Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CLNGs0rZD4.exe

Overview

General Information

Sample name:CLNGs0rZD4.exe
renamed because original name is a hash value
Original sample name:ba0db716b761edf63293ab94b5e74f0f.exe
Analysis ID:1541865
MD5:ba0db716b761edf63293ab94b5e74f0f
SHA1:4a21b911f4c1e9b86796377fcdaccd05e0697776
SHA256:8c9936c01e1adef5c7a8763c8f095f0ed9053b800e212294fc29c05d683b2ea7
Tags:64exe
Infos:

Detection

Sliver
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Sliver Implants
AI detected suspicious sample
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Writes to foreign memory regions
Creates a process in suspended mode (likely to inject code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match

Classification

  • System is w10x64
  • CLNGs0rZD4.exe (PID: 5012 cmdline: "C:\Users\user\Desktop\CLNGs0rZD4.exe" MD5: BA0DB716B761EDF63293AB94B5E74F0F)
    • conhost.exe (PID: 3960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • explorer.exe (PID: 5264 cmdline: "C:\Windows\explorer.exe" MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SliverAccording to VK9 Seecurity, Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.sliver
No configs have been found
SourceRuleDescriptionAuthorStrings
CLNGs0rZD4.exeWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5ebfca:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
SourceRuleDescriptionAuthorStrings
00000003.00000002.3405497706.000000C000138000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
    00000003.00000002.3404033112.0000000004B71000.00000002.10000000.00040000.00000000.sdmpMulti_Trojan_Bishopsliver_42298c4aunknownunknown
    • 0x7296a:$a1: ).RequestResend
    • 0x66e69:$a2: ).GetPrivInfo
    00000003.00000002.3402461880.0000000003C2F000.00000004.00001000.00020000.00000000.sdmpMulti_Trojan_Bishopsliver_42298c4aunknownunknown
    • 0x74492:$a1: ).RequestResend
    • 0x68991:$a2: ).GetPrivInfo
    00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x534fca:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    00000000.00000000.2159400728.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x534fca:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    Click to see the 4 entries
    SourceRuleDescriptionAuthorStrings
    0.0.CLNGs0rZD4.exe.7ff6e8840000.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x5ebfca:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    0.2.CLNGs0rZD4.exe.7ff6e8840000.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x5ebfca:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-25T09:01:15.627014+020028500231A Network Trojan was detected34.22.231.73443192.168.2.655400TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: CLNGs0rZD4.exeReversingLabs: Detection: 57%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: CLNGs0rZD4.exeJoe Sandbox ML: detected
    Source: CLNGs0rZD4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

    Networking

    barindex
    Source: C:\Windows\explorer.exeNetwork Connect: 34.22.231.73 443Jump to behavior
    Source: Joe Sandbox ViewASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS
    Source: Network trafficSuricata IDS: 2850023 - Severity 1 - ETPRO JA3 Hash - Possible Ligolo Server/Golang Binary Response : 34.22.231.73:443 -> 192.168.2.6:55400
    Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownTCP traffic detected without corresponding DNS query: 34.22.231.73
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
    Source: unknownNetwork traffic detected: HTTP traffic on port 55400 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55400
    Source: unknownNetwork traffic detected: HTTP traffic on port 55395 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55395
    Source: explorer.exe, 00000003.00000002.3405497706.000000C000182000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_e9d2a3c7-c

