Edit tour

Windows Analysis Report
041025.exe

Overview

General Information

Sample name:041025.exe
Analysis ID:1661512
MD5:61e4f067963c7dbd7547e1c8ad1c74a6
SHA1:2792be80df914df9c1f3ae21a2c4cde29f96529c
SHA256:f8984264632a0aba48bcd90967988aa1d2c10f9381d00abc08456431ea46d208
Tags:exeuser-lowmal3
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • 041025.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\041025.exe" MD5: 61E4F067963C7DBD7547E1C8AD1C74A6)
    • 041025.exe (PID: 7400 cmdline: "C:\Users\user\Desktop\041025.exe" MD5: 61E4F067963C7DBD7547E1C8AD1C74A6)
    • 041025.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\041025.exe" MD5: 61E4F067963C7DBD7547E1C8AD1C74A6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{
  "Host:Port:Password": [
    "vtrow.ydns.eu:2404:1"
  ],
  "Assigned name": "ServerT",
  "Connect interval": "1",
  "Install flag": "Disable",
  "Setup HKCU\\Run": "Enable",
  "Setup HKLM\\Run": "Enable",
  "Install path": "Application path",
  "Copy file": "conhost.exe",
  "Startup value": "Edge",
  "Hide file": "Enable",
  "Mutex": "Rmc-OYYBQ1",
  "Keylog flag": "1",
  "Keylog path": "Application path",
  "Keylog file": "logs.dat",
  "Keylog crypt": "Disable",
  "Hide keylog file": "Disable",
  "Screenshot flag": "Disable",
  "Screenshot time": "1",
  "Take Screenshot option": "Disable",
  "Take screenshot title": "",
  "Take screenshot time": "5",
  "Screenshot path": "AppData",
  "Screenshot file": "Screenshots",
  "Screenshot crypt": "Disable",
  "Mouse option": "Disable",
  "Delete file": "Disable",
  "Audio record time": "5",
  "Audio folder": "MicRecords",
  "Connect delay": "0",
  "Copy folder": "Microsoft",
  "Keylog folder": "remcos",
  "Keylog file max size": "100"
}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.3722512274.000000000265E000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x691e0:$a1: Remcos restarted by watchdog!
            • 0x69738:$a3: %02i:%02i:%02i:%03i
            • 0x69abd:$a4: * Remcos v
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            4.2.041025.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              4.2.041025.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x691e0:$a1: Remcos restarted by watchdog!
              • 0x69738:$a3: %02i:%02i:%02i:%03i
              • 0x69abd:$a4: * Remcos v
              4.2.041025.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
              • 0x641e4:$str_a1: C:\Windows\System32\cmd.exe
              • 0x64160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x63610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x63e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6320c:$str_b2: Executing file:
              • 0x64328:$str_b3: GetDirectListeningPort
              • 0x63c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x63e30:$str_b7: \update.vbs
              • 0x63234:$str_b9: Downloaded file:
              • 0x63220:$str_b10: Downloading file:
              • 0x632c4:$str_b12: Failed to upload file:
              • 0x642f0:$str_b13: StartForward
              • 0x64310:$str_b14: StopForward
              • 0x63dd8:$str_b15: fso.DeleteFile "
              • 0x63d6c:$str_b16: On Error Resume Next
              • 0x63e08:$str_b17: fso.DeleteFolder "
              • 0x632b4:$str_b18: Uploaded file:
              • 0x63274:$str_b19: Unable to delete:
              • 0x63da0:$str_b20: while fso.FileExists("
              • 0x63749:$str_c0: [Firefox StoredLogins not found]
              4.2.041025.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
              • 0x63100:$s1: \Classes\mscfile\shell\open\command
              • 0x63160:$s1: \Classes\mscfile\shell\open\command
              • 0x63148:$s2: eventvwr.exe
              4.2.041025.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 17 entries

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\041025.exe, ProcessId: 7408, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-04-10T08:35:16.178684+020020365941Malware Command and Control Activity Detected192.168.2.649687188.93.233.422404TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-04-10T08:35:17.862422+020028033043Unknown Traffic192.168.2.649688178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: vtrow.ydns.euAvira URL Cloud: Label: malware
                Source: 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["vtrow.ydns.eu:2404:1"], "Assigned name": "ServerT", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "conhost.exe", "Startup value": "Edge", "Hide file": "Enable", "Mutex": "Rmc-OYYBQ1", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Microsoft", "Keylog folder": "remcos", "Keylog file max size": "100"}
                Source: 041025.exeVirustotal: Detection: 30%Perma Link
                Source: 041025.exeReversingLabs: Detection: 38%
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722512274.000000000265E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7408, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleNeural Call Log Analysis: 96.0%
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
                Source: 041025.exe, 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----
                Source: 041025.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 041025.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004068CD FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0044BA59 FindFirstFileExA,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49687 -> 188.93.233.42:2404
                Source: Malware configuration extractorURLs: vtrow.ydns.eu
                Source: global trafficTCP traffic: 192.168.2.6:49687 -> 188.93.233.42:2404
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: NETSOLUTIONSNL NETSOLUTIONSNL
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49688 -> 178.237.33.50:80
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041936B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: vtrow.ydns.eu
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: 041025.exe, 041025.exe, 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: 041025.exe, 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpL
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00409340 SetWindowsHookExA 0000000D,0040932C,00000000
                Source: C:\Users\user\Desktop\041025.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\041025.exe
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722512274.000000000265E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7408, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041A76C SystemParametersInfoW,

