Edit tour

Windows Analysis Report
LisectAVT_2403002A_21.exe

Overview

General Information

Sample name:LisectAVT_2403002A_21.exe
Analysis ID:1482419
MD5:c4f84399032146f1645a388e500dd52b
SHA1:24d665e81c3db04a2bc73c0976600d30ea48d81a
SHA256:2d416b2fd87f92d3e917162ceb32a9455aa6d6e00a39b5b41ac8412e83a1045a
Tags:exe
Infos:

Detection

Orcus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Orcus RAT
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to disable the Task Manager (.Net Source)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • LisectAVT_2403002A_21.exe (PID: 4692 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_21.exe" MD5: C4F84399032146F1645A388E500DD52B)
    • LisectAVT_2403002A_21.exe (PID: 7616 cmdline: "C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe" MD5: C4F84399032146F1645A388E500DD52B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Orcus RATOrcus has been advertised as a Remote Administration Tool (RAT) since early 2016. It has all the features that would be expected from a RAT and probably more. The long list of the commands is documented on their website. But what separates Orcus from the others is its capability to load custom plugins developed by users, as well as plugins that are readily available from the Orcus repository. In addition to that, users can also execute C# and VB.net code on the remote machine in real-time.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.orcus_rat
{
  "AutostartBuilderProperty": {
    "AutostartMethod": "Disable",
    "TaskSchedulerTaskName": "Orcus",
    "TaskHighestPrivileges": "true",
    "RegistryHiddenStart": "true",
    "RegistryKeyName": "Orcus",
    "TryAllAutostartMethodsOnFail": "true"
  },
  "ChangeAssemblyInformationBuilderProperty": {
    "ChangeAssemblyInformation": "false",
    "AssemblyTitle": null,
    "AssemblyDescription": null,
    "AssemblyCompanyName": null,
    "AssemblyProductName": null,
    "AssemblyCopyright": null,
    "AssemblyTrademarks": null,
    "AssemblyProductVersion": "1.0.0.0",
    "AssemblyFileVersion": "1.0.0.0"
  },
  "ChangeCreationDateBuilderProperty": {
    "IsEnabled": "false",
    "NewCreationDate": "2024-03-13T18:29:18"
  },
  "ChangeIconBuilderProperty": {
    "ChangeIcon": "false",
    "IconPath": null
  },
  "ClientTagBuilderProperty": {
    "ClientTag": null
  },
  "ConnectionBuilderProperty": {
    "IpAddresses": [
      {
        "Ip": "45.157.69.156",
        "Port": "443"
      }
    ]
  },
  "DataFolderBuilderProperty": {
    "Path": "%appdata%\\Orcus"
  },
  "DefaultPrivilegesBuilderProperty": {
    "RequireAdministratorRights": "false"
  },
  "DisableInstallationPromptBuilderProperty": {
    "IsDisabled": "false"
  },
  "FrameworkVersionBuilderProperty": {
    "FrameworkVersion": "NET40"
  },
  "HideFileBuilderProperty": {
    "HideFile": "false"
  },
  "InstallationLocationBuilderProperty": {
    "Path": "%programfiles%\\Orcus\\Orcus.exe"
  },
  "InstallBuilderProperty": {
    "Install": "false"
  },
  "KeyloggerBuilderProperty": {
    "IsEnabled": "false"
  },
  "MutexBuilderProperty": {
    "Mutex": "3b453ed253424c82a94898f42bb6a1be"
  },
  "ProxyBuilderProperty": {
    "ProxyOption": "None",
    "ProxyAddress": null,
    "ProxyPort": "1080",
    "ProxyType": "2"
  },
  "ReconnectDelayProperty": {
    "Delay": "10000"
  },
  "RequireAdministratorPrivilegesInstallerBuilderProperty": {
    "RequireAdministratorPrivileges": "true"
  },
  "RespawnTaskBuilderProperty": {
    "IsEnabled": "false",
    "TaskName": "Orcus Respawner"
  },
  "ServiceBuilderProperty": {
    "Install": "false"
  },
  "SetRunProgramAsAdminFlagBuilderProperty": {
    "SetFlag": "false"
  },
  "WatchdogBuilderProperty": {
    "IsEnabled": "false",
    "Name": "OrcusWatchdog.exe",
    "WatchdogLocation": "AppData",
    "PreventFileDeletion": "false"
  }
}
SourceRuleDescriptionAuthorStrings
0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
    0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmpMAL_BackNet_Nov18_1Detects BackNet samplesFlorian Roth
    • 0xc9d79:$s1: ProcessedByFody
    • 0xd578e:$s2: SELECT * FROM AntivirusProduct
    0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmpRAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
    • 0xc94f3:$text01: Orcus.CommandManagement
    • 0xb017b:$text02: Orcus.Commands.
    • 0xbdafd:$text02: Orcus.Commands.
    • 0xbdc6b:$text02: Orcus.Commands.
    • 0xbdcab:$text02: Orcus.Commands.
    • 0xbdd00:$text02: Orcus.Commands.
    • 0xbdf2f:$text02: Orcus.Commands.
    • 0xbe724:$text02: Orcus.Commands.
    • 0xbeb52:$text02: Orcus.Commands.
    • 0xbeef9:$text02: Orcus.Commands.
    • 0xbf165:$text02: Orcus.Commands.
    • 0xbf441:$text02: Orcus.Commands.
    • 0xbf78d:$text02: Orcus.Commands.
    • 0xbf882:$text02: Orcus.Commands.
    • 0xbfe3a:$text02: Orcus.Commands.
    • 0xc000a:$text02: Orcus.Commands.
    • 0xc032b:$text02: Orcus.Commands.
    • 0xc05ce:$text02: Orcus.Commands.
    • 0xc06a9:$text02: Orcus.Commands.
    • 0xc0c19:$text02: Orcus.Commands.
    • 0xc0cb8:$text02: Orcus.Commands.
    0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
    • 0xd7008:$f1: FileZilla\recentservers.xml
    • 0xd6b38:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
    • 0xd739e:$b1: Chrome\User Data\
    • 0xd740a:$b1: Chrome\User Data\
    • 0xd74ba:$b2: Mozilla\Firefox\Profiles
    • 0xd6f54:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
    • 0xdee6a:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
    • 0xd6d02:$b4: Opera Software\Opera Stable\Login Data
    • 0xd6a2c:$b5: YandexBrowser\User Data\
    • 0xd6a98:$b5: YandexBrowser\User Data\
    • 0xd7452:$s1: key3.db
    • 0xd7572:$s4: logins.json
    • 0xd66ba:$a1: username_value
    • 0xd66d8:$a2: password_value
    • 0xc70e2:$a3: encryptedUsername
    • 0xd75be:$a3: encryptedUsername
    • 0xc70d0:$a4: encryptedPassword
    • 0xd75e2:$a4: encryptedPassword
    0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
      Click to see the 4 entries
      SourceRuleDescriptionAuthorStrings
      12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpackJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
        12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpackMAL_BackNet_Nov18_1Detects BackNet samplesFlorian Roth
        • 0xc7f79:$s1: ProcessedByFody
        • 0xd398e:$s2: SELECT * FROM AntivirusProduct
        12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpackRAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
        • 0xc76f3:$text01: Orcus.CommandManagement
        • 0xae37b:$text02: Orcus.Commands.
        • 0xbbcfd:$text02: Orcus.Commands.
        • 0xbbe6b:$text02: Orcus.Commands.
        • 0xbbeab:$text02: Orcus.Commands.
        • 0xbbf00:$text02: Orcus.Commands.
        • 0xbc12f:$text02: Orcus.Commands.
