Edit tour

Windows Analysis Report
raw_cbot.exe

Overview

General Information

Sample name:raw_cbot.exe
Analysis ID:1643734
MD5:9ef7edfa24458412dd4667023fd8466b
SHA1:696a87ae39645223f5149f455c32d77135f67cbd
SHA256:1fc13ff144f070e7cec92dd959ec889df2928b8220e420ec3ba2a78bcbeb7e13
Infos:

Detection

Score:84
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Drops PE files to the startup folder
Joe Sandbox ML detected suspicious sample
Sigma detected: System File Execution Location Anomaly
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • raw_cbot.exe (PID: 7844 cmdline: "C:\Users\user\Desktop\raw_cbot.exe" MD5: 9EF7EDFA24458412DD4667023FD8466B)
  • svchost.exe (PID: 7924 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 8112 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 8148 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7412 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7588 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 3004 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 1128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 2412 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" MD5: 9EF7EDFA24458412DD4667023FD8466B)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , ProcessId: 2412, ProcessName: svchost.exe
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\raw_cbot.exe, ProcessId: 7844, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7924, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exeReversingLabs: Detection: 36%
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)ReversingLabs: Detection: 36%
Source: raw_cbot.exeVirustotal: Detection: 56%Perma Link
Source: raw_cbot.exeReversingLabs: Detection: 36%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: raw_cbot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 58.9.110.23 18063Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 176.65.142.252 18063Jump to behavior
Source: global trafficTCP traffic: 58.9.110.23 ports 18063,0,1,3,6,8
Source: global trafficTCP traffic: 176.65.142.252 ports 18063,0,1,3,6,8
Source: global trafficTCP traffic: 192.168.2.4:49711 -> 176.65.142.252:18063
Source: global trafficTCP traffic: 192.168.2.4:49712 -> 58.9.110.23:18063
Source: Joe Sandbox ViewASN Name: WEBTRAFFICDE WEBTRAFFICDE
Source: Joe Sandbox ViewASN Name: TRUE-AS-APTrueInternetCoLtdTH TRUE-AS-APTrueInternetCoLtdTH
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.142.252
Source: svchost.exe, 00000001.00000002.2433329136.0000028086800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: svchost.exe, 00000001.00000003.1203099470.0000028086598000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: edb.log.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
Source: qmgr.db.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: svchost.exe, 00000001.00000003.1203099470.0000028086598000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: svchost.exe, 00000001.00000003.1203099470.0000028086598000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: svchost.exe, 00000001.00000003.1203099470.00000280865CD000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: qmgr.db.1.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: svchost.exe, 00000002.00000002.1366664197.000001ED4DE13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.comc
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 00000002.00000002.1366891955.000001ED4DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
Source: svchost.exe, 00000002.00000003.1365885778.000001ED4DE6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366165968.000001ED4DE5B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366995882.000001ED4DE70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366010517.000001ED4DE5E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 00000002.00000002.1366974827.000001ED4DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365926749.000001ED4DE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 00000002.00000003.1365796144.000001ED4DE74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1367021492.000001ED4DE76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366165968.000001ED4DE5B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
Source: svchost.exe, 00000002.00000002.1366974827.000001ED4DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365926749.000001ED4DE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
Source: svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366734178.000001ED4DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: svchost.exe, 00000002.00000003.1366053260.000001ED4DE46000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366813888.000001ED4DE47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.dit.cp
Source: svchost.exe, 00000002.00000002.1366813888.000001ED4DE47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 00000002.00000002.1366734178.000001ED4DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366010517.000001ED4DE5E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 00000002.00000002.1366974827.000001ED4DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365926749.000001ED4DE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000001.00000003.1203099470.0000028086642000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
Source: edb.log.1.dr, qmgr.db.1.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: edb.log.1.dr, qmgr.db.1.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
Source: edb.log.1.dr, qmgr.db.1.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 00000001.00000003.1203099470.0000028086642000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
Source: svchost.exe, 00000001.00000003.1203099470.0000028086642000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
Source: edb.log.1.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
Source: svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 00000002.00000003.1366203577.000001ED4DE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 00000002.00000003.1366203577.000001ED4DE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366891955.000001ED4DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000002.00000003.1366053260.000001ED4DE46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
Source: svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 00000002.00000002.1366891955.000001ED4DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: raw_cbot.exe.0.drStatic PE information: Number of sections : 11 > 10
Source: raw_cbot.exeStatic PE information: Number of sections : 11 > 10
Source: raw_cbot.exe, 00000000.00000000.1182428991.00007FF655FA5000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesvchost.exen' vs raw_cbot.exe
Source: raw_cbot.exe, 00000000.00000002.2430710079.0000023D21839000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesvchost.exen' vs raw_cbot.exe
Source: raw_cbot.exeBinary or memory string: OriginalFilenamesvchost.exen' vs raw_cbot.exe
Source: raw_cbot.exe.0.drBinary or memory string: OriginalFilenamesvchost.exen' vs raw_cbot.exe
Source: classification engineClassification label: mal84.troj.adwa.evad.winEXE@10/8@0/3
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:1128:120:WilError_03