                System Summary

                barindex
                Source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: 041025.exe PID: 7408, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\Desktop\041025.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\041025.exeCode function: 0_2_0568CD34
                Source: C:\Users\user\Desktop\041025.exeCode function: 0_2_0568DAD8
                Source: C:\Users\user\Desktop\041025.exeCode function: 0_2_0568DAC7
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00425152
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00435286
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004513D4
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0045050B
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00436510
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004316FB
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0043569E
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00443700
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004257FB
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004128E3
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00425964
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041B917
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0043D9CC
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00435AD3
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00424BC3
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0043DBFB
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0044ABA9
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00433C0B
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00434D8A
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0043DE2A
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041CEAF
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00435F08
                Source: C:\Users\user\Desktop\041025.exeCode function: String function: 00402073 appears 51 times
                Source: C:\Users\user\Desktop\041025.exeCode function: String function: 00432B90 appears 53 times
                Source: C:\Users\user\Desktop\041025.exeCode function: String function: 00432525 appears 41 times
                Source: 041025.exe, 00000000.00000000.1261718488.0000000000D00000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemmRF.exe> vs 041025.exe
                Source: 041025.exe, 00000000.00000002.1280712015.0000000007400000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 041025.exe
                Source: 041025.exe, 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 041025.exe
                Source: 041025.exe, 00000000.00000002.1275730502.000000000129E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 041025.exe
                Source: 041025.exeBinary or memory string: OriginalFilenamemmRF.exe> vs 041025.exe
                Source: 041025.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: 041025.exe PID: 7408, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 041025.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, waQ1jmESc6sMItFAg4.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, waQ1jmESc6sMItFAg4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, waQ1jmESc6sMItFAg4.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.041025.exe.7400000.6.raw.unpack, m5XD8Feve7o6ZmRGMq.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.041025.exe.7400000.6.raw.unpack, m5XD8Feve7o6ZmRGMq.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.041025.exe.7400000.6.raw.unpack, waQ1jmESc6sMItFAg4.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.041025.exe.7400000.6.raw.unpack, waQ1jmESc6sMItFAg4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.041025.exe.7400000.6.raw.unpack, waQ1jmESc6sMItFAg4.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, m5XD8Feve7o6ZmRGMq.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, m5XD8Feve7o6ZmRGMq.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@5/3@2/2
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Users\user\Desktop\041025.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\041025.exe.logJump to behavior
                Source: C:\Users\user\Desktop\041025.exeMutant created: NULL
                Source: C:\Users\user\Desktop\041025.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-OYYBQ1
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Software\
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Rmc-OYYBQ1
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Exe
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Exe
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Rmc-OYYBQ1
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: (#G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Inj
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Inj
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Inj
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Rmc-OYYBQ1
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: origmsc
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Edge
