Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dmwSettings.ex#.exe

Overview

General Information

Sample name:dmwSettings.ex#.exe
Analysis ID:1579334
MD5:f8f57f52bb2f0ac60ca0a2d45b1e513e
SHA1:a8e4f14fe26d0d92bd45eabf532a7f51a5b1d848
SHA256:2ba1325bfe35aa2eb91ef3889e2d978624ad19d61dc2acae0df7f0d85cffd395
Tags:exeuser-500mk500
Infos:

Detection

MicroClip
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected MicroClip
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

  • System is w10x64
  • dmwSettings.ex#.exe (PID: 4460 cmdline: "C:\Users\user\Desktop\dmwSettings.ex#.exe" MD5: F8F57F52BB2F0AC60CA0A2D45B1E513E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: dmwSettings.ex#.exe PID: 4460JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: dmwSettings.ex#.exe PID: 4460JoeSecurity_MicroClipYara detected MicroClipJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: dmwSettings.ex#.exeAvira: detected
      Source: dmwSettings.ex#.exeVirustotal: Detection: 22%Perma Link
      Source: dmwSettings.ex#.exeReversingLabs: Detection: 18%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: dmwSettings.ex#.exeJoe Sandbox ML: detected
      Source: dmwSettings.ex#.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMedia
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://pki-ocsp.symauth.com0
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FB1000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000003.1821215276.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000002.4185861225.00000000000A1000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.indyproject.org/

      System Summary

      barindex
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess Stats: CPU usage > 49%
      Source: dmwSettings.ex#.exeStatic PE information: Number of sections : 19 > 10
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F7D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs dmwSettings.ex#.exe
      Source: dmwSettings.ex#.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: dmwSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9943033854166666
      Source: dmwSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9984122983870968
      Source: dmwSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9975980007349011
      Source: dmwSettings.ex#.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/0
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile created: C:\Users\user\Desktop\error.logJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeMutant created: \Sessions\1\BaseNamedObjects\fedd1d1122aa65028c81e16ceb85d9c73790a2fa
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: dmwSettings.ex#.exeVirustotal: Detection: 22%
      Source: dmwSettings.ex#.exeReversingLabs: Detection: 18%
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: magnification.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: d3d9.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: security.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: idndl.dllJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: iphlpapi.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: dmwSettings.ex#.exeStatic file information: File size 14571536 > 1048576
      Source: dmwSettings.ex#.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x12e600
      Source: dmwSettings.ex#.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x372800
      Source: dmwSettings.ex#.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x81fe00
      Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name:
      Source: dmwSettings.ex#.exeStatic PE information: section name: .themida
      Source: dmwSettings.ex#.exeStatic PE information: section name: .boot
      Source: dmwSettings.ex#.exeStatic PE information: section name: entropy: 7.903690006990631

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeWindow searched: window name: FilemonClassJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeWindow searched: window name: RegmonClassJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSection loaded: OutputDebugStringW count: 1948
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeWindow / User API: threadDelayed 5067Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeWindow / User API: threadDelayed 4255Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1104Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1780Thread sleep time: -57000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1104Thread sleep time: -5067000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1104Thread sleep time: -4255000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
      Source: dmwSettings.ex#.exe, 00000000.00000003.1827151986.000000000543D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet
      Source: dmwSettings.ex#.exe, 00000000.00000003.1827151986.000000000543D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet$@Idassignednumbers@IdPORT_genrad_mux
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: regmonclass
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: gbdyllo
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: procmon_window_class
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: ollydbg
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: filemonclass
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\dmwSettings.ex#.exeProcess queried: DebugPortJump to behavior
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerZxcvb6^
      Source: dmwSettings.ex#.exe, 00000000.00000002.4186282253.0000000000B6C000.00000002.00000001.01000000.00000003.sdmp, dmwSettings.ex#.exe, 00000000.00000003.1827151986.000000000543D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: @Winapi@Windows@DOF_PROGMAN
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerALS~1f
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerurce F
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagernHintsx
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.000000000501F000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerECH~1
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager"
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FCE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: program manager chromelication6654390.zip
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1pS
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageronsIPr
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managervix^
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerevineC$^
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1AF~1T
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere Brow
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1tsPrLuY
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerShade
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerationG1^
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager*_7y
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerroved

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: dmwSettings.ex#.exe PID: 4460, type: MEMORYSTR
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FCE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: /C:\Users\user\AppData\Roaming\Electrum\wallets
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FFB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: RC:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldb1
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F9A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 3C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F9A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000005002000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Exodus
      Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ethereum
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FB8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 4C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsp
      Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F9A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: Yara matchFile source: Process Memory Space: dmwSettings.ex#.exe PID: 4460, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: dmwSettings.ex#.exe PID: 4460, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping521
      Security Software Discovery
      Remote Services1
      Data from Local System
      Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      441
      Virtualization/Sandbox Evasion
      LSASS Memory2
      Process Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
      Software Packing
      Security Account Manager441
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Obfuscated Files or Information
      Cached Domain Credentials2
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      dmwSettings.ex#.exe22%VirustotalBrowse
      dmwSettings.ex#.exe18%ReversingLabs
      dmwSettings.ex#.exe100%AviraTR/Crypt.ZPACK.Gen
      dmwSettings.ex#.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpfalse
        high
        http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMediadmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpfalse
          high
          http://www.indyproject.org/dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FB1000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000003.1821215276.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000002.4185861225.00000000000A1000.00000020.00000001.01000000.00000003.sdmpfalse
            high
            http://pki-ocsp.symauth.com0dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1579334
              Start date and time:2024-12-21 18:48:08 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 2s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:dmwSettings.ex#.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@1/1@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for sample files taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              12:49:17API Interceptor6178541x Sleep call for process: dmwSettings.ex#.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\dmwSettings.ex#.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):68
              Entropy (8bit):4.570150019342491
              Encrypted:false
              SSDEEP:3:HMMABc9IKRUeemm1t+WfWyEHgy:HMcIKCeS1wvyMgy
              MD5:9C12AD9574E78583F59F2FB6DC9F24F6
              SHA1:ECD3127C205D22D237264A01BCFB76484B4F7E1F
              SHA-256:D05954F777FCAAD4BA3FA978F8E7259278632ACAE615027A94C338168956C737
              SHA-512:533A91CADFC6F40A026C7F9C44C5A512E7EE16FB54E627C1A3DDC87A174E2140FA54EF32D9285730EC0C3FCE0C0F4707E1B883AC091C75C5ABC879C645F7702F
              Malicious:false
              Reputation:low
              Preview:The specified path was not found..[C:\Users\user\Desktop\Wallets]..
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.978212311431557
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.94%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:dmwSettings.ex#.exe
              File size:14'571'536 bytes
              MD5:f8f57f52bb2f0ac60ca0a2d45b1e513e
              SHA1:a8e4f14fe26d0d92bd45eabf532a7f51a5b1d848
              SHA256:2ba1325bfe35aa2eb91ef3889e2d978624ad19d61dc2acae0df7f0d85cffd395
              SHA512:46272f35a52a44b9eda47dd7db6499abccda5736fffab07b7f450eb40d0874446c902a6b14709a7d895516c9d8466432936027f5006cb555c78c6d074487487f
              SSDEEP:393216:4skDq/hp1y3T63SwmeKq1n4KAs+jwNss8DVMyGthgRJZ:vq6p1yDTwmXx1s+gss2VRGtsn
              TLSH:D9E633FA4E913B73D59053B93F11A46CEC7BBEAA8A856061F12FF188807550C87B7B50
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:6969ccc4cce8698c
              Entrypoint:0x23b7058
              Entrypoint Section:.boot
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
              Time Stamp:0x675B64E5 [Thu Dec 12 22:34:13 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:a40063ea92d50d06089bbce29ca8b0fd
              Instruction
              call 00007FCBE87F40B0h
              push ebx
              mov ebx, esp
              push ebx
              mov esi, dword ptr [ebx+08h]
              mov edi, dword ptr [ebx+10h]
              cld
              mov dl, 80h
              mov al, byte ptr [esi]
              inc esi
              mov byte ptr [edi], al
              inc edi
              mov ebx, 00000002h
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FCBE87F3F4Ch
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FCBE87F3FB3h