Source: raw_cbot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\raw_cbot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: raw_cbot.exeVirustotal: Detection: 56%
Source: raw_cbot.exeReversingLabs: Detection: 36%
Source: C:\Users\user\Desktop\raw_cbot.exeFile read: C:\Users\user\Desktop\raw_cbot.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\raw_cbot.exe "C:\Users\user\Desktop\raw_cbot.exe"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
Source: raw_cbot.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: raw_cbot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: raw_cbot.exeStatic PE information: section name: .xdata
Source: raw_cbot.exe.0.drStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exeJump to dropped file
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exeJump to dropped file
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exeJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exeJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exe\:Zone.Identifier:$DATAJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7984Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
Source: svchost.exe, 00000006.00000002.2432033800.0000016D31465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: svchost.exe, 00000006.00000002.2431944444.0000016D3144C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000006.00000002.2432033800.0000016D3147F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000001.00000002.2432424143.000002808102B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
Source: raw_cbot.exe, 00000000.00000002.2430710079.0000023D21839000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf
Source: svchost.exe, 00000001.00000002.2433397256.0000028086859000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 00000006.00000002.2432033800.0000016D31465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 00000006.00000002.2431506299.0000016D3140B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: svchost.exe, 00000006.00000002.2431851042.0000016D3142B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000006.00000002.2432033800.0000016D31465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000006.00000002.2431851042.0000016D3142B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: svchost.exe, 00000006.00000002.2431944444.0000016D3144C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000006.00000002.2432033800.0000016D31465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:`
Source: svchost.exe, 00000008.00000002.2430938400.000001ED1F613000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 58.9.110.23 18063Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 176.65.142.252 18063Jump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\raw_cbot.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
Source: svchost.exe, 00000007.00000002.2432299472.000001570AF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
Source: svchost.exe, 00000007.00000002.2432299472.000001570AF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
11
Masquerading
OS Credential Dumping141
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job12
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory3
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
Registry Run Keys / Startup Folder
3
Virtualization/Sandbox Evasion
Security Account Manager23
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1643734 Sample: raw_cbot.exe Startdate: 20/03/2025 Architecture: WINDOWS Score: 84 34 Multi AV Scanner detection for dropped file 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Connects to many ports of the same IP (likely port scanning) 2->38 40 2 other signatures 2->40 7 raw_cbot.exe 2 2->7         started        12 svchost.exe 2->12         started        14 svchost.exe 2->14         started        16 4 other processes 2->16 process3 dnsIp4 28 176.65.142.252, 18063, 49711, 49720 WEBTRAFFICDE Germany 7->28 30 58.9.110.23, 18063 TRUE-AS-APTrueInternetCoLtdTH Thailand 7->30 22 C:\Users\user\AppData\...\svchost.exe (copy), PE32+ 7->22 dropped 24 C:\Users\user\AppData\...\raw_cbot.exe, PE32+ 7->24 dropped 26 C:\Users\...\raw_cbot.exe:Zone.Identifier, ASCII 7->26 dropped 42 Drops PE files to the startup folder 7->42 44 Changes security center settings (notifications, updates, antivirus, firewall) 12->44 18 MpCmdRun.exe 1 12->18         started        46 System process connects to network (likely due to code injection or exploit) 14->46 32 127.0.0.1 unknown unknown 16->32 file5 signatures6 process7 process8 20 conhost.exe 18->20         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
raw_cbot.exe56%VirustotalBrowse
raw_cbot.exe37%ReversingLabsWin64.Trojan.Barys
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\raw_cbot.exe37%ReversingLabsWin64.Trojan.Barys
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)37%ReversingLabsWin64.Trojan.Barys
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://dynamic.api.tiles.dit.cp0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000002.00000003.1366053260.000001ED4DE46000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000002.00000002.1366974827.000001ED4DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365926749.000001ED4DE67000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000002.00000003.1365796144.000001ED4DE74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1367021492.000001ED4DE76000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000002.00000002.1366974827.000001ED4DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365926749.000001ED4DE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000002.00000003.1366203577.000001ED4DE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366891955.000001ED4DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://dynamic.api.tiles.dit.cpsvchost.exe, 00000002.00000003.1366053260.000001ED4DE46000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366813888.000001ED4DE47000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000002.00000002.1366734178.000001ED4DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366010517.000001ED4DE5E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.ver)svchost.exe, 00000001.00000002.2433329136.0000028086800000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366734178.000001ED4DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://g.live.com/odclientsettings/ProdV2.C:edb.log.1.dr, qmgr.db.1.drfalse
                              high
                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000002.00000003.1366203577.000001ED4DE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366221780.000001ED4DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000002.00000002.1366891955.000001ED4DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000002.00000003.1365885778.000001ED4DE6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366165968.000001ED4DE5B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366995882.000001ED4DE70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366010517.000001ED4DE5E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://g.live.com/odclientsettings/Prod.C:edb.log.1.dr, qmgr.db.1.drfalse
                                            high
                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://g.live.com/odclientsettings/ProdV2edb.log.1.dr, qmgr.db.1.drfalse