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: !G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: !G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: !G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: H"G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: !G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: exepath
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: H"G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: exepath
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: !G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: licence
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: `"G
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: Administrator
                Source: C:\Users\user\Desktop\041025.exeCommand line argument: User
                Source: 041025.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 041025.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\041025.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: 041025.exeVirustotal: Detection: 30%
                Source: 041025.exeReversingLabs: Detection: 38%
                Source: unknownProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: C:\Users\user\Desktop\041025.exeProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: C:\Users\user\Desktop\041025.exeProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: C:\Users\user\Desktop\041025.exeProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: C:\Users\user\Desktop\041025.exeProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: C:\Users\user\Desktop\041025.exeSection loaded: mscoree.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: apphelp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: version.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: wldp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: profapi.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: dwrite.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: textshaping.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: windowscodecs.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: amsi.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: userenv.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: msasn1.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: gpapi.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: iconcodecservice.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: winmm.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: urlmon.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: wininet.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: iertutil.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: srvcli.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: netutils.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: sspicli.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: mswsock.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: wldp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: profapi.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: winhttp.dll
                Source: C:\Users\user\Desktop\041025.exeSection loaded: winnsi.dll
                Source: C:\Users\user\Desktop\041025.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32
                Source: C:\Users\user\Desktop\041025.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: 041025.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 041025.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: 041025.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: 0.2.041025.exe.319e30c.1.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, waQ1jmESc6sMItFAg4.cs.Net Code: r4RU70kLHe System.Reflection.Assembly.Load(byte[])
                Source: 0.2.041025.exe.5c10000.5.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                Source: 0.2.041025.exe.7400000.6.raw.unpack, waQ1jmESc6sMItFAg4.cs.Net Code: r4RU70kLHe System.Reflection.Assembly.Load(byte[])
                Source: 041025.exeStatic PE information: 0xAE11ECA4 [Tue Jul 18 01:04:36 2062 UTC]
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004000D8 push es; iretd
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040008C push es; iretd
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004542E6 push ecx; ret
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0045B4FD push esi; ret
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00432BD6 push ecx; ret
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00454C08 push eax; ret
                Source: 041025.exeStatic PE information: section name: .text entropy: 7.901414926678369
