Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mvSettings.ex#.exe

Overview

General Information

Sample name:mvSettings.ex#.exe
Analysis ID:1579335
MD5:7ed567c4cca924bf8211f892b294c274
SHA1:5da6b8fba3a72dde927d8e10e282df1b0b5dea55
SHA256:0475fce6275c3c2b7d920bf219cf269899fb7be81ad17da1cd8fbf61a0303f05
Tags:exeuser-500mk500
Infos:

Detection

MicroClip
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected MicroClip
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

  • System is w10x64
  • mvSettings.ex#.exe (PID: 7636 cmdline: "C:\Users\user\Desktop\mvSettings.ex#.exe" MD5: 7ED567C4CCA924BF8211F892B294C274)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: mvSettings.ex#.exe PID: 7636JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: mvSettings.ex#.exe PID: 7636JoeSecurity_MicroClipYara detected MicroClipJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: mvSettings.ex#.exeAvira: detected
      Source: mvSettings.ex#.exeVirustotal: Detection: 30%Perma Link
      Source: mvSettings.ex#.exeReversingLabs: Detection: 26%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: mvSettings.ex#.exeJoe Sandbox ML: detected
      Source: mvSettings.ex#.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMedia
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07
      Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://pki-ocsp.symauth.com0
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.0000000005731000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000003.1865439365.0000000003580000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000002.4199871290.00000000009F1000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.indyproject.org/

      System Summary

      barindex
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess Stats: CPU usage > 49%
      Source: mvSettings.ex#.exeStatic PE information: Number of sections : 19 > 10
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.00000000056FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs mvSettings.ex#.exe
      Source: mvSettings.ex#.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: mvSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9948508522727273
      Source: mvSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9934663318452381
      Source: mvSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9983177923387097
      Source: mvSettings.ex#.exeStatic PE information: Section: ZLIB complexity 0.9978506229957242
      Source: mvSettings.ex#.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/0
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile created: C:\Users\user\Desktop\error.logJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeMutant created: \Sessions\1\BaseNamedObjects\fedd1d1122aa65028c81e16ceb85d9c73790a2fa
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: mvSettings.ex#.exeVirustotal: Detection: 30%
      Source: mvSettings.ex#.exeReversingLabs: Detection: 26%
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: magnification.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: d3d9.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: security.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: idndl.dllJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: iphlpapi.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: mvSettings.ex#.exeStatic file information: File size 16323088 > 1048576
      Source: mvSettings.ex#.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x12e600
      Source: mvSettings.ex#.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x372600
      Source: mvSettings.ex#.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x9cba00
      Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name:
      Source: mvSettings.ex#.exeStatic PE information: section name: .themida
      Source: mvSettings.ex#.exeStatic PE information: section name: .boot
      Source: mvSettings.ex#.exeStatic PE information: section name: entropy: 7.8974723923582095

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeWindow searched: window name: RegmonClassJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeWindow searched: window name: FilemonClassJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSection loaded: OutputDebugStringW count: 1948
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeWindow / User API: threadDelayed 9000Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7928Thread sleep time: -51000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7924Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7924Thread sleep time: -331000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7924Thread sleep time: -9000000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
      Source: mvSettings.ex#.exe, 00000000.00000003.1860741659.0000000003580000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnmp.exeSDT\VBOX__ 0
      Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
      Source: mvSettings.ex#.exe, 00000000.00000002.4200201255.00000000014BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet
      Source: mvSettings.ex#.exe, 00000000.00000003.1859388036.0000000003580000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlmp.exeST\VBOX__ 0
      Source: mvSettings.ex#.exe, 00000000.00000002.4200201255.00000000014BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet$@Idassignednumbers@IdPORT_genrad_mux
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: regmonclass
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: gbdyllo
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: procmon_window_class
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: ollydbg
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: filemonclass
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\mvSettings.ex#.exeProcess queried: DebugObjectHandleJump to behavior
      Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerome=m]?
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000574E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: program manager chromelication5776468.zip
      Source: mvSettings.ex#.exe, 00000000.00000003.1874662923.0000000005BBD000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000002.4200201255.00000000014BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: @Winapi@Windows@DOF_PROGMAN
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000579F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerI
      Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerpbx~n
      Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerotetaC
      Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageromeom

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: mvSettings.ex#.exe PID: 7636, type: MEMORYSTR
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000574E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: /C:\Users\user\AppData\Roaming\Electrum\wallets
      Source: mvSettings.ex#.exe, 00000000.00000003.1864922909.00000000056A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 3com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldb
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000571A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 3C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000571A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: mvSettings.ex#.exe, 00000000.00000003.1864922909.00000000056A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: pnl_exodush
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.00000000056F6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ethereum
      Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.0000000005738000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 4C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsp
      Source: mvSettings.ex#.exe, 00000000.00000003.1864922909.00000000056A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
      Source: Yara matchFile source: Process Memory Space: mvSettings.ex#.exe PID: 7636, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: mvSettings.ex#.exe PID: 7636, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping521
      Security Software Discovery
      Remote Services1
      Data from Local System
      Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      441
      Virtualization/Sandbox Evasion
      LSASS Memory2
      Process Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
      Software Packing
      Security Account Manager441
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Obfuscated Files or Information
      Cached Domain Credentials2
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      mvSettings.ex#.exe31%VirustotalBrowse
      mvSettings.ex#.exe26%ReversingLabsWin32.Trojan.Generic
      mvSettings.ex#.exe100%AviraTR/Crypt.ZPACK.Gen
      mvSettings.ex#.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpfalse
        high
        http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMediamvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpfalse
          high
          http://www.indyproject.org/mvSettings.ex#.exe, 00000000.00000002.4204035112.0000000005731000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000003.1865439365.0000000003580000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000002.4199871290.00000000009F1000.00000020.00000001.01000000.00000003.sdmpfalse
            high
            http://pki-ocsp.symauth.com0mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1579335
              Start date and time:2024-12-21 18:59:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 1s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:mvSettings.ex#.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@1/1@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for sample files taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              13:00:24API Interceptor7093036x Sleep call for process: mvSettings.ex#.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\mvSettings.ex#.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):68
              Entropy (8bit):4.570150019342491
              Encrypted:false
              SSDEEP:3:HMMABc9IKRUeemm1t+WfWyEHgy:HMcIKCeS1wvyMgy
              MD5:9C12AD9574E78583F59F2FB6DC9F24F6
              SHA1:ECD3127C205D22D237264A01BCFB76484B4F7E1F
              SHA-256:D05954F777FCAAD4BA3FA978F8E7259278632ACAE615027A94C338168956C737
              SHA-512:533A91CADFC6F40A026C7F9C44C5A512E7EE16FB54E627C1A3DDC87A174E2140FA54EF32D9285730EC0C3FCE0C0F4707E1B883AC091C75C5ABC879C645F7702F
              Malicious:false
              Reputation:low
              Preview:The specified path was not found..[C:\Users\user\Desktop\Wallets]..
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.973830248529946
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.94%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:mvSettings.ex#.exe
              File size:16'323'088 bytes
              MD5:7ed567c4cca924bf8211f892b294c274
              SHA1:5da6b8fba3a72dde927d8e10e282df1b0b5dea55
              SHA256:0475fce6275c3c2b7d920bf219cf269899fb7be81ad17da1cd8fbf61a0303f05
              SHA512:89441afa24a607b66053de9c90c8f4e59c90f8c4cd4b61914f34624428fb0213ae29bfcccb7638ffea4fc24a657573038703aa8047498053648cc5a0c4eb2ba5
              SSDEEP:393216:SWvb8z/j+eRP+XvlDoa8f5YRqOU3+5eGcx+kHuecwb5sX:S0O/DkflDoxIvU3+MekON0g
              TLSH:35F633D2C885B856C2D58372351F9C3AC9A7AEA27E15412DB4AFF641803D84DEFB47E0
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:6969ccc4cce8698c
              Entrypoint:0x2579058
              Entrypoint Section:.boot
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
              Time Stamp:0x675B5C58 [Thu Dec 12 21:57:44 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:a40063ea92d50d06089bbce29ca8b0fd
              Instruction
              call 00007FCF70BA2B30h
              push ebx
              mov ebx, esp
              push ebx
              mov esi, dword ptr [ebx+08h]
              mov edi, dword ptr [ebx+10h]
              cld
              mov dl, 80h
              mov al, byte ptr [esi]
              inc esi
              mov byte ptr [edi], al
              inc edi
              mov ebx, 00000002h