        • 0xbc924:$text02: Orcus.Commands.
        • 0xbcd52:$text02: Orcus.Commands.
        • 0xbd0f9:$text02: Orcus.Commands.
        • 0xbd365:$text02: Orcus.Commands.
        • 0xbd641:$text02: Orcus.Commands.
        • 0xbd98d:$text02: Orcus.Commands.
        • 0xbda82:$text02: Orcus.Commands.
        • 0xbe03a:$text02: Orcus.Commands.
        • 0xbe20a:$text02: Orcus.Commands.
        • 0xbe52b:$text02: Orcus.Commands.
        • 0xbe7ce:$text02: Orcus.Commands.
        • 0xbe8a9:$text02: Orcus.Commands.
        • 0xbee19:$text02: Orcus.Commands.
        • 0xbeeb8:$text02: Orcus.Commands.
        12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
        • 0xd5208:$f1: FileZilla\recentservers.xml
        • 0xd4d38:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
        • 0xd559e:$b1: Chrome\User Data\
        • 0xd560a:$b1: Chrome\User Data\
        • 0xd56ba:$b2: Mozilla\Firefox\Profiles
        • 0xd5154:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0xdd06a:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0xd4f02:$b4: Opera Software\Opera Stable\Login Data
        • 0xd4c2c:$b5: YandexBrowser\User Data\
        • 0xd4c98:$b5: YandexBrowser\User Data\
        • 0xd5652:$s1: key3.db
        • 0xd5772:$s4: logins.json
        • 0xd48ba:$a1: username_value
        • 0xd48d8:$a2: password_value
        • 0xc52e2:$a3: encryptedUsername
        • 0xd57be:$a3: encryptedUsername
        • 0xc52d0:$a4: encryptedPassword
        • 0xd57e2:$a4: encryptedPassword
        12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpackJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Click to see the 11 entries
          No Sigma rule has matched
          No Snort rule has matched
          Timestamp:2024-07-25T22:43:41.709292+0200
          SID:2022930
          Source Port:443
          Destination Port:49702
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-07-25T22:44:19.643395+0200
          SID:2022930
          Source Port:443
          Destination Port:49707
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: LisectAVT_2403002A_21.exeAvira: detected
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeAvira: detection malicious, Label: TR/AD.Orcus.qhuas
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpackMalware Configuration Extractor: OrcusRAT {"AutostartBuilderProperty": {"AutostartMethod": "Disable", "TaskSchedulerTaskName": "Orcus", "TaskHighestPrivileges": "true", "RegistryHiddenStart": "true", "RegistryKeyName": "Orcus", "TryAllAutostartMethodsOnFail": "true"}, "ChangeAssemblyInformationBuilderProperty": {"ChangeAssemblyInformation": "false", "AssemblyTitle": null, "AssemblyDescription": null, "AssemblyCompanyName": null, "AssemblyProductName": null, "AssemblyCopyright": null, "AssemblyTrademarks": null, "AssemblyProductVersion": "1.0.0.0", "AssemblyFileVersion": "1.0.0.0"}, "ChangeCreationDateBuilderProperty": {"IsEnabled": "false", "NewCreationDate": "2024-03-13T18:29:18"}, "ChangeIconBuilderProperty": {"ChangeIcon": "false", "IconPath": null}, "ClientTagBuilderProperty": {"ClientTag": null}, "ConnectionBuilderProperty": {"IpAddresses": [{"Ip": "45.157.69.156", "Port": "443"}]}, "DataFolderBuilderProperty": {"Path": "%appdata%\\Orcus"}, "DefaultPrivilegesBuilderProperty": {"RequireAdministratorRights": "false"}, "DisableInstallationPromptBuilderProperty": {"IsDisabled": "false"}, "FrameworkVersionBuilderProperty": {"FrameworkVersion": "NET40"}, "HideFileBuilderProperty": {"HideFile": "false"}, "InstallationLocationBuilderProperty": {"Path": "%programfiles%\\Orcus\\Orcus.exe"}, "InstallBuilderProperty": {"Install": "false"}, "KeyloggerBuilderProperty": {"IsEnabled": "false"}, "MutexBuilderProperty": {"Mutex": "3b453ed253424c82a94898f42bb6a1be"}, "ProxyBuilderProperty": {"ProxyOption": "None", "ProxyAddress": null, "ProxyPort": "1080", "ProxyType": "2"}, "ReconnectDelayProperty": {"Delay": "10000"}, "RequireAdministratorPrivilegesInstallerBuilderProperty": {"RequireAdministratorPrivileges": "true"}, "RespawnTaskBuilderProperty": {"IsEnabled": "false", "TaskName": "Orcus Respawner"}, "ServiceBuilderProperty": {"Install": "false"}, "SetRunProgramAsAdminFlagBuilderProperty": {"SetFlag": "false"}, "WatchdogBuilderProperty": {"IsEnabled": "false", "Name": "OrcusWatchdog.exe", "WatchdogLocation": "AppData", "PreventFileDeletion": "false"}}
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: LisectAVT_2403002A_21.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486447662.00000266D0080000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1DAB000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1D9F000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.StaticCommands\obj\Release\Orcus.StaticCommands.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdbL source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486447662.00000266D0080000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1DAB000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1D9F000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Shared.Utilities\obj\Release\Orcus.Shared.Utilities.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Plugins\obj\Release\Orcus.Plugins.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Shared\obj\Release\Orcus.Shared.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Shared\obj\Release\Orcus.Shared.pdbDr source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Plugins\obj\Release\Orcus.Plugins.pdbD source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp
          Source: Joe Sandbox ViewIP Address: 45.157.69.156 45.157.69.156
          Source: Joe Sandbox ViewASN Name: GIGABITBANK-AS-APGigabitbankGlobalHK GIGABITBANK-AS-APGigabitbankGlobalHK
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: unknownTCP traffic detected without corresponding DNS query: 45.157.69.156
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://aia.startssl.com/certs/ca.crt0
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://aia.startssl.com/certs/sca.code3.crt06
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl.startssl.com/sca-code3.crl0#
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl.startssl.com/sfsca.crl0f
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.startssl.com00
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.startssl.com07
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: LisectAVT_2403002A_21.exe, 00000000.00000002.1549043595.00000239C88D1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://www.startssl.com/0P
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://www.startssl.com/policy0
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/I(.
          Source: LisectAVT_2403002A_21.exe, LisectAVT_2403002A_21.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708

