5, 2024 08:07:42.578242064 CEST4971280192.168.2.514.29.101.160
        Jul 5, 2024 08:07:42.583255053 CEST804971214.29.101.160192.168.2.5
        Jul 5, 2024 08:07:42.583353043 CEST4971280192.168.2.514.29.101.160
        Jul 5, 2024 08:07:42.583467960 CEST4971280192.168.2.514.29.101.160
        Jul 5, 2024 08:07:42.588140011 CEST804971214.29.101.160192.168.2.5
        Jul 5, 2024 08:07:44.494996071 CEST804971214.29.101.160192.168.2.5
        Jul 5, 2024 08:07:44.495101929 CEST4971280192.168.2.514.29.101.160
        Jul 5, 2024 08:08:44.497416019 CEST804971214.29.101.160192.168.2.5
        Jul 5, 2024 08:08:44.497519970 CEST4971280192.168.2.514.29.101.160
        Jul 5, 2024 08:09:31.568089962 CEST4971280192.168.2.514.29.101.160
        Jul 5, 2024 08:09:31.572979927 CEST804971214.29.101.160192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Jul 5, 2024 08:07:41.582539082 CEST5697253192.168.2.51.1.1.1
        Jul 5, 2024 08:07:41.590425014 CEST53569721.1.1.1192.168.2.5
        Jul 5, 2024 08:07:42.570229053 CEST5784353192.168.2.51.1.1.1
        Jul 5, 2024 08:07:42.577403069 CEST53578431.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 5, 2024 08:07:41.582539082 CEST192.168.2.51.1.1.10x3229Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
        Jul 5, 2024 08:07:42.570229053 CEST192.168.2.51.1.1.10x575eStandard query (0)whois.pconline.com.cnA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 5, 2024 08:07:41.590425014 CEST1.1.1.1192.168.2.50x3229No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
        Jul 5, 2024 08:07:41.590425014 CEST1.1.1.1192.168.2.50x3229No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
        Jul 5, 2024 08:07:41.590425014 CEST1.1.1.1192.168.2.50x3229No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
        Jul 5, 2024 08:07:41.590425014 CEST1.1.1.1192.168.2.50x3229No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
        Jul 5, 2024 08:07:42.577403069 CEST1.1.1.1192.168.2.50x575eNo error (0)whois.pconline.com.cnwhois.pconline.com.cn.ctadns.cnCNAME (Canonical name)IN (0x0001)false
        Jul 5, 2024 08:07:42.577403069 CEST1.1.1.1192.168.2.50x575eNo error (0)whois.pconline.com.cn.ctadns.cn14.29.101.160A (IP address)IN (0x0001)false
        Jul 5, 2024 08:07:42.577403069 CEST1.1.1.1192.168.2.50x575eNo error (0)whois.pconline.com.cn.ctadns.cn14.29.101.168A (IP address)IN (0x0001)false
        Jul 5, 2024 08:07:42.577403069 CEST1.1.1.1192.168.2.50x575eNo error (0)whois.pconline.com.cn.ctadns.cn14.29.101.169A (IP address)IN (0x0001)false
        • www.baidu.com
        • whois.pconline.com.cn
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.549711103.235.47.188801812C:\Users\user\Desktop\ViKing-R2.exe
        TimestampBytes transferredDirectionData
        Jul 5, 2024 08:07:41.601829052 CEST82OUTGET / HTTP/1.1
        User-Agent: test
        Host: www.baidu.com
        Cache-Control: no-cache
        Jul 5, 2024 08:07:42.506494999 CEST1236INHTTP/1.1 200 OK
        Accept-Ranges: bytes
        Cache-Control: no-cache
        Connection: keep-alive
        Content-Length: 9508
        Content-Type: text/html
        Date: Fri, 05 Jul 2024 06:07:42 GMT
        P3p: CP=" OTI DSP COR IVA OUR IND COM "
        P3p: CP=" OTI DSP COR IVA OUR IND COM "
        Pragma: no-cache
        Server: BWS/1.1
        Set-Cookie: BAIDUID=4ED3DE093260FA641B6D4C553738DC9B:FG=1; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
        Set-Cookie: BIDUPSID=4ED3DE093260FA641B6D4C553738DC9B; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
        Set-Cookie: PSTM=1720159662; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
        Set-Cookie: BAIDUID=4ED3DE093260FA646C3B1EDB338B57FD:FG=1; max-age=31536000; expires=Sat, 05-Jul-25 06:07:42 GMT; domain=.baidu.com; path=/; version=1; comment=bd
        Traceid: 172015966239541289068411138338558106240
        Vary: Accept-Encoding
        X-Ua-Compatible: IE=Edge,chrome=1
        X-Xss-Protection: 1;mode=block
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 61 6c 77 61 79 73 22 20 6e 61 6d 65 3d 22 72 65 66 65 72 72 65 72 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 e5 85 a8 e7 90 83 e9 a2 86 e5 85 88 e7 9a 84 e4 b8
        Data Ascii: <!DOCTYPE html><html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><meta content="always" name="referrer"><meta name="description" content="
        Jul 5, 2024 08:07:42.506520987 CEST224INData Raw: ad e6 96 87 e6 90 9c e7 b4 a2 e5 bc 95 e6 93 8e e3 80 81 e8 87 b4 e5 8a 9b e4 ba 8e e8 ae a9 e7 bd 91 e6 b0 91 e6 9b b4 e4 be bf e6 8d b7 e5 9c b0 e8 8e b7 e5 8f 96 e4 bf a1 e6 81 af ef bc 8c e6 89 be e5 88 b0 e6 89 80 e6 b1 82 e3 80 82 e7 99 be
        Data Ascii: "><link rel="shortcut icon" href="//www.baidu.com/favicon.