                                                  high
                                                  https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://dynamic.tsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000001.00000003.1203099470.0000028086642000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.drfalse
                                                        high
                                                        http://www.bingmapsportal.comcsvchost.exe, 00000002.00000002.1366664197.000001ED4DE13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000002.00000002.1366891955.000001ED4DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000002.00000003.1365946042.000001ED4DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366165968.000001ED4DE5B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1366073447.000001ED4DE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000001.00000003.1203099470.0000028086642000.00000004.00000800.00020000.00000000.sdmp, edb.log.1.dr, qmgr.db.1.drfalse
                                                                        high
                                                                        https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000002.00000002.1366974827.000001ED4DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1365926749.000001ED4DE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366693978.000001ED4DE2B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000002.00000002.1366813888.000001ED4DE47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1366952759.000001ED4DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            176.65.142.252
                                                                            unknownGermany
                                                                            8649WEBTRAFFICDEtrue
                                                                            58.9.110.23
                                                                            unknownThailand
                                                                            17552TRUE-AS-APTrueInternetCoLtdTHtrue
                                                                            IP
                                                                            127.0.0.1
                                                                            Joe Sandbox version:42.0.0 Malachite
                                                                            Analysis ID:1643734
                                                                            Start date and time:2025-03-20 03:08:59 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 4m 35s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:12
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:raw_cbot.exe
                                                                            Detection:MAL
                                                                            Classification:mal84.troj.adwa.evad.winEXE@10/8@0/3
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): sppsvc.exe, SIHClient.exe, SgrmBroker.exe
                                                                            • Excluded IPs from analysis (whitelisted): 23.204.23.20, 13.107.246.60, 172.202.163.200
                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fp-afd-nocache-ccp.azureedge.net, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            TimeTypeDescription
                                                                            02:10:00AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                                            22:09:58API Interceptor2x Sleep call for process: svchost.exe modified
                                                                            22:11:08API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            58.9.110.2322.exeGet hashmaliciousUnknownBrowse
                                                                              cbot.exeGet hashmaliciousUnknownBrowse
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                WEBTRAFFICDEungziped_file.exeGet hashmaliciousRemcosBrowse
                                                                                • 176.65.141.49
                                                                                z310517827.batGet hashmaliciousBatch Injector, RemcosBrowse
                                                                                • 176.65.142.140
                                                                                TD648372.batGet hashmaliciousBatch Injector, RemcosBrowse
                                                                                • 176.65.142.140
                                                                                PO#250059712.batGet hashmaliciousBatch Injector, RemcosBrowse
                                                                                • 176.65.142.140
                                                                                Document25.xlsmGet hashmaliciousScreenConnect Tool, AsyncRAT, StormKitty, VenomRATBrowse
                                                                                • 176.65.142.74
                                                                                _TSCA.pdf.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                                • 176.65.141.49
                                                                                https://mandrillapp.com/track/click/30319935/app.axure.cloud?p=eyJzIjoiV2EycUdtVWFUN1RfTGxWUkQzU3I1RDRsX2NFIiwidiI6MSwicCI6IntcInVcIjozMDMxOTkzNSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5heHVyZS5jbG91ZFxcXC83RlpOR1BcXFwvXCIsXCJpZFwiOlwiNjRmNmJkOTAyMjY0NGQyZDliZjUzMzQyOTc0ZTQwNThcIixcInVybF9pZHNcIjpbXCIzNjBjNGIwODczODAyZGVjZTE1NTNhYmM1MGQwZjViMGMyNTdjMzM2XCJdfSJ9Get hashmaliciousUnknownBrowse
                                                                                • 176.65.142.110
                                                                                Commercial invoice and dhl awb tracking details.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 176.65.142.81
                                                                                ReK7Ewx.exeGet hashmaliciousAsyncRATBrowse
                                                                                • 176.65.142.60
                                                                                ReK7Ewx.exeGet hashmaliciousUnknownBrowse
                                                                                • 176.65.142.60
                                                                                TRUE-AS-APTrueInternetCoLtdTHsshdGet hashmaliciousUnknownBrowse
                                                                                • 171.97.167.202
                                                                                m68k.elfGet hashmaliciousUnknownBrowse
                                                                                • 58.11.24.86
                                                                                jklarm5.elfGet hashmaliciousUnknownBrowse