          System Summary

          barindex
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPEMatched rule: Detects BackNet samples Author: Florian Roth
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects BackNet samples Author: Florian Roth
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPEMatched rule: Detects BackNet samples Author: Florian Roth
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects BackNet samples Author: Florian Roth
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects BackNet samples Author: Florian Roth
          Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: Process Memory Space: LisectAVT_2403002A_21.exe PID: 7616, type: MEMORYSTRMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          Source: Yara matchFile source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_21.exe PID: 7616, type: MEMORYSTR
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, SettingsData.csLong String: Length: 13804
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: 12_2_00007FFAACCB7CF012_2_00007FFAACCB7CF0
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: 12_2_00007FFAACCB75C012_2_00007FFAACCB75C0
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: 12_2_00007FFAACCC471912_2_00007FFAACCC4719
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: 12_2_00007FFAACCBD02812_2_00007FFAACCBD028
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: String function: 00007FFAACCBE7A0 appears 42 times
          Source: LisectAVT_2403002A_21.exeStatic PE information: No import functions for PE file found
          Source: LisectAVT_2403002A_21.exe.0.drStatic PE information: No import functions for PE file found
          Source: LisectAVT_2403002A_21.exe, 00000000.00000002.1548689657.00000239C6D57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename3 vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 00000000.00000000.1225902347.00000239C6A60000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename3 vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 00000000.00000002.1549132690.00000239E0F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename3 vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486447662.00000266D0080000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamestarksoft.aspen.dllP vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0060000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.Utilities.dllN vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.StaticCommands.dllJ vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamestarksoft.aspen.dllP vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1DAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamestarksoft.aspen.dllP vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.StaticCommands.dllJ vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.Utilities.dllN vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.Utilities.dllN vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.StaticCommands.dllJ vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2485147324.00000266CFEA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.StaticCommands.dllJ vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1D9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamestarksoft.aspen.dllP vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exeBinary or memory string: OriginalFilename3 vs LisectAVT_2403002A_21.exe
          Source: LisectAVT_2403002A_21.exe.0.drBinary or memory string: OriginalFilename3 vs LisectAVT_2403002A_21.exe
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: 12.2.LisectAVT_2403002A_21.exe.266e19b1a78.15.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
          Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: Process Memory Space: LisectAVT_2403002A_21.exe PID: 7616, type: MEMORYSTRMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
          Source: LisectAVT_2403002A_21.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: LisectAVT_2403002A_21.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 12.2.LisectAVT_2403002A_21.exe.266d1cd9d10.9.raw.unpack, CursorStreamCodec.csTask registration methods: 'CreateModifierTask'
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, RespawnTask.csTask registration methods: 'RegisterRespawnTask'
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, SettingsData.csBase64 encoded string: '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
          Source: LisectAVT_2403002A_21.exe, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: LisectAVT_2403002A_21.exe, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, User.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, TaskmanagerCommand.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/3@0/1
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeFile created: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeMutant created: NULL
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeMutant created: \Sessions\1\BaseNamedObjects\3b453ed253424c82a94898f42bb6a1be
          Source: LisectAVT_2403002A_21.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: LisectAVT_2403002A_21.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_21.exe "C:\Users\user\Desktop\LisectAVT_2403002A_21.exe"
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess created: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe "C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe"
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess created: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe "C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe" Jump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: LisectAVT_2403002A_21.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: LisectAVT_2403002A_21.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: LisectAVT_2403002A_21.exeStatic file information: File size 1058395 > 1048576
          Source: LisectAVT_2403002A_21.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: LisectAVT_2403002A_21.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486447662.00000266D0080000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1DAB000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1D9F000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.StaticCommands\obj\Release\Orcus.StaticCommands.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdbL source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486447662.00000266D0080000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1DAB000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1D9F000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Shared.Utilities\obj\Release\Orcus.Shared.Utilities.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Plugins\obj\Release\Orcus.Plugins.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Shared\obj\Release\Orcus.Shared.pdb source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Shared\obj\Release\Orcus.Shared.pdbDr source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: E:\Dokumente\Visual Studio 2015\Projects\Orcus\Source\Orcus.Plugins\obj\Release\Orcus.Plugins.pdbD source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, FileExplorerCommand.cs.Net Code: _003C_002Ector_003Eb__13_10