        Jul 5, 2024 08:07:42.506532907 CEST1236INData Raw: 69 63 6f 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 65 61 72 63 68 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 70 65 6e 73 65 61 72 63 68 64 65 73 63 72 69 70 74 69 6f
        Data Ascii: ico" type="image/x-icon"><link rel="search" type="application/opensearchdescription+xml" href="//www.baidu.com/content-search.xml" title=""><title></title><style type="text/css">body{margin:0;padding:0;te
        Jul 5, 2024 08:07:42.506545067 CEST224INData Raw: 2d 77 65 69 67 68 74 3a 34 30 30 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 6d 69 64 64 6c 65 3b 6f 75 74 6c 69 6e 65 3a 30 3b 62 6f 72 64 65 72 3a 30 3b 68 65 69 67 68 74 3a 33 30 70 78
        Data Ascii: -weight:400;text-align:center;vertical-align:middle;outline:0;border:0;height:30px;width:80px;line-height:30px;font-size:13px;border-radius:6px;padding:0;background-color:#f5f5f6;cursor:pointer}.c-btn:hover{background-color:
        Jul 5, 2024 08:07:42.506556034 CEST1236INData Raw: 23 33 31 35 65 66 62 3b 63 6f 6c 6f 72 3a 23 66 66 66 21 69 6d 70 6f 72 74 61 6e 74 7d 61 2e 63 2d 62 74 6e 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 2e 63 2d 62 74 6e 2d 6d 69 6e 69 7b 68 65 69 67 68 74 3a 32 34 70 78 3b
        Data Ascii: #315efb;color:#fff!important}a.c-btn{text-decoration:none}.c-btn-mini{height:24px;width:48px;line-height:24px}.c-btn-primary,.c-btn-primary:visited{color:#fff!important}.c-btn-primary{background-color:#4e6ef2}.c-btn-primary:hover{background-co
        Jul 5, 2024 08:07:42.506567001 CEST1236INData Raw: 61 70 70 65 72 20 23 6b 77 7b 77 69 64 74 68 3a 35 31 32 70 78 3b 68 65 69 67 68 74 3a 31 36 70 78 3b 70 61 64 64 69 6e 67 3a 31 32 70 78 20 31 36 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 36 70 78 3b 6d 61 72 67 69 6e 3a 30 3b 76 65 72 74 69 63
        Data Ascii: apper #kw{width:512px;height:16px;padding:12px 16px;font-size:16px;margin:0;vertical-align:top;outline:0;box-shadow:none;border-radius:10px 0 0 10px;border:2px solid #c4c7ce;background:#fff;color:#222;overflow:hidden;box-sizing:content-box}#he
        Jul 5, 2024 08:07:42.506580114 CEST1236INData Raw: 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 72 69 67 68 74 3a 30 3b 74 6f 70 3a 30 3b 7a 2d 69 6e 64 65 78 3a 31 30 30 3b 68 65 69 67 68 74 3a 36 30 70 78 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 32 34 70 78 7d 2e 73 2d 74 6f 70 2d 72
        Data Ascii: osition:absolute;right:0;top:0;z-index:100;height:60px;padding-right:24px}.s-top-right .s-top-right-text{margin-left:32px;margin-top:19px;display:inline-block;position:relative;vertical-align:top;cursor:pointer}.s-top-right .s-top-right-text:h
        Jul 5, 2024 08:07:42.506660938 CEST1236INData Raw: 20 68 72 65 66 3d 22 2f 2f 6d 61 70 2e 62 61 69 64 75 2e 63 6f 6d 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 20 63 6c 61 73 73 3d 22 6d 6e 61 76 20 63 2d 66 6f 6e 74 2d 6e 6f 72 6d 61 6c 20 63 2d 63 6f 6c 6f 72 2d 74 22 3e e5 9c b0 e5
        Data Ascii: href="//map.baidu.com/" target="_blank" class="mnav c-font-normal c-color-t"></a><a href="//live.baidu.com/" target="_blank" class="mnav c-font-normal c-color-t"></a><a href="//haokan.baidu.com/?sfrom=baidu-top" target="_blank" cl
        Jul 5, 2024 08:07:42.506675005 CEST328INData Raw: 22 3e 3c 61 72 65 61 20 73 74 79 6c 65 3d 22 6f 75 74 6c 69 6e 65 3a 30 22 20 68 69 64 65 66 6f 63 75 73 3d 22 74 72 75 65 22 20 73 68 61 70 65 3d 22 72 65 63 74 22 20 63 6f 6f 72 64 73 3d 22 30 2c 30 2c 32 37 30 2c 31 32 39 22 20 68 72 65 66 3d