                Source: 0.2.041025.exe.319e30c.1.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                Source: 0.2.041025.exe.319e30c.1.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                Source: 0.2.041025.exe.319e30c.1.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, HhOhtdbp8E2S2kCEsI.csHigh entropy of concatenated method names: 'qObSsoZ9G3', 'BkdS8vKjna', 'cuqSeGFroT', 'rqwSb84bWH', 'T9gSMbYsBv', 'JWJStkSDjh', 'WkhShHVmqV', 'AhmS07gGEi', 'YOpSHYf2dl', 'YuQS4o9KX8'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, uf8F18iEeB2RSZaeKp.csHigh entropy of concatenated method names: 'Dispose', 'xKhpy7LQvU', 'wIo5cwpCIP', 'aQ2LK0J8Oa', 'oIJpa82jEw', 'DY3pz1tPiV', 'ProcessDialogKey', 'Rlw5kCIxSk', 'Yfe5p4TtlV', 'DJ155rT6sv'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, a4fF47WdMtamelaQQ8.csHigh entropy of concatenated method names: 'dcHQeaRuf2', 'NQhQbypSW0', 'mfTQZAUuSo', 'aJHQcnLJRH', 'LMaQJn7kMs', 'SRLQweY4yv', 'iklQ1WfwD4', 'SDjQPgpPPQ', 'udIQlobekW', 'xCEQV3oGgD'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, XIIqvjB8liROi6P9fq.csHigh entropy of concatenated method names: 'TtKMl6nS5S', 'WekMYyiV0v', 'abZMBdf2Ej', 'OevM3BZtSX', 'vHSMcD45H5', 'ipSM6kwC6d', 'AtOMJBVg6M', 'Yp5MwUCBEC', 'WkcMjFx0jj', 'ShhM1lluVd'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, S7iNeTGVR9Utb93TVN.csHigh entropy of concatenated method names: 'ToString', 'thPtVAc5DD', 'IictcG2Vgg', 'SGlt6e1ftc', 'TYstJiC1oM', 'PZftwUOeyX', 'UO7tjJLdKL', 'h02t1tJh7D', 'EmetPkkkx0', 'u1Itd3V3CX'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, DKyQdncw1NkKukSg1M.csHigh entropy of concatenated method names: 'LUN8NO0fUNlK9onHahd', 'kPom1303h4JaS2j7foY', 'EFPm00uMmO', 'uVJmHMkWQi', 'bWim45IRDl', 'mHsAfv0QcbgdDAg8Xyh', 'YVueo60FZcg89UEvcQJ', 'MY8TVT0tk9fpHPX3m3B'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, Oq0PiISUMLaG6ACixI.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'XSU5yRuYBS', 'GcQ5amVTSb', 'IdV5zltEq5', 'UoNAk534kD', 'enGApEoucM', 'aonA59Ig3N', 'rkXAAgYLN8', 'K6CQLCOkfUUKS7h9IZe'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, waQ1jmESc6sMItFAg4.csHigh entropy of concatenated method names: 'FGAAXGkHq5', 'mlrAqIEE86', 'DUZAieG6Sk', 'mrvASNy1yo', 'zZwAT0QLTY', 'MEkAmV3iki', 'H2mANGgbUM', 'sOtAEtokbQ', 'stEAIQkG2o', 'VXqACscrQd'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, WeeU0TpUMR3IUma7aB7.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hXILHFUlew', 'uXEL4eDpbS', 'WfvLf79TkR', 'JSbLLjyDAN', 'SVNLuxK5Oe', 'oUZLnaw0Sc', 'SihLgVJXNu'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, Gr0xjdpAgjxKWT61Yrp.csHigh entropy of concatenated method names: 'M4vfaLSygr', 'gTefz9OYt1', 'm1vLkKM4Cy', 'Fj7AsF6RPlXX7BqGagy', 'vRstY064k0FdAsAuNIL', 'htLEC06cjeH3ogdSt0E', 'pEKCnL6qqDYt47xF9Ce', 'IIvifE6yeWLemMjfbN8'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, JCIxSkyafe4TtlVeJ1.csHigh entropy of concatenated method names: 'LhVHZFA4K3', 'SaeHcNbR6h', 'Uc2H6bp8sa', 'olsHJFY0UG', 'Y4lHw3E5sP', 'bjsHjDyP0f', 'XWmH1w9orZ', 'VobHPuAevM', 'mhgHd8Likk', 'kdgHlxqohJ'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, YsaX1JJJ631lYJHL5b.csHigh entropy of concatenated method names: 'v6Qmghjkne', 'oPYmD1FpKX', 'XoLm73c4oT', 'lJWmsHAvQS', 'Unum8EA4yt', 'bpcmFsUlMY', 'GfimbLbIUJ', 'GJSmOtAl6v', 'rDy1On0x9xrYqWkMRHB', 'dueiRt0iF9eWC541Yvu'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, SSy5FdzIh2yo3lHNDo.csHigh entropy of concatenated method names: 'QJS48TkV4A', 'mXM4eV22SD', 'qjS4bGvvY2', 'WGU4ZDqrIE', 'CP54cgdBMq', 'XCm4JKQMPQ', 'lnN4wNIygC', 'Vcv4gjNqvL', 'mV34DyVDxy', 'pkc4RVRJLo'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, jYgUmd1BdyNtslMfKI.csHigh entropy of concatenated method names: 'qbfNqgTKyS', 'dHpNSP3wEK', 'JxMNmxqKfl', 'WQ1maqrwZn', 'p1Bmzs3X7r', 'OGGNklbyne', 'bOrNpfcpvL', 'g39N581pIs', 'qILNAA9qfo', 'wyNNUJGmdA'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, CST41LdRyfPTMbcmED.csHigh entropy of concatenated method names: 'cMfNDALRg2', 'cGqNRrprml', 'UqIN78iyf0', 'dBSNsCfL5b', 'vQFN94Gs0A', 'LZmN88P0f1', 'oaGNFUjb77', 'jNfNesugU6', 'fWMNb9f8v5', 'GpiNOn5x0y'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, J7VhZ7rBOUpuVgQX8F.csHigh entropy of concatenated method names: 'QZ6hC5vOmc', 'Udehvpxupq', 'ToString', 'zOEhquvDLu', 'S41hij11wg', 'lqOhSCX9Qf', 'o6rhTlaW6X', 'UpIhmkJc29', 'AylhNJ5NW5', 'f1GhErg9Ou'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, JJJQsA2Lyrt72RBZUO.csHigh entropy of concatenated method names: 'z3MhxC6lL5', 'xJ6haE3WYc', 'Fe80kiHKH3', 'pqS0pTj9Gv', 'uZShVyOhbi', 'L0QhYE0QIK', 'pIuhWP5xeE', 'OpFhByyjG0', 'R26h3prdip', 'SfqhGr8efm'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, BHivNUpp4WnYU7bS15d.csHigh entropy of concatenated method names: 'gSf4a3qCgF', 'GK04zMk9ZU', 'sXWfkSh22p', 'X5XfpeMe4B', 'ED5f5vHweI', 'L5rfA0lvE8', 'BtGfUrgTJe', 'dSOfXA5uh4', 'lVkfqupLQq', 'BJhfi7ED39'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, fZmBtYpkUk2rMYktqAM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OTU4VMTkIB', 'DuX4YNrsFn', 'EtE4WSLCqv', 'HJ94BwRZ6T', 'QLP43x4POv', 'tcO4GGdi9o', 'i3V4rMM2UW'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, agprNjOkXc5eGux9tn.csHigh entropy of concatenated method names: 'V6NT94Frsp', 'ntvTFkOgbr', 'gm0S6SsIJ0', 'TUhSJ1JBZ9', 'RJMSwjEe7g', 't1eSjGOVN9', 'VT4S1QnoJE', 'uq1SPRmMm3', 'qhaSdBUdPT', 'gRdSl3rcQT'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, I3JUBsp5q2Krs9Qd848.csHigh entropy of concatenated method names: 'ToString', 'Yt7feTs2io', 'x8vfbBUTG9', 'sLCfOMJMH8', 'j4tfZ8qk3c