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, CodeCommand.cs.Net Code: ProcessCommand
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, PluginLoader.cs.Net Code: LoadPlugins System.Reflection.Assembly.Load(byte[])
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, PluginLoader.cs.Net Code: LoadPlugin System.Reflection.Assembly.Load(byte[])
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, PluginLoader.cs.Net Code: LoadPlugin
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_21.exe PID: 7616, type: MEMORYSTR
          Source: LisectAVT_2403002A_21.exeStatic PE information: 0xFBD57CEC [Wed Nov 21 07:12:44 2103 UTC]
          Source: LisectAVT_2403002A_21.exeStatic PE information: real checksum: 0x1047a2 should be: 0x10fa15
          Source: LisectAVT_2403002A_21.exe.0.drStatic PE information: real checksum: 0x1047a2 should be: 0x10fa15
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: 12_2_00007FFAACCC153C push ds; retf 12_2_00007FFAACCC153F
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeCode function: 12_2_00007FFAACCB54FA push esi; iretd 12_2_00007FFAACCB5537
          Source: LisectAVT_2403002A_21.exeStatic PE information: section name: .text entropy: 7.949799042457517
          Source: LisectAVT_2403002A_21.exe.0.drStatic PE information: section name: .text entropy: 7.949799042457517
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeFile created: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeJump to dropped file
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeMemory allocated: 239C6CA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeMemory allocated: 239E08D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeMemory allocated: 266CFF40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeMemory allocated: 266E99A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exe TID: 4072Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe TID: 7620Thread sleep time: -59333s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe TID: 7988Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe TID: 7988Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeThread delayed: delay time: 59333Jump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: LisectAVT_2403002A_21.exe, 00000000.00000002.1549132690.00000239E0F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}6
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2488651941.00000266EA207000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: LisectAVT_2403002A_21.exe, SIMPLE_RTK.csReference to suspicious API methods: GetProcAddress(LoadLibrary(R(_B("".Replace("", "0").Replace("", "1")))), R(_B("".Replace("", "0").Replace("", "1"))))
          Source: LisectAVT_2403002A_21.exe, SIMPLE_RTK.csReference to suspicious API methods: GetProcAddress(LoadLibrary(R(_B("".Replace("", "0").Replace("", "1")))), R(_B("".Replace("", "0").Replace("", "1"))))
          Source: LisectAVT_2403002A_21.exe, SIMPLE_RTK.csReference to suspicious API methods: VirtualProtect(procAddress, (UIntPtr)(ulong)gP.Length, 64u, out var lpflOldProtect)
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, HiddenDesktopApplicationManager.csReference to suspicious API methods: NativeMethods.MapVirtualKey((uint)scanCode, MapVirtualKeyMapTypes.MAPVK_VSC_TO_VK)
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, ProcessExtension.csReference to suspicious API methods: NativeMethods.OpenProcessToken(pToken, desiredAccess, ref TokenHandle)
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeProcess created: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe "C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe" Jump to behavior
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: LisectAVT_2403002A_21.exe, 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ProgMan
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_21.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_21.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeQueries volume information: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: 12.2.LisectAVT_2403002A_21.exe.266ea060000.21.raw.unpack, WindowsModules.cs.Net Code: SetTaskManager
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          12
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          12
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
          Process Injection
          NTDS1
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
          Software Packing
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1482419 Sample: LisectAVT_2403002A_21.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 21 Found malware configuration 2->21 23 Malicious sample detected (through community Yara rule) 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 7 other signatures 2->27 6 LisectAVT_2403002A_21.exe 4 2->6         started        process3 file4 13 C:\Users\user\...\LisectAVT_2403002A_21.exe, PE32+ 6->13 dropped 15 C:\Users\...\LisectAVT_2403002A_21.exe.log, CSV 6->15 dropped 17 LisectAVT_2403002A...exe:Zone.Identifier, ASCII 6->17 dropped 9 LisectAVT_2403002A_21.exe 2 6->9         started        process5 dnsIp6 19 45.157.69.156, 443, 49708 GIGABITBANK-AS-APGigabitbankGlobalHK Germany 9->19 29 Antivirus detection for dropped file 9->29 signatures7

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          LisectAVT_2403002A_21.exe100%AviraTR/AD.Orcus.qhuas
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe100%AviraTR/AD.Orcus.qhuas
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
          http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
          http://ocsp.thawte.com00%URL Reputationsafe
          http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          http://crl.startssl.com/sfsca.crl0f0%Avira URL Cloudsafe
          http://aia.startssl.com/certs/sca.code3.crt060%Avira URL Cloudsafe
          http://crl.startssl.com/sca-code3.crl0#0%Avira URL Cloudsafe
          http://ocsp.startssl.com070%Avira URL Cloudsafe
          http://www.startssl.com/0P0%Avira URL Cloudsafe
          http://aia.startssl.com/certs/ca.crt00%Avira URL Cloudsafe
          http://www.startssl.com/policy00%Avira URL Cloudsafe
          http://ocsp.startssl.com000%Avira URL Cloudsafe
          https://api.ipify.org/I(.0%Avira URL Cloudsafe