                                                                                • 58.11.219.208
                                                                                hoho.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 124.122.130.94
                                                                                hgfs.arm.elfGet hashmaliciousUnknownBrowse
                                                                                • 171.96.58.89
                                                                                arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 124.120.215.111
                                                                                hgfs.x86.elfGet hashmaliciousUnknownBrowse
                                                                                • 58.8.237.33
                                                                                KKveTTgaAAsecNNaaaa.spc.elfGet hashmaliciousUnknownBrowse
                                                                                • 124.122.178.165
                                                                                KKveTTgaAAsecNNaaaa.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                • 27.145.158.183
                                                                                nklppc.elfGet hashmaliciousUnknownBrowse
                                                                                • 124.122.178.21
                                                                                No context
                                                                                No context
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):1310720
                                                                                Entropy (8bit):1.3073449856315142
                                                                                Encrypted:false
                                                                                SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrA:KooCEYhgYEL0In
                                                                                MD5:DECDB24760CF5BAF6E586AD15FFCCDE4
                                                                                SHA1:7DFAED2A0CCEEE1F89CD31AFB3F74DA798E2D8AC
                                                                                SHA-256:22FAD4204F80E077D5B4F0D7F131ACE41B5C8DF89BAD8C8D97A2AEB8D1D73AFA
                                                                                SHA-512:2E1CC0D0F37FF87B4979213506E765F4FAA0D7FB6ADBA39372CFAB945ABC99043DCCEA697513D45F988C9ABAE4200DF07C194BEFB3CDAFFBD4D0D03AD5C66569
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x8a769236, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                Category:dropped
                                                                                Size (bytes):1310720
                                                                                Entropy (8bit):0.4221280785156202
                                                                                Encrypted:false
                                                                                SSDEEP:1536:xSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1kI6:xaza/vMUM2Uvz7DO
                                                                                MD5:C907190E1E5737F1DB4A1250B32960FB
                                                                                SHA1:2D44A52EEF0098197185BBA87EF9F8DF3A7ED32A
                                                                                SHA-256:53C16B607900CFB4522EE00A2E29835CB5563FCD1C36095BD62CC9E277F0DCD2
                                                                                SHA-512:41BE2E5128A1B6DED772B77A9E25426A501D5A0C254B0746928A5BDA9757DDC421BE3E2FA7FCDC2DD2344E8DA47AF9B9B51EAC3612092787F8C82449F3F60D8C
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:.v.6... .......A.......X\...;...{......................0.!..........{A.:....}#.h.#.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........;...{...............................................................................................................................................................................................2...{..................................D.$.:....}C..................P.E:....}#..........................#......h.#.....................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):16384
                                                                                Entropy (8bit):0.077526978254612
                                                                                Encrypted:false
                                                                                SSDEEP:3:mtyYeo+mGjjn13a//GalallcVO/lnlZMxZNQl:mUzeGj53qzAOewk
                                                                                MD5:41BD34E7B59FA46FB35EF23F1142A672
                                                                                SHA1:A807E2D3C963092BA58BC1CC8A0C64AD69AAEC0B
                                                                                SHA-256:4827FE8EEFCB34D1F7A6D42114AB8F77EE8234C81CF599456DEC0E4F25BF1C5E
                                                                                SHA-512:56B77AF3903273FD9AE880C761709999181ED72965D71393ADFF652DB96B1DEA2020A74931A190672CDAEF5DAA5317063E3FDF10CFA676D0C5BC00E06C728A8C
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...G.....................................;...{..:....}#......{A..............{A......{A..........{A].................P.E:....}#.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\raw_cbot.exe
                                                                                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):61952
                                                                                Entropy (8bit):6.069918401167628
                                                                                Encrypted:false
                                                                                SSDEEP:768:EX/VDdl1ooSHqckQSZecQu0hsehhRxU5UluWaXVpuvYD1bvOn40XZ00yanOuSx4:SpVooz2LZrTculaVEvWpOnr00yjg
                                                                                MD5:9EF7EDFA24458412DD4667023FD8466B
                                                                                SHA1:696A87AE39645223F5149F455C32D77135F67CBD
                                                                                SHA-256:1FC13FF144F070E7CEC92DD959EC889DF2928B8220E420EC3BA2A78BCBEB7E13
                                                                                SHA-512:45F75AD39E7D5A006D265257259A9036B26C9B9C4BACFEE0D37A86A84DFDFD5D52EBD15C9A0E46AC2E70D3DEA46CCEAC1B6EA7A5F42B879F0660DCDE13DBD4FE
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 37%
                                                                                Reputation:low