    System Summary

    barindex
    Source: CLNGs0rZD4.exe, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 0.0.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 0.2.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000003.00000002.3404033112.0000000004B71000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown
    Source: 00000003.00000002.3402461880.0000000003C2F000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown
    Source: 00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000000.00000000.2159400728.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000003.00000002.3401343293.0000000000800000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000000.00000002.2171227596.000001A96A531000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTRMatched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown
    Source: CLNGs0rZD4.exeStatic PE information: Number of sections : 19 > 10
    Source: CLNGs0rZD4.exe, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 0.0.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 0.2.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000003.00000002.3404033112.0000000004B71000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14
    Source: 00000003.00000002.3402461880.0000000003C2F000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14
    Source: 00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000000.00000000.2159400728.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000003.00000002.3401343293.0000000000800000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000000.00000002.2171227596.000001A96A531000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTRMatched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14
    Source: classification engineClassification label: mal96.troj.evad.winEXE@4/1@1/1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3960:120:WilError_03
    Source: C:\Windows\explorer.exeFile opened: C:\Windows\system32\9953560394ab05fca6ab04dd8b46ba74ee75865b8a04b4dbd463b820e163b64aAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeProcess created: C:\Windows\explorer.exe
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeProcess created: C:\Windows\explorer.exeJump to behavior
    Source: CLNGs0rZD4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: CLNGs0rZD4.exeReversingLabs: Detection: 57%
    Source: unknownProcess created: C:\Users\user\Desktop\CLNGs0rZD4.exe "C:\Users\user\Desktop\CLNGs0rZD4.exe"
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"Jump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
    Source: CLNGs0rZD4.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: CLNGs0rZD4.exeStatic file information: File size 7852704 > 1048576
    Source: CLNGs0rZD4.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x53b600
    Source: CLNGs0rZD4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Source: CLNGs0rZD4.exeStatic PE information: section name: .xdata
    Source: CLNGs0rZD4.exeStatic PE information: section name: /4
    Source: CLNGs0rZD4.exeStatic PE information: section name: /19
    Source: CLNGs0rZD4.exeStatic PE information: section name: /31
    Source: CLNGs0rZD4.exeStatic PE information: section name: /45
    Source: CLNGs0rZD4.exeStatic PE information: section name: /57
    Source: CLNGs0rZD4.exeStatic PE information: section name: /70
    Source: CLNGs0rZD4.exeStatic PE information: section name: /81
    Source: CLNGs0rZD4.exeStatic PE information: section name: /97
    Source: CLNGs0rZD4.exeStatic PE information: section name: /113
    Source: C:\Windows\explorer.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: explorer.exe, 00000003.00000002.3401745300.0000000000E83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeNetwork Connect: 34.22.231.73 443Jump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeMemory allocated: C:\Windows\explorer.exe base: 800000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeMemory written: PID: 5264 base: 800000 value: E8Jump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeThread register set: target process: 5264Jump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeMemory written: C:\Windows\explorer.exe base: 800000Jump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"Jump to behavior
    Source: C:\Users\user\Desktop\CLNGs0rZD4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000003.00000002.3405497706.000000C000138000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000003.00000002.3405497706.000000C000138000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    511
    Process Injection
    511
    Process Injection
    11
    Input Capture
    1
    Security Software Discovery
    Remote Services11
    Input Capture
    2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    DLL Side-Loading
    LSASS Memory2