          Download Network PCAP: filteredfull

          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://aia.startssl.com/certs/sca.code3.crt06LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.startssl.com/sfsca.crl0fLisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.thawte.com/ThawteTimestampingCA.crl0LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/soap/encoding/LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://aia.startssl.com/certs/ca.crt0LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.startssl.com/sca-code3.crl0#LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.thawte.com0LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.startssl.com/0PLisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/wsdl/LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://ocsp.startssl.com07LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.ipify.org/I(.LisectAVT_2403002A_21.exe, 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.startssl.com/policy0LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.startssl.com00LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1CED000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A04000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486407155.00000266D0069000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1C2C000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D1A69000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486469050.00000266D0090000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2487626767.00000266E1BAA000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486344823.00000266D0000000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486553643.00000266D1970000.00000004.08000000.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLisectAVT_2403002A_21.exe, 00000000.00000002.1549043595.00000239C88D1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_21.exe, 0000000C.00000002.2486605773.00000266D19A1000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          45.157.69.156
          unknownGermany
          136933GIGABITBANK-AS-APGigabitbankGlobalHKtrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1482419
          Start date and time:2024-07-25 22:42:29 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 50s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:17
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:LisectAVT_2403002A_21.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@3/3@0/1
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 97%
          • Number of executed functions: 12
          • Number of non-executed functions: 2
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target LisectAVT_2403002A_21.exe, PID 4692 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • VT rate limit hit for: LisectAVT_2403002A_21.exe
          TimeTypeDescription
          16:43:36API Interceptor5x Sleep call for process: LisectAVT_2403002A_21.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          45.157.69.156LisectAVT_2403002A_298.exeGet hashmaliciousOrcusBrowse
            Y47C2y2r2M.exeGet hashmaliciousOrcusBrowse
              ErLDWpuujl.exeGet hashmaliciousOrcusBrowse
                iGAiIpqjsJ.exeGet hashmaliciousOrcusBrowse
                  hWRjLCvbwG.exeGet hashmaliciousOrcusBrowse
                    hWRjLCvbwG.exeGet hashmaliciousOrcusBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      GIGABITBANK-AS-APGigabitbankGlobalHKLisectAVT_2403002A_298.exeGet hashmaliciousOrcusBrowse
                      • 45.157.69.156
                      Y47C2y2r2M.exeGet hashmaliciousOrcusBrowse
                      • 45.157.69.156
                      Installer.exeGet hashmaliciousUnknownBrowse
                      • 45.195.148.46
                      Installer_1.exeGet hashmaliciousUnknownBrowse
                      • 45.195.148.46
                      Installer.exeGet hashmaliciousUnknownBrowse
                      • 45.195.148.46
                      S04307164.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                      • 103.144.219.16
                      PURCHASING ORDER.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                      • 103.144.219.16
                      CC-CREDIT CARD-itineraries.exeGet hashmaliciousFormBookBrowse
                      • 45.157.71.60
                      ErLDWpuujl.exeGet hashmaliciousOrcusBrowse
                      • 45.157.69.156
                      iGAiIpqjsJ.exeGet hashmaliciousOrcusBrowse
                      • 45.157.69.156
                      No context
                      No context
                      Process:C:\Users\user\Desktop\LisectAVT_2403002A_21.exe
                      File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):1058395
                      Entropy (8bit):7.926055218172834
                      Encrypted:false
                      SSDEEP:24576:+e3veFbXAD9zWi4MxO6m6b/fYLGACf9Dtc2PyYB:+e/etqzXOu1Ff9DtTy
                      MD5:C4F84399032146F1645A388E500DD52B
                      SHA1:24D665E81C3DB04A2BC73C0976600D30EA48D81A
                      SHA-256:2D416B2FD87F92D3E917162CEB32A9455AA6D6E00A39B5B41AC8412E83A1045A
                      SHA-512:47D92961523B125743FC8D4DBB9AFFC276421F69FE963B6ED214F07B8B7BBE89D9CCD3CCDEBF6A13B63E6112641F326ADF8233ECE55D939B653D6CBB246BFC91
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....|............"...0......2........... .....@..... .......................@.......G....`...@......@............... ..................................N0..............P,........................................................................... ..H............text........ ...................... ..`.rsrc...N0.......2..................@..@........................................H.......4....W..........................................................F.(...+(...+s....*&(.......*.0..........(....,ar...prc..prg..p(....rk..pro..po......o.....[.....+........+.........Z.o.....(........X......2...*rs..prc..prg..p(....rk..pro..po......o.....[...+.......+........Z.o.....(........X.....2..*..0..<.......s.......+.....o.....(....o .....X...o....2.(!....o"...o#...*.0..........r...prc..prg..p(....rk..pro..po....(....(....(....ry..prc..prg..p(....rk..pro..po....(....(....(
                      Process:C:\Users\user\Desktop\LisectAVT_2403002A_21.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Users\user\Desktop\LisectAVT_2403002A_21.exe
                      File Type:CSV text
                      Category:modified
                      Size (bytes):660
                      Entropy (8bit):5.38575581059626
                      Encrypted:false
                      SSDEEP:12:Q3La/KDLI4MWuPXcp151KDLI4MN5I/k1BakvoDLI4MWuPakEOsk7v:ML9E4KQ71qE4GIs0E4KD
                      MD5:E918A9A81162ACCFD3E06E02E11CB6C8
                      SHA1:10F02DAEDB20582256A5601EE8898CFA8DC2BDD5
                      SHA-256:912110B9095CDC4B124444955DD3ABAEFFB7C309A242A4B05299A26EC9920A21
                      SHA-512:78D9CABEFE698E54197D7D03ABC3AC36F3AAA2DE80CD79AD780B67324F36D7CA3560F642873E8C20F2BB27A9C892D9A2F21898E4B469FAFE35BA0FAEE8A7936A
                      Malicious:true
                      Reputation:moderate, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..
                      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.926055218172834
                      TrID:
                      • Win64 Executable GUI Net Framework (217006/5) 49.88%
                      • Win64 Executable GUI (202006/5) 46.43%
                      • Win64 Executable (generic) (12005/4) 2.76%
                      • Generic Win/DOS Executable (2004/3) 0.46%
                      • DOS Executable Generic (2002/1) 0.46%
                      File name:LisectAVT_2403002A_21.exe
                      File size:1'058'395 bytes
                      MD5:c4f84399032146f1645a388e500dd52b
                      SHA1:24d665e81c3db04a2bc73c0976600d30ea48d81a
                      SHA256:2d416b2fd87f92d3e917162ceb32a9455aa6d6e00a39b5b41ac8412e83a1045a
                      SHA512:47d92961523b125743fc8d4dbb9affc276421f69fe963b6ed214f07b8b7bbe89d9ccd3ccdebf6a13b63e6112641f326adf8233ece55d939b653d6cbb246bfc91
                      SSDEEP:24576:+e3veFbXAD9zWi4MxO6m6b/fYLGACf9Dtc2PyYB:+e/etqzXOu1Ff9DtTy
                      TLSH:D23512C1D5644A33C25582BFF1F24C228F26DE76B85AC5FABD0DB27B587FB648221601
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....|............"...0......2........... .....@..... .......................@.......G....`...@......@............... .....
                      Icon Hash:070f7f7f7f7e7e7e
                      Entrypoint:0x140000000
                      Entrypoint Section:
                      Digitally signed:true
                      Imagebase:0x140000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0xFBD57CEC [Wed Nov 21 07:12:44 2103 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:
                      Signature Valid:
                      Signature Issuer:
                      Signature Validation Error:
                      Error Number:
                      Not Before, Not After
                        Subject Chain
                          Version:
                          Thumbprint MD5:
                          Thumbprint SHA-1:
                          Thumbprint SHA-256:
                          Serial:
                          Instruction
                          dec ebp
                          pop edx
                          nop
                          add byte ptr [ebx], al
                          add byte ptr [eax], al
                          add byte ptr [eax+eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xf00000x1304e.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0xffa000x2c50.rsrc
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xee48c0x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xec4c80xec6007c0241f47cf7acc3a7a91e738ec76c89False0.8862642946853516data7.949799042457517IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xf00000x1304e0x1320026facbc772a5f0f6af7f49f54f0b635cFalse0.6797002655228758data6.844320703730098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xf02b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.375
                          RT_ICON0xf07180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.2626641651031895
                          RT_ICON0xf17c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.1658713692946058
                          RT_ICON0xf3d680x4907PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9969510564322012
                          RT_ICON0xf86700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.4237588652482269
                          RT_ICON0xf8ad80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.2406191369606004
                          RT_ICON0xf9b800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.17365145228215767
                          RT_ICON0xfc1280x699ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9888305348028701
                          RT_GROUP_ICON0x102ac80x3edataChineseChina0.8225806451612904
                          RT_GROUP_ICON0x102b080x3edataChineseChina0.8548387096774194
                          RT_VERSION0x102b480x31cdata0.4396984924623116
                          RT_MANIFEST0x102e640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                          Language of compilation systemCountry where language is spokenMap
                          ChineseChina