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g...............&.......................@.............................p......e.....`... .............................................. .......P.......................`..................................(....................#..P............................text...@...........................`..`.data...............................@....rdata..P...........................@..@.pdata..............................@..@.xdata..............................@..@.bss....`................................idata....... ......................@....CRT....h....0......................@....tls.........@......................@....rsrc........P......................@....reloc.......`......................@..B........................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\raw_cbot.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):26
                                                                                Entropy (8bit):3.95006375643621
                                                                                Encrypted:false
                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                Malicious:true
                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                Process:C:\Users\user\Desktop\raw_cbot.exe
                                                                                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):61952
                                                                                Entropy (8bit):6.069918401167628
                                                                                Encrypted:false
                                                                                SSDEEP:768:EX/VDdl1ooSHqckQSZecQu0hsehhRxU5UluWaXVpuvYD1bvOn40XZ00yanOuSx4:SpVooz2LZrTculaVEvWpOnr00yjg
                                                                                MD5:9EF7EDFA24458412DD4667023FD8466B
                                                                                SHA1:696A87AE39645223F5149F455C32D77135F67CBD
                                                                                SHA-256:1FC13FF144F070E7CEC92DD959EC889DF2928B8220E420EC3BA2A78BCBEB7E13
                                                                                SHA-512:45F75AD39E7D5A006D265257259A9036B26C9B9C4BACFEE0D37A86A84DFDFD5D52EBD15C9A0E46AC2E70D3DEA46CCEAC1B6EA7A5F42B879F0660DCDE13DBD4FE
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 37%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g...............&.......................@.............................p......e.....`... .............................................. .......P.......................`..................................(....................#..P............................text...@...........................`..`.data...............................@....rdata..P...........................@..@.pdata..............................@..@.xdata..............................@..@.bss....`................................idata....... ......................@....CRT....h....0......................@....tls.........@......................@....rsrc........P......................@....reloc.......`......................@..B........................................................................................................................................................................
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:JSON data
                                                                                Category:dropped
                                                                                Size (bytes):55
                                                                                Entropy (8bit):4.306461250274409
                                                                                Encrypted:false
                                                                                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                Malicious:false
                                                                                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):7388
                                                                                Entropy (8bit):3.2404149860600495
                                                                                Encrypted:false
                                                                                SSDEEP:96:cEi+AAsoJjykzEJ+AAsoJjykHE4h+AAsoJjykIr:cN+SoJbO+SoJvRh+SoJAr
                                                                                MD5:16CF7BCC74E8242FFA3911C7132C0478
                                                                                SHA1:547B372BF4F9B5650268C7E6E5529DB04D9B086D
                                                                                SHA-256:E4BF09BDDB77F347AB28FC2B88E1DE827159B30650DC79FDCE7195EE3DCB9F55
                                                                                SHA-512:3E3A0A9435D42C594EFEBC10233409C54C4BA3BED66E360E7B1812A3AED8B64543E0894A25D0A595F950CBB190EE5ED3816D56FA9061D44B5247D328DD7FD02D
                                                                                Malicious:false
                                                                                Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. W.e.d. .. O.c.t. .. 0.4. .. 2.0.2.3. .1.2.:.0.3.:.4.2.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                                                File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                Entropy (8bit):6.069918401167628
                                                                                TrID:
                                                                                • Win64 Executable (generic) (12005/4) 74.95%
                                                                                • Generic Win/DOS Executable (2004/3) 12.51%
                                                                                • DOS Executable Generic (2002/1) 12.50%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                                File name:raw_cbot.exe
                                                                                File size:61'952 bytes
                                                                                MD5:9ef7edfa24458412dd4667023fd8466b
                                                                                SHA1:696a87ae39645223f5149f455c32d77135f67cbd
                                                                                SHA256:1fc13ff144f070e7cec92dd959ec889df2928b8220e420ec3ba2a78bcbeb7e13
                                                                                SHA512:45f75ad39e7d5a006d265257259a9036b26c9b9c4bacfee0d37a86a84dfdfd5d52ebd15c9a0e46ac2e70d3dea46cceac1b6ea7a5f42b879f0660dcde13dbd4fe
                                                                                SSDEEP:768:EX/VDdl1ooSHqckQSZecQu0hsehhRxU5UluWaXVpuvYD1bvOn40XZ00yanOuSx4:SpVooz2LZrTculaVEvWpOnr00yjg
                                                                                TLSH:5C531B1BB34354EDC62AD5B486BFAB33B672B8920630AF3F52A4E7701E10E605F5A514
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g...............&.......................@.............................p......e.....`... ............................