    System Information Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    CLNGs0rZD4.exe58%ReversingLabsWin64.Exploit.DonutMarte
    CLNGs0rZD4.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    198.187.3.20.in-addr.arpa
    unknown
    unknowntrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      34.22.231.73
      unknownUnited States
      2686ATGS-MMD-ASUStrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1541865
      Start date and time:2024-10-25 08:58:15 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 16s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:CLNGs0rZD4.exe
      renamed because original name is a hash value
      Original Sample Name:ba0db716b761edf63293ab94b5e74f0f.exe
      Detection:MAL
      Classification:mal96.troj.evad.winEXE@4/1@1/1
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target CLNGs0rZD4.exe, PID 5012 because it is empty
      • Execution Graph export aborted for target explorer.exe, PID 5264 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: CLNGs0rZD4.exe
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
      • 34.160.144.191
      file.exeGet hashmaliciousCredential FlusherBrowse
      • 34.160.144.191
      yakuza.i686.elfGet hashmaliciousUnknownBrowse
      • 57.208.205.52
      file.exeGet hashmaliciousCredential FlusherBrowse
      • 34.160.144.191
      file.exeGet hashmaliciousCredential FlusherBrowse
      • 34.160.144.191
      la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
      • 33.175.30.229
      la.bot.sh4.elfGet hashmaliciousUnknownBrowse
      • 51.247.216.53
      la.bot.sparc.elfGet hashmaliciousUnknownBrowse
      • 33.219.10.156
      la.bot.sparc.elfGet hashmaliciousUnknownBrowse
      • 33.215.156.135
      la.bot.arm.elfGet hashmaliciousUnknownBrowse
      • 32.248.99.75
      No context
      No context
      Process:C:\Users\user\Desktop\CLNGs0rZD4.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):71
      Entropy (8bit):4.259651036428801
      Encrypted:false
      SSDEEP:3:EWWFNhSjmKSvkEXAxZUPXqv:/WFJKSvxXALUc
      MD5:611F67535318AB6F0DFB822A52B50029
      SHA1:75272CC1E502DE9BC20A4719D38339B67D4C2704
      SHA-256:D41EF05BDE64BD2BBF40343A2B04ACDF4C197FEA4A5A769FCE9DB37D69F6F62B
      SHA-512:3FA1198D57277EF16750CDD62BBD171002F5C2387B6A4CA7BDF42EFB81C09BF63A7E4AB9DE8EAA7F1690F50CC61C0D62383BAADD0FA16F74823ECA61245CB17B
      Malicious:false
      Reputation:low
      Preview:Process hollowing successful...Error retrieving the function address...
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):7.707542219497593
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:CLNGs0rZD4.exe
      File size:7'852'704 bytes
      MD5:ba0db716b761edf63293ab94b5e74f0f
      SHA1:4a21b911f4c1e9b86796377fcdaccd05e0697776
      SHA256:8c9936c01e1adef5c7a8763c8f095f0ed9053b800e212294fc29c05d683b2ea7
      SHA512:2c06454c386d6a5717ad5a9817241da8e0d29c99070397a212c3a888ec0006259c30b1437c1f65f48c56c4aef846983571470c54be1c64603afe137edf58f735
      SSDEEP:196608:KT7ZV5+lZ1b1fJfLwROEzc8FgLWHNccyOl664Ku:E7ZV4Vb9JfNLWHqOl2Ku
      TLSH:B586D04369DB0DEAC9D777B8A1D31335A734FD748B295E2E6A08C2315D636C4AE1EB00
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...6..g..e.._....&....+.j....b................@.............................Pf......bx...`... ............................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x1400013f0
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x6710E636 [Thu Oct 17 10:25:58 2024 UTC]
      TLS Callbacks:0x4000c250, 0x1, 0x4000c220, 0x1
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:0c6876a5b72fd128d8396ebb19e1403f
      Instruction
      dec eax
      sub esp, 28h
      dec eax
      mov eax, dword ptr [005F9275h]
      mov dword ptr [eax], 00000000h
      call 00007F92DCF1093Fh
      nop
      nop
      dec eax
      add esp, 28h
      ret
      nop dword ptr [eax]
      dec eax
      sub esp, 28h
      call 00007F92DCF269F4h
      dec eax
      cmp eax, 01h
      sbb eax, eax
      dec eax
      add esp, 28h
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      dec eax
      lea ecx, dword ptr [00000009h]
      jmp 00007F92DCF10B99h
      nop dword ptr [eax+00h]
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      push ebp
      dec eax
      mov ebp, esp
      dec eax
      sub esp, 10h
      dec eax
      mov dword ptr [ebp+10h], ecx
      mov dword ptr [ebp-04h], 00000000h
      jmp 00007F92DCF10BDBh
      ror dword ptr [ebp-04h], 0Dh
      dec eax
      mov eax, dword ptr [ebp+10h]
      dec eax
      lea edx, dword ptr [eax+01h]
      dec eax
      mov dword ptr [ebp+10h], edx
      movzx eax, byte ptr [eax]
      movsx eax, al
      add dword ptr [ebp-04h], eax
      dec eax
      mov eax, dword ptr [ebp+10h]
      movzx eax, byte ptr [eax]
      test al, al
      jne 00007F92DCF10B9Eh
      mov eax, dword ptr [ebp-04h]
      dec eax
      add esp, 10h
      pop ebp
      ret