                          Download Network PCAP: filteredfull

                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                          2024-07-25T22:43:41.709292+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970213.85.23.86192.168.2.7
                          2024-07-25T22:44:19.643395+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970713.85.23.86192.168.2.7
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 25, 2024 22:44:53.769771099 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:44:53.769915104 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:44:53.769999981 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:44:53.874803066 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:44:53.874991894 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:11.809536934 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:11.855196953 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:45:11.943357944 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:11.995861053 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:45:20.119024038 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:20.167721987 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:45:20.167737961 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:20.214600086 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:45:27.686553955 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:27.730226040 CEST49708443192.168.2.745.157.69.156
                          Jul 25, 2024 22:45:27.929785967 CEST4434970845.157.69.156192.168.2.7
                          Jul 25, 2024 22:45:27.980299950 CEST49708443192.168.2.745.157.69.156

                          Click to jump to process

                          Click to jump to process

                          • File
                          • Registry
                          • Network

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:16:43:20
                          Start date:25/07/2024
                          Path:C:\Users\user\Desktop\LisectAVT_2403002A_21.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_21.exe"
                          Imagebase:0x239c6970000
                          File size:1'058'395 bytes
                          MD5 hash:C4F84399032146F1645A388E500DD52B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true
                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                          Target ID:12
                          Start time:18:21:26
                          Start date:25/07/2024
                          Path:C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\AppData\Local\LisectAVT_2403002A_21.exe"
                          Imagebase:0x266cfb10000
                          File size:1'058'395 bytes
                          MD5 hash:C4F84399032146F1645A388E500DD52B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_OrcusRat, Description: Yara detected Orcus RAT, Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                          • Rule: MAL_BackNet_Nov18_1, Description: Detects BackNet samples, Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: RAT_Orcus, Description: unknown, Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                          • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000C.00000002.2488343996.00000266EA060000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_OrcusRat, Description: Yara detected Orcus RAT, Source: 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                          • Rule: RAT_Orcus, Description: unknown, Source: 0000000C.00000002.2487626767.00000266E19A1000.00000004.00000800.00020000.00000000.sdmp, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                          Antivirus matches:
                          • Detection: 100%, Avira
                          Reputation:low
                          Has exited:false