                                                                                Icon Hash:90cececece8e8eb0
                                                                                Entrypoint:0x1400014d0
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x140000000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                                                Time Stamp:0x67D6EDDC [Sun Mar 16 15:27:24 2025 UTC]
                                                                                TLS Callbacks:0x40004e80, 0x1, 0x40004e50, 0x1
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:c6f8590df3a6e8e386690a3f3b0cf556
                                                                                Instruction
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                dec eax
                                                                                mov eax, dword ptr [0000CEE5h]
                                                                                mov dword ptr [eax], 00000001h
                                                                                call 00007F103C820E6Fh
                                                                                nop
                                                                                nop
                                                                                dec eax
                                                                                add esp, 28h
                                                                                ret
                                                                                nop dword ptr [eax]
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                dec eax
                                                                                mov eax, dword ptr [0000CEC5h]
                                                                                mov dword ptr [eax], 00000000h
                                                                                call 00007F103C820E4Fh
                                                                                nop
                                                                                nop
                                                                                dec eax
                                                                                add esp, 28h
                                                                                ret
                                                                                nop dword ptr [eax]
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                call 00007F103C82A784h
                                                                                dec eax
                                                                                test eax, eax
                                                                                sete al
                                                                                movzx eax, al
                                                                                neg eax
                                                                                dec eax
                                                                                add esp, 28h
                                                                                ret
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                dec eax
                                                                                lea ecx, dword ptr [00000009h]
                                                                                jmp 00007F103C821199h
                                                                                nop dword ptr [eax+00h]
                                                                                ret
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                nop
                                                                                dec eax
                                                                                sub esp, 38h
                                                                                dec esp
                                                                                mov eax, dword ptr [0000CDA5h]
                                                                                dec ebp
                                                                                mov edx, dword ptr [eax]
                                                                                dec esp
                                                                                mov dword ptr [esp+28h], edx
                                                                                inc ebp
                                                                                xor edx, edx
                                                                                mov word ptr [esp+26h], 0000h
                                                                                cmp edx, 01h
                                                                                jle 00007F103C8211D2h
                                                                                inc esp
                                                                                movzx ebx, word ptr [ecx]
                                                                                dec eax
                                                                                add ecx, 02h
                                                                                sub edx, 02h
                                                                                inc ebp
                                                                                add edx, ebx
                                                                                jmp 00007F103C8211ADh
                                                                                jne 00007F103C8211D0h
                                                                                mov dl, byte ptr [ecx]
                                                                                mov byte ptr [esp+26h], dl
                                                                                movzx ecx, word ptr [esp+26h]
                                                                                inc ecx
                                                                                add edx, ecx
                                                                                inc ebp
                                                                                mov ecx, edx
                                                                                inc ecx
                                                                                movzx eax, word ptr [eax]
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x120000xe80.idata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x3b0.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf0000x714.pdata
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000x98.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xdbe00x28.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x123c80x350.idata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000xa5400xa600a35fc22fa5f702d6a262b7e9ced74b05False0.5507341867469879data6.242709308827174IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .data0xc0000x1000x2003e73fd0a1b3c609970935400c78dc530False0.1640625data1.0307701636188438IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rdata0xd0000x1a500x1c00bcf1448c63dd02634b8bb5f2cb923d1fFalse0.30189732142857145data5.219944685913332IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .pdata0xf0000x7140x8009b24038d224e6c7298cc440dee930df5False0.4560546875data4.269365295670671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .xdata0x100000x7f80x8001f19f9168970429cb4ec7dfbb1b7b796False0.32666015625data4.592232795586179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .bss0x110000xc600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .idata0x120000xe800x10006c56a56025577ba1e1d886c17ac833dbFalse0.314453125zlib compressed data4.1105520524632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .CRT0x130000x680x2000cdd8602562e773b404ac0502234f75bFalse0.072265625data0.3406417195159507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .tls0x140000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0x150000x3b00x400c141e82b043ee638ba818a72ae55876fFalse0.4208984375data3.0863403008417483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .reloc0x160000x980x200c70f29840f30c2814897bb63d508c384False0.27734375data1.7375704363188285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_VERSION0x150580x358dataEnglishUnited States0.4614485981308411
                                                                                DLLImport
                                                                                ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext
                                                                                KERNEL32.dllCloseHandle, CopyFileA, CreateMutexA, CreateThread, DeleteCriticalSection, DeleteFileA, EnterCriticalSection, ExitProcess, FreeLibrary, GetCurrentProcessId, GetLastError, GetModuleFileNameA, GetModuleHandleW, GetProcAddress, GetStartupInfoA, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, MoveFileA, MultiByteToWideChar, ReleaseMutex, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte
                                                                                msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _exit, _fmode, _initterm, _lock, _onexit, _time64, _unlock, abort, atoi, calloc, exit, fclose, fopen, fprintf, fputc, free, fwrite, localeconv, malloc, memcpy, perror, rand, signal, strcpy, strerror, strlen, strncmp, strrchr, vfprintf, wcslen, _write, _open, _close
                                                                                SHELL32.dllSHGetSpecialFolderPathA