        Data Ascii: "><area style="outline:0" hidefocus="true" shape="rect" coords="0,0,270,129" href="//www.baidu.com/s?wd=%E7%99%BE%E5%BA%A6%E7%83%AD%E6%90%9C&amp;sa=ire_dl_gh_logo_texing&amp;rsv_dl=igh_logo_pcs" target="_blank" title="
        Jul 5, 2024 08:07:42.506750107 CEST1236INData Raw: 22 66 22 20 61 63 74 69 6f 6e 3d 22 2f 2f 77 77 77 2e 62 61 69 64 75 2e 63 6f 6d 2f 73 22 20 63 6c 61 73 73 3d 22 66 6d 22 3e 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 69 65 22 20 76 61 6c 75 65 3d 22 75 74
        Data Ascii: "f" action="//www.baidu.com/s" class="fm"><input type="hidden" name="ie" value="utf-8"> <input type="hidden" name="f" value="8"> <input type="hidden" name="rsv_bp" value="1"> <input type="hidden" name="rsv_idx" value="1"> <input type="hidden"
        Jul 5, 2024 08:07:42.511569023 CEST1070INData Raw: 70 20 63 6c 61 73 73 3d 22 6c 68 22 3e 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 63 6f 6c 6f 72 22 20 68 72 65 66 3d 22 2f 2f 69 72 2e 62 61 69 64 75 2e 63 6f 6d 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 41 62 6f 75 74 20 42 61
        Data Ascii: p class="lh"><a class="text-color" href="//ir.baidu.com/" target="_blank">About Baidu</a></p><p class="lh"><a class="text-color" href="//www.baidu.com/duty" target="_blank"></a></p><p class="lh"><a class="text-color" href=


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.54971214.29.101.160801812C:\Users\user\Desktop\ViKing-R2.exe
        TimestampBytes transferredDirectionData
        Jul 5, 2024 08:07:42.583467960 CEST159OUTGET /ipJson.jsp HTTP/1.1
        Accept: */*
        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
        Host: whois.pconline.com.cn
        Cache-Control: no-cache
        Jul 5, 2024 08:07:44.494996071 CEST581INHTTP/1.1 200 OK
        Server: openresty
        Date: Fri, 05 Jul 2024 06:07:44 GMT
        Content-Type: text/html; charset=GBK
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        Cache-Control: no-cache
        Age: 1
        Ctl-Cache-Status: MISS from hb-wuhan9-ca05, MISS from gd-guangzhou8-ca23, MISS from gd-guangzhou8-ca25
        Request-Id: 65a066878daf0e1db498512b753ed5b4
        Data Raw: 63 37 0d 0a 0a 0a 0a 0a 0a 69 66 28 77 69 6e 64 6f 77 2e 49 50 43 61 6c 6c 42 61 63 6b 29 20 7b 49 50 43 61 6c 6c 42 61 63 6b 28 7b 22 69 70 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 22 70 72 6f 22 3a 22 22 2c 22 70 72 6f 43 6f 64 65 22 3a 22 39 39 39 39 39 39 22 2c 22 63 69 74 79 22 3a 22 22 2c 22 63 69 74 79 43 6f 64 65 22 3a 22 30 22 2c 22 72 65 67 69 6f 6e 22 3a 22 22 2c 22 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 30 22 2c 22 61 64 64 72 22 3a 22 20 c3 c0 b9 fa 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 73 22 3a 22 22 2c 22 65 72 72 22 3a 22 6e 6f 70 72 6f 76 69 6e 63 65 22 7d 29 3b 7d 0a 0a 0a 0a 0d 0a 30 0d 0a 0d 0a
        Data Ascii: c7if(window.IPCallBack) {IPCallBack({"ip":"8.46.123.33","pro":"","proCode":"999999","city":"","cityCode":"0","region":"","regionCode":"0","addr":" ","regionNames":"","err":"noprovince"});}0


        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:02:07:00
        Start date:05/07/2024
        Path:C:\Users\user\Desktop\ViKing-R2.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\ViKing-R2.exe"
        Imagebase:0x400000
        File size:12'681'216 bytes
        MD5 hash:C39554BDAB22961D0AC64C5C2E607915
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2267744924.0000000003127000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low
        Has exited:false

        No disassembly