                          Executed Functions

                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5ce8fd3db39ef764b7e165b7107c7dfe1e4820dd7411bbd6dc7c3ab54d524e64
                          • Instruction ID: 8b951c97f3925bbd710f913e6020b46f0048e0a879f9b5dfc92479a94ea04a64
                          • Opcode Fuzzy Hash: 5ce8fd3db39ef764b7e165b7107c7dfe1e4820dd7411bbd6dc7c3ab54d524e64
                          • Instruction Fuzzy Hash: C5514661A0DA868FF755DF7884696B97BE1EF53750B0880FBC08ECB193DE18984983D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9ee980303bbb0ebc986cf0b7e14196b5be9480b80f4d779c12e04e8f4f26b3a4
                          • Instruction ID: 6d7ab9e4b43d11b609b98e6aed5c5ccaa4ed51a8b551271e25eb491f6f503893
                          • Opcode Fuzzy Hash: 9ee980303bbb0ebc986cf0b7e14196b5be9480b80f4d779c12e04e8f4f26b3a4
                          • Instruction Fuzzy Hash: FD31A521B1990A4FFB44BFB8C0166B9A286EFC6794F4040B9D44EC72C7DD2CE8464392
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72d42431271415504fa9e830d3a454bc7f1d26e1aac32903e82e5cae09c6c1fa
                          • Instruction ID: 0b2dae94d7e3342d63b0b80ec55a0fccae6f11bdf1c5211ba5995112f7f48814
                          • Opcode Fuzzy Hash: 72d42431271415504fa9e830d3a454bc7f1d26e1aac32903e82e5cae09c6c1fa
                          • Instruction Fuzzy Hash: 6F2128A2B1DB854FE348DF3C485D275BBD2EF9A65070942FBD04DCB2A3DE1898464381
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c787aaee64debbd9a00c40f29f0f393f3da843301fff8b93eb2667e5cdc20fbf
                          • Instruction ID: 96f68e8f95d9afe75355592265b8b5e8b35a41bb9506193b11b1decf77e85064
                          • Opcode Fuzzy Hash: c787aaee64debbd9a00c40f29f0f393f3da843301fff8b93eb2667e5cdc20fbf
                          • Instruction Fuzzy Hash: AF214CA2B18A454FF348DF3C485D675F7C2EF9965070941BAD04DC72A3DE189C424380
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 530bed01434f26a03622b9e9028b057059c3f4a9a25deb52a1de996cfbffc9e1
                          • Instruction ID: 845c14245ca30ba208d18e557b04fc7d78f12701fdda080c3f24a73dc7e6a49f
                          • Opcode Fuzzy Hash: 530bed01434f26a03622b9e9028b057059c3f4a9a25deb52a1de996cfbffc9e1
                          • Instruction Fuzzy Hash: 9401F75394F6921FE3429B788C695D16FE5DF8B94070941E6E089C7093C80C580F83A1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2cf62f3d2a0dd74c50208f97cc5fb64cebee2488ba72ba76dd910d53c9461d00
                          • Instruction ID: eca0d4b23f463ca69bdfd5365971978673c4604b728bf91631ebb45d43818097
                          • Opcode Fuzzy Hash: 2cf62f3d2a0dd74c50208f97cc5fb64cebee2488ba72ba76dd910d53c9461d00
                          • Instruction Fuzzy Hash: 6301F25584F3CABEF7935B6418240B23FB5EE43659B0840E7E0DD86083D908051DC3A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d918acdb027101ef8fe6170b7db16aea2c9537cfa48ad219fdb812173996e94
                          • Instruction ID: 3ad4934110e9ff897f0c3cc692864f388e9167051d75e958bc1bf081986f95a6
                          • Opcode Fuzzy Hash: 0d918acdb027101ef8fe6170b7db16aea2c9537cfa48ad219fdb812173996e94
                          • Instruction Fuzzy Hash: 6DF0F47180E259AEF7252B70A85A7FA7F65EF43791F0441B7F00E42493CA1D681882D1

                          Non-executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1549416610.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffaacca0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID: (08$8,8$P/8$/8
                          • API String ID: 0-727978438
                          • Opcode ID: 00d62a454a6be4bbbd110ad85f23674b4eb72e5d116882c181259a4f0aacb5c0
                          • Instruction ID: 2e9d7b554a127ca3bd31d6d94d340a198b78ca0a4bc285624546c440c3997f75
                          • Opcode Fuzzy Hash: 00d62a454a6be4bbbd110ad85f23674b4eb72e5d116882c181259a4f0aacb5c0
                          • Instruction Fuzzy Hash: 5131A2D290F7D16FF3065BA818191A56F92EF53A80B4880FBE0CD4B5A7A809D90D87C6

                          Execution Graph

                          Execution Coverage

                          Dynamic/Packed Code Coverage

                          Signature Coverage

                          Execution Coverage:19%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:6
                          Total number of Limit Nodes:0
                          Show Legend
                          Hide Nodes/Edges
                          execution_graph 11781 7ffaaccb20aa 11782 7ffaaccb20b9 VirtualProtect 11781->11782 11784 7ffaaccb2192 11782->11784 11785 7ffaaccb1c6a 11786 7ffaaccb1c77 LoadLibraryA 11785->11786 11788 7ffaaccb1dbe 11786->11788