                                                                                WS2_32.dllWSACleanup, WSAGetLastError, WSASocketA, WSAStartup, bind, closesocket, connect, htons, inet_addr, inet_ntoa, ioctlsocket, ntohl, ntohs, recv, select, send, sendto, setsockopt, socket
                                                                                DescriptionData
                                                                                CompanyNameMicrosoft Corporation
                                                                                FileDescriptionHost Process for Windows Services
                                                                                FileVersion1.2.0.0
                                                                                InternalNamecbot
                                                                                LegalCopyright Microsoft Corporation. All rights reserved.
                                                                                OriginalFilenamesvchost.exe
                                                                                ProductNameMicrosoft Windows Operating System
                                                                                ProductVersion1.2.0.0
                                                                                Translation0x0409 0x04b0
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States

                                                                                Download Network PCAP: filteredfull

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Mar 20, 2025 03:09:57.645657063 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:09:57.645776987 CET4971218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:09:57.848104954 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:09:57.848285913 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:09:57.848469019 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:09:58.054847002 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:09:58.054985046 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:09:58.261264086 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:09:58.646155119 CET4971218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:00.661670923 CET4971218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:03.146431923 CET4971618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:04.146075010 CET4971618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:06.146037102 CET4971618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:08.662041903 CET4971918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:09.661745071 CET4971918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:10.446366072 CET4972118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:10.446477890 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:10.684154987 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:10.684320927 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:10.684997082 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:10.929022074 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:10.929177999 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:11.168448925 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:11.458561897 CET4972118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:11.677300930 CET4971918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:13.289779902 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:13.289855003 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:13.458787918 CET4972118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:14.177663088 CET4972818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:15.195777893 CET4972818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:15.959041119 CET4972918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:16.974158049 CET4972918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:17.208549023 CET4972818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:18.989831924 CET4972918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:19.709166050 CET4973018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:20.724186897 CET4973018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:21.474672079 CET4973118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:22.489811897 CET4973118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:22.739801884 CET4973018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:24.505528927 CET4973118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:25.224711895 CET4973218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:26.137595892 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:26.137701988 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:26.224231005 CET4973218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:27.005953074 CET4973318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:28.021078110 CET4973318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:28.224210978 CET4973218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:28.494754076 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:28.494872093 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:30.021302938 CET4973318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:30.740119934 CET4973418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:31.755433083 CET4973418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:32.521565914 CET4973518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:33.521203995 CET4973518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:33.771112919 CET4973418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:35.536824942 CET4973518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:36.255913019 CET4973618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:37.271207094 CET4973618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:38.052830935 CET4973718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:39.067984104 CET4973718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:39.271085024 CET4973618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:41.068005085 CET4973718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:41.341924906 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:41.344506025 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:41.771598101 CET4973818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:42.786892891 CET4973818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:43.568381071 CET4973918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:43.698085070 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:43.698195934 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:44.583786964 CET4973918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:44.786838055 CET4973818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:46.583722115 CET4973918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:47.287132978 CET4974018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:48.302361965 CET4974018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:49.099812984 CET4974118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:50.118411064 CET4974118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:50.302382946 CET4974018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:52.146238089 CET4974118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:52.802897930 CET4974318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:53.818018913 CET4974318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:54.631237030 CET4974418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:55.646142006 CET4974418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:55.818012953 CET4974318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:56.582268953 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:56.582420111 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:57.646234989 CET4974418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:58.318509102 CET4974518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:10:58.915014029 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:10:58.915183067 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:10:59.333636045 CET4974518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:00.162281990 CET4974618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:01.161925077 CET4974618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:01.333647966 CET4974518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:03.162065983 CET4974618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:03.849611998 CET4974718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:04.849268913 CET4974718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:05.693504095 CET4974818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:06.693120956 CET4974818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:06.849267006 CET4974718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:08.693083048 CET4974818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:09.365319967 CET4974918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:10.365000010 CET4974918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:11.224759102 CET4975018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:11.812704086 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:11.812900066 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:12.239962101 CET4975018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:12.365140915 CET4974918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:14.122719049 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:14.122792959 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:14.239958048 CET4975018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:14.881334066 CET4975118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:15.896182060 CET4975118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:16.756002903 CET4975218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:17.771212101 