      push ebp
      push ebx
      dec eax
      sub esp, 38h
      dec eax
      lea ebp, dword ptr [esp+30h]
      dec eax
      mov dword ptr [ebp+20h], ecx
      dec eax
      mov dword ptr [ebp+28h], edx
      dec esp
      mov dword ptr [ebp+30h], eax
      dec eax
      mov eax, dword ptr [ebp+20h]
      dec eax
      mov ecx, eax
      call 00007F92DCFB2610h
      mov dword ptr [ebp-04h], 00000000h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x6220000xef0.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6050000xb424.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x6250000x1668.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x5f8fc00x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x6223b80x378.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xb68400xb6a0035a8622c1f25fa12273d163afb31e89eFalse0.3593135053045859data6.159599610012007IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0xb80000x53b5400x53b600bbc7b67f17ec59b45d1ff182290198ebunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x5f40000x10da00x10e0071382564c244d4f5dbe35df126897468False0.20555555555555555data4.749233396460413IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .pdata0x6050000xb4240xb6000b6451bba993e7c525c6f5f5eb1c90b8False0.5174922733516484data5.922992501251431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .xdata0x6110000xf6840xf800867144ec15d51a772c91f8f16266364aFalse0.19113848286290322data4.90458054826019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .bss0x6210000xc300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x6220000xef00x10005aa53a2b95e6135e36d50715b17e32caFalse0.30517578125data4.214781457566957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .CRT0x6230000x600x200038368acbccf3c6e34c624014cb5443fFalse0.068359375data0.28655982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x6240000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x6250000x16680x1800c54a660fbd303bf907ce1afb0d80f6a7False0.3880208333333333data5.339616866097871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /40x6270000x9a00xa004ae6a4da390fc962cb8931594fa49232False0.21875data1.889885253606734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /190x6280000x1882f0x18a0040c3e91f0b4396c980ffefa978624cc2False0.4167988578680203data5.797910565234163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /310x6410000x4a8b0x4c005c65662b19f25e504b35d66599f0b2f6False0.2235814144736842data4.797902788134637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /450x6460000xa7910xa8003d534f8a2344fe7140101142f48f69efFalse0.5103004092261905data5.020152728084882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /570x6510000x1f300x20009f5dded51f86ea7ccc27498a63a884d8False0.27734375data4.5829107784340835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /700x6530000x3d20x40014ef477196f4ba66a23cdec12676e5afFalse0.451171875data4.713819195319815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /810x6540000x205f0x2200810130721370e4cb453b4bc9f4c4f986False0.14384191176470587data4.638170973045477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /970x6570000xcbb80xcc008cf985070f3706b8d7c36d886ec50099False0.5113166360294118data5.9047125609389735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /1130x6640000x61f0x8000c0942fcddda2df4b0cd1e488c044a1eFalse0.5673828125data4.93272687244242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllCloseHandle, DeleteCriticalSection, EnterCriticalSection, FormatMessageA, GetLastError, GetModuleHandleW, GetProcAddress, GetSystemTimeAsFileTime, GetThreadId, InitializeConditionVariable, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, MultiByteToWideChar, RaiseException, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualProtect, VirtualQuery, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte
      msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _errno, _filelengthi64, _fileno, _fmode, _fstat64, _initterm, _lseeki64, _onexit, _wfopen, abort, calloc, exit, fclose, fflush, fgetpos, fopen, fprintf, fputc, fputs, fread, free, fsetpos, fwrite, getc, getenv, getwc, iswctype, localeconv, malloc, memchr, memcmp, memcpy, memmove, memset, putc, putwc, realloc, setlocale, setvbuf, signal, strchr, strcmp, strcoll, strerror, strftime, strlen, strncmp, strtoul, strxfrm, towlower, towupper, ungetc, ungetwc, vfprintf, wcscoll, wcsftime, wcslen, wcsxfrm, _write, _read, _fileno, _fdopen
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-10-25T09:01:15.627014+02002850023ETPRO JA3 Hash - Possible Ligolo Server/Golang Binary Response134.22.231.73443192.168.2.655400TCP
      TimestampSource PortDest PortSource IPDest IP
      Oct 25, 2024 08:59:14.750108957 CEST49711443192.168.2.634.22.231.73
      Oct 25, 2024 08:59:14.750137091 CEST4434971134.22.231.73192.168.2.6
      Oct 25, 2024 08:59:14.750195980 CEST49711443192.168.2.634.22.231.73