                          Executed Functions

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ffaaccc4719-7ffaaccc473e 2 7ffaaccc4788-7ffaaccc4789 0->2 3 7ffaaccc4740-7ffaaccc474e 0->3 5 7ffaaccc478a-7ffaaccc4795 2->5 6 7ffaaccc4751-7ffaaccc4756 2->6 7 7ffaaccc4750 3->7 8 7ffaaccc47cf-7ffaaccc4805 3->8 11 7ffaaccc4797-7ffaaccc479c 5->11 12 7ffaaccc4806-7ffaaccc481b 5->12 9 7ffaaccc46d9-7ffaaccc4715 call 7ffaaccbe7a0 6->9 10 7ffaaccc4759-7ffaaccc4785 6->10 7->6 8->12 21 7ffaaccc4716 9->21 10->2 14 7ffaaccc481d-7ffaaccc486b 11->14 15 7ffaaccc479e-7ffaaccc47a1 11->15 12->14 26 7ffaaccc486d-7ffaaccc4880 14->26 27 7ffaaccc4881-7ffaaccc48b4 14->27 15->8 21->21 26->27 33 7ffaaccc48bd-7ffaaccc48c0 call 7ffaaccbe0e0 27->33 35 7ffaaccc48c5-7ffaaccc4928 call 7ffaaccbe0e8 call 7ffaaccbfa20 33->35 44 7ffaaccc492a-7ffaaccc493d 35->44 45 7ffaaccc493e-7ffaaccc49d9 call 7ffaaccbe0d0 call 7ffaaccbe0d8 call 7ffaaccbdf20 call 7ffaaccc0eb0 35->45 44->45 63 7ffaaccc49db-7ffaaccc49ee 45->63 64 7ffaaccc49ef-7ffaaccc4a8a call 7ffaaccbe108 call 7ffaaccbe110 call 7ffaaccbdf20 call 7ffaaccc0eb0 45->64 63->64 82 7ffaaccc4a8c-7ffaaccc4a9f 64->82 83 7ffaaccc4aa0-7ffaaccc4b3b call 7ffaaccbe128 call 7ffaaccbe130 call 7ffaaccbdf20 call 7ffaaccc0eb0 64->83 82->83 100 7ffaaccc4b3d-7ffaaccc4b4d 83->100 101 7ffaaccc4b51-7ffaaccc4bec call 7ffaaccbe0f8 call 7ffaaccbe100 call 7ffaaccbdf20 call 7ffaaccc0eb0 83->101 118 7ffaaccc4c02-7ffaaccc4c41 call 7ffaaccbe0c0 101->118 119 7ffaaccc4bee-7ffaaccc4c01 101->119 126 7ffaaccc4c46-7ffaaccc4c49 call 7ffaaccbe0c8 118->126 119->118 128 7ffaaccc4c4e-7ffaaccc4c9d call 7ffaaccbdf20 call 7ffaaccc0eb0 126->128 136 7ffaaccc4cb3-7ffaaccc4cce 128->136 137 7ffaaccc4c9f-7ffaaccc4cb2 128->137 137->136
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2489229629.00007FFAACCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffaaccb0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID: +$0#%$0#%$0#%$0#%$0#%$0#%$0#%$s$s$~
                          • API String ID: 0-3098730487
                          • Opcode ID: 19cfa6c094875f4e04f8cdb47e2596a2df7e6b82ff5f3b28cff1d8268bb6e09e
                          • Instruction ID: 9e42042784a18eefb87ca6f870a52e28556d3902bd1623901757e9ec25d38960
                          • Opcode Fuzzy Hash: 19cfa6c094875f4e04f8cdb47e2596a2df7e6b82ff5f3b28cff1d8268bb6e09e
                          • Instruction Fuzzy Hash: DE121451A1DF8E4FF795EB7C44192747BC1EF9A200F4446BAE48DC3297DD18E8498382
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2489229629.00007FFAACCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffaaccb0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0008ad84ee8549e03b7effe8e7211b4214500ae30ea74c438529dd16250b254d
                          • Instruction ID: 5b6044005cdafb9fe07f4ddf50a618176403c0d067dd36dc42e1557929467279
                          • Opcode Fuzzy Hash: 0008ad84ee8549e03b7effe8e7211b4214500ae30ea74c438529dd16250b254d
                          • Instruction Fuzzy Hash: 79428D30619919DFEAA4EF6DC094B7937E2FF5A300F5445B8E44EC76A2DE24EC058B90
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2489229629.00007FFAACCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffaaccb0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e4bedd366eeaa486de2884b322a6b2cd13ced21cfe45a9841141d73a43f40c9d
                          • Instruction ID: 41d2587ace882ac617df42541e5f6921b254bf3df079042ade02009575af83aa
                          • Opcode Fuzzy Hash: e4bedd366eeaa486de2884b322a6b2cd13ced21cfe45a9841141d73a43f40c9d
                          • Instruction Fuzzy Hash: 95229C30619A49CFEA94EF79C094B7977E2FF5A300F1445B9E44EC76A2DE28EC058781
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2489229629.00007FFAACCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffaaccb0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: a27eac8045f985a17f4de14f8655e92f72cecc0d99938e1959db37755367d5ef
                          • Instruction ID: 8d4e8ca5d8d040e53a08dcdf25f97c0374d6874d249e170106f85a4fef0e887d
                          • Opcode Fuzzy Hash: a27eac8045f985a17f4de14f8655e92f72cecc0d99938e1959db37755367d5ef
                          • Instruction Fuzzy Hash: 9851C770518A8D8FEB98DF68C8457F57BE1FF59311F00816AE84DC7292DB74D8458B81
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2489229629.00007FFAACCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffaaccb0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: cf35a3563a77beee2121e54db3f7e5c337567874e1e5d33067932dee123501f5
                          • Instruction ID: 66293990609329e08f6249b4c2576e09a5b53bc01770f404d41b769bcf9e3af9
                          • Opcode Fuzzy Hash: cf35a3563a77beee2121e54db3f7e5c337567874e1e5d33067932dee123501f5
                          • Instruction Fuzzy Hash: 7241F73190DB888FD719DFA898466E9BFF1EF56321F0442AFD049C3193DB646846C791

                          Non-executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2489229629.00007FFAACCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffaaccb0000_LisectAVT_2403002A_21.jbxd
                          Similarity
                          • API ID:
                          • String ID: _$rN_^
                          • API String ID: 0-1922656240
                          • Opcode ID: a07717429569260d60cca637e7806dea8069c6bbd6667462957f9122f9d59884
                          • Instruction ID: 4fbe2a3975ff1082969b76c5110e6fb1f5ee76df840a4a5376a8a0340b0f3888
                          • Opcode Fuzzy Hash: a07717429569260d60cca637e7806dea8069c6bbd6667462957f9122f9d59884
                          • Instruction Fuzzy Hash: AFE10E8790E6D28AF71167FDB8152F56F90DF43335B0881F7D18D8E09B9A48E84E82D9