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FCF70BA29CCh
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FCF70BA2A33h
              xor eax, eax
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FCF70BA2AC7h
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              je 00007FCF70BA29EAh
              push edi
              mov eax, eax
              sub edi, eax
              mov al, byte ptr [edi]
              pop edi
              mov byte ptr [edi], al
              inc edi
              mov ebx, 00000002h
              jmp 00007FCF70BA297Bh
              mov eax, 00000001h
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jc 00007FCF70BA29CCh
              sub eax, ebx
              mov ebx, 00000001h
              jne 00007FCF70BA2A0Ah
              mov ecx, 00000001h
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc ecx, ecx
              add dl, dl
              jne 00007FCF70BA29E7h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jc 00007FCF70BA29CCh
              push esi
              mov esi, edi
              sub esi, ebp
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x12ca0000x73.edata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x12cb19c0x184.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x12cd0000x509c.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b450000x10.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x12cc0680x18.tls
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x37f0000x60ee
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              0x10000x34b1980x12e600b111f1af32c5b0202c3ee527cfbbd5f8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              0x34d0000x28f80x16003645534357ac8b556f6b11f46694f399False0.9948508522727273data7.8974723923582095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              0x3500000x22d3c0xa800d93b469406fe57410afdfdeae022f599False0.9934663318452381data7.955972337739917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .bss0x3730000x74e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x37b0000x393e0x600a584fbeff8225ce74f2116f8a48d95c2False0.8125data6.58116453489002IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x37f0000x60ee0x1a00712369e0249a1901f467faed6b146f59False0.927734375data7.814094093097584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x3860000x730x200ad090d7b226563e30434a819aa26e8a2False0.375data2.9385263591843103IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tls0x3870000x540x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x3880000x5d0x200bde9c6246e9778893c183c35f31514c4False0.7578125data5.6035935754938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x3890000x4666c0x26c004d4ba9e733159e980b56e4d3cff5dc01False0.9983177923387097data7.9740322138055655IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              0x3d00000x1de4000xe9e0007a6bc79da85d4553b585a9cd6f93d57False0.9978506229957242data7.952440464535689IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x5af0000xd1a13b0x3726003f13a9fbe4ca1b5811c59ed2a76a375bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .edata0x12ca0000x10000x2005a35a820278ce6d0503745e9fc85ba72False0.189453125data1.4374626627085825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .idata0x12cb0000x10000x40030d972caa0aff4f920cb5a7eee5061aeFalse0.390625data3.6763967434760203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x12cc0000x10000x20017a6cd57598bde72e5e485cc6f6869d3False0.05078125data0.19615873848185583IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x12cd0000x52000x5200c3fa72e2e5e873bb41a5d2798c37f7d7False0.10994664634146341data3.254409056559886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .themida0x12d30000xea60000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .boot0x21790000x9cba000x9cba00bbf5799db27174b9cc3a693f218263c3unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .reloc0x2b450000x10000x108aad12564eafa86e59577bf3b6dc2a79False1.5GLS_BINARY_LSB_FIRST2.7334585933443494IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x12cd14c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.04292631081719414
              RT_STRING0x12d13840x3b8data0.4170168067226891
              RT_GROUP_ICON0x12d174c0x14dataEnglishUnited States1.1
              RT_VERSION0x12d17700x20cdataEnglishUnited States0.4770992366412214
              RT_MANIFEST0x12d198c0x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.403771491957848
              DLLImport
              kernel32.dllGetModuleHandleA
              winspool.drvDocumentPropertiesW
              comctl32.dllImageList_GetImageInfo
              shell32.dllShell_NotifyIconW
              user32.dllMoveWindow
              version.dllGetFileVersionInfoSizeW
              oleaut32.dllSafeArrayPutElement
              advapi32.dllRegSetValueExW
              msvcrt.dllisupper
              WTSAPI32.DLLWTSUnRegisterSessionNotification
              ole32.dllIsEqualGUID
              gdi32.dllPie
              Magnification.dllMagSetWindowSource
              NameOrdinalAddress
              __dbk_fcall_wrapper20x4119f8
              dbkFCallWrapperAddr10x776644
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:13:00:06
              Start date:21/12/2024
              Path:C:\Users\user\Desktop\mvSettings.ex#.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\mvSettings.ex#.exe"
              Imagebase:0x9f0000
              File size:16'323'088 bytes
              MD5 hash:7ED567C4CCA924BF8211F892B294C274
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Reputation:low
              Has exited:false

              No disassembly