CET4975218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:17.896169901 CET4975118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:19.771286011 CET4975218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:20.412286997 CET4975318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:21.412014008 CET4975318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:22.271785975 CET4975418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:23.286853075 CET4975418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:23.411943913 CET4975318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:25.302449942 CET4975418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:25.943707943 CET4975518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:26.943227053 CET4975518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:27.021866083 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:27.021922112 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:27.787405014 CET4975618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:28.802582026 CET4975618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:28.943214893 CET4975518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:29.322858095 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:29.322925091 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:30.818154097 CET4975618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:31.474822998 CET4975718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:32.489981890 CET4975718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:33.303081989 CET4975818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:34.318113089 CET4975818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:34.490008116 CET4975718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:36.318101883 CET4975818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:37.008068085 CET4975918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:38.021234989 CET4975918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:38.818712950 CET4976018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:39.833879948 CET4976018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:40.021298885 CET4975918063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:41.849379063 CET4976018063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:42.274935961 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:42.274976969 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:42.521642923 CET4976118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:43.536848068 CET4976118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:44.334114075 CET4976218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:44.539190054 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:44.539252996 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:45.333726883 CET4976218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:45.552558899 CET4976118063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:47.333822966 CET4976218063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:48.053024054 CET4976318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:49.052556992 CET4976318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:49.865536928 CET4976418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:50.880649090 CET4976418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:51.052520990 CET4976318063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:52.880870104 CET4976418063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:53.584593058 CET4976518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:54.599442005 CET4976518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:55.397214890 CET4976618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:56.396271944 CET4976618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:56.599420071 CET4976518063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:57.514107943 CET1806349720176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:57.514230967 CET4972018063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:11:58.399698973 CET4976618063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:59.099740982 CET4976718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:11:59.743335962 CET1806349711176.65.142.252192.168.2.4
                                                                                Mar 20, 2025 03:11:59.743442059 CET4971118063192.168.2.4176.65.142.252
                                                                                Mar 20, 2025 03:12:00.115026951 CET4976718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:12:00.928020954 CET4976818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:12:01.927573919 CET4976818063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:12:02.115044117 CET4976718063192.168.2.458.9.110.23
                                                                                Mar 20, 2025 03:12:03.927534103 CET4976818063192.168.2.458.9.110.23
                                                                                Target ID:0
                                                                                Start time:22:09:56
                                                                                Start date:19/03/2025
                                                                                Path:C:\Users\user\Desktop\raw_cbot.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\Desktop\raw_cbot.exe"
                                                                                Imagebase:0x7ff655f90000
                                                                                File size:61'952 bytes
                                                                                MD5 hash:9EF7EDFA24458412DD4667023FD8466B
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:1
                                                                                Start time:22:09:58
                                                                                Start date:19/03/2025
                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                Imagebase:0x7ff6ca680000
                                                                                File size:55'320 bytes
                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:2
                                                                                Start time:22:10:04
                                                                                Start date:19/03/2025
                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                Imagebase:0x7ff6ca680000
                                                                                File size:55'320 bytes
                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:22:10:04
                                                                                Start date:19/03/2025
                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                                                Imagebase:0x7ff6ca680000
                                                                                File size:55'320 bytes
                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:6
                                                                                Start time:22:10:05
                                                                                Start date:19/03/2025
                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                Imagebase:0x7ff6ca680000
                                                                                File size:55'320 bytes
                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false
                                                                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                                Target ID:7
                                                                                Start time:22:10:08
                                                                                Start date:19/03/2025
                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                                Imagebase:0x7ff6ca680000
                                                                                File size:55'320 bytes
                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:8
                                                                                Start time:22:10:09
                                                                                Start date:19/03/2025
                                                                                Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
                                                                                Imagebase:0x7ff733b40000
                                                                                File size:61'952 bytes
                                                                                MD5 hash:9EF7EDFA24458412DD4667023FD8466B
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:10
                                                                                Start time:22:11:08
                                                                                Start date:19/03/2025
                                                                                Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                Imagebase:0x7ff775660000
                                                                                File size:468'120 bytes
                                                                                MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:11
                                                                                Start time:22:11:08
                                                                                Start date:19/03/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff62fc20000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                No disassembly