      Oct 25, 2024 08:59:14.756542921 CEST49711443192.168.2.634.22.231.73
      Oct 25, 2024 08:59:14.756562948 CEST4434971134.22.231.73192.168.2.6
      Oct 25, 2024 08:59:14.768582106 CEST4434971134.22.231.73192.168.2.6
      Oct 25, 2024 09:00:14.773964882 CEST55395443192.168.2.634.22.231.73
      Oct 25, 2024 09:00:14.773994923 CEST4435539534.22.231.73192.168.2.6
      Oct 25, 2024 09:00:14.774059057 CEST55395443192.168.2.634.22.231.73
      Oct 25, 2024 09:00:14.774383068 CEST55395443192.168.2.634.22.231.73
      Oct 25, 2024 09:00:14.774398088 CEST4435539534.22.231.73192.168.2.6
      Oct 25, 2024 09:00:14.786710024 CEST4435539534.22.231.73192.168.2.6
      Oct 25, 2024 09:01:14.788732052 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:14.788753033 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:14.788855076 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:14.789148092 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:14.789160013 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:15.625543118 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:15.626987934 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:15.627013922 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:15.627123117 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:15.627130985 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:15.628189087 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:15.628248930 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:15.643553019 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:15.643604040 CEST55400443192.168.2.634.22.231.73
      Oct 25, 2024 09:01:15.643738031 CEST4435540034.22.231.73192.168.2.6
      Oct 25, 2024 09:01:15.643958092 CEST55400443192.168.2.634.22.231.73
      TimestampSource PortDest PortSource IPDest IP
      Oct 25, 2024 08:59:30.404720068 CEST53631891.1.1.1192.168.2.6
      Oct 25, 2024 08:59:45.075742006 CEST5359766162.159.36.2192.168.2.6
      Oct 25, 2024 08:59:45.700259924 CEST5458053192.168.2.61.1.1.1
      Oct 25, 2024 08:59:45.708672047 CEST53545801.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Oct 25, 2024 08:59:45.700259924 CEST192.168.2.61.1.1.10x8856Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 25, 2024 08:59:45.708672047 CEST1.1.1.1192.168.2.60x8856Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:02:59:12
      Start date:25/10/2024
      Path:C:\Users\user\Desktop\CLNGs0rZD4.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\CLNGs0rZD4.exe"
      Imagebase:0x7ff6e8840000
      File size:7'852'704 bytes
      MD5 hash:BA0DB716B761EDF63293AB94B5E74F0F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000000.2159400728.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2171227596.000001A96A531000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:02:59:12
      Start date:25/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:02:59:13
      Start date:25/10/2024
      Path:C:\Windows\explorer.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\explorer.exe"
      Imagebase:0x7ff609140000
      File size:5'141'208 bytes
      MD5 hash:662F4F92FDE3557E86D110526BB578D5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Go lang
      Yara matches:
      • Rule: JoeSecurity_Sliver, Description: Yara detected Sliver Implants, Source: 00000003.00000002.3405497706.000000C000138000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Multi_Trojan_Bishopsliver_42298c4a, Description: unknown, Source: 00000003.00000002.3404033112.0000000004B71000.00000002.10000000.00040000.00000000.sdmp, Author: unknown
      • Rule: Multi_Trojan_Bishopsliver_42298c4a, Description: unknown, Source: 00000003.00000002.3402461880.0000000003C2F000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000002.3401343293.0000000000800000.00000020.00000400.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:false

      Reset < >
        Memory Dump Source
        • Source File: 00000000.00000002.2173822392.00007FF6E8841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8840000, based on PE: true
        • Associated: 00000000.00000002.2172095077.00007FF6E8840000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2178861353.00007FF6E8E30000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2178894631.00007FF6E8E34000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2179126680.00007FF6E8E62000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2179244624.00007FF6E8E65000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8840000_CLNGs0rZD4.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9d52013451e142586f2e91d40cca97d3039fec3dbe1c7b889cbaab61f1cfd4e7
        • Instruction ID: 9776ccaecdc6ad8d55ffd95bd67dee88b404d57e17ca88abe830e7f35f40a955
        • Opcode Fuzzy Hash: 9d52013451e142586f2e91d40cca97d3039fec3dbe1c7b889cbaab61f1cfd4e7
        • Instruction Fuzzy Hash: 87B01227928A05C0E3002F31D84132832206B44741F415030C80D93361CE3F9842473E