              xor eax, eax
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FCBE87F4047h
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              je 00007FCBE87F3F6Ah
              push edi
              mov eax, eax
              sub edi, eax
              mov al, byte ptr [edi]
              pop edi
              mov byte ptr [edi], al
              inc edi
              mov ebx, 00000002h
              jmp 00007FCBE87F3EFBh
              mov eax, 00000001h
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jc 00007FCBE87F3F4Ch
              sub eax, ebx
              mov ebx, 00000001h
              jne 00007FCBE87F3F8Ah
              mov ecx, 00000001h
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc ecx, ecx
              add dl, dl
              jne 00007FCBE87F3F67h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jc 00007FCBE87F3F4Ch
              push esi
              mov esi, edi
              sub esi, ebp
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x12ca0000x73.edata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x12cb19c0x184.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x12cd0000x509c.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x27d70000x10.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x12cc0680x18.tls
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x37f0000x60ee
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              0x10000x34b1940x12e6005ff61e93792d56fae916a3c8cb3d6397unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              0x34d0000x28f80x1600cecd2afad27eae96c76b5b006034c0eaFalse0.9790482954545454data7.903690006990631IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              0x3500000x22d3c0xa800d74ec091c0f2d3140d9ac90d9341a81bFalse0.9943033854166666data7.956424769526567IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .bss0x3730000x74e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x37b0000x393e0x60023b292e72bb2f7a05ad8c110412a43fcFalse0.8359375data6.869666182510056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x37f0000x60ee0x1a00565eab0b97e676c44b8d450f6b4c8d82False0.9182692307692307data7.7963180843425155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x3860000x730x200da03b61c90acb2e4231d4128f0060131False0.7578125data4.93586645212415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tls0x3870000x540x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x3880000x5d0x200d19a4a01c2b15cba8512d3c7844551a2False0.779296875data5.011084707950236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x3890000x4666c0x26c0052f76cda5c8ab4a12b2d0e7b3d3fbdadFalse0.9984122983870968data7.980450064267268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              0x3d00000x1de4000xe9e00a61781ce9d190782a91242f6848cbf01False0.9975980007349011data7.950021189744232IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x5af0000xd1a11c0x372800dd143cb2b97eb27c004a5c8b690a279funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .edata0x12ca0000x10000x2005a35a820278ce6d0503745e9fc85ba72False0.189453125data1.4374626627085825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .idata0x12cb0000x10000x40030d972caa0aff4f920cb5a7eee5061aeFalse0.390625data3.6763967434760203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x12cc0000x10000x20017a6cd57598bde72e5e485cc6f6869d3False0.05078125data0.19615873848185583IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x12cd0000x52000x5200c3fa72e2e5e873bb41a5d2798c37f7d7False0.10994664634146341data3.254409056559886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .themida0x12d30000xce40000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .boot0x1fb70000x81fe000x81fe00069f2149e27b353e6684f01dbde0478cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .reloc0x27d70000x10000x108aad12564eafa86e59577bf3b6dc2a79False1.5GLS_BINARY_LSB_FIRST2.7334585933443494IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x12cd14c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.04292631081719414
              RT_STRING0x12d13840x3b8data0.4170168067226891
              RT_GROUP_ICON0x12d174c0x14dataEnglishUnited States1.1
              RT_VERSION0x12d17700x20cdataEnglishUnited States0.4770992366412214
              RT_MANIFEST0x12d198c0x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.403771491957848
              DLLImport
              kernel32.dllGetModuleHandleA
              winspool.drvDocumentPropertiesW
              comctl32.dllImageList_GetImageInfo
              shell32.dllShell_NotifyIconW
              user32.dllMoveWindow
              version.dllGetFileVersionInfoSizeW
              oleaut32.dllSafeArrayPutElement
              advapi32.dllRegSetValueExW
              msvcrt.dllisupper
              WTSAPI32.DLLWTSUnRegisterSessionNotification
              ole32.dllIsEqualGUID
              gdi32.dllPie
              Magnification.dllMagSetWindowSource
              NameOrdinalAddress
              __dbk_fcall_wrapper20x4119f8
              dbkFCallWrapperAddr10x776644
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:12:49:03
              Start date:21/12/2024
              Path:C:\Users\user\Desktop\dmwSettings.ex#.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\dmwSettings.ex#.exe"
              Imagebase:0xa0000
              File size:14'571'536 bytes
              MD5 hash:F8F57F52BB2F0AC60CA0A2D45B1E513E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Reputation:low
              Has exited:false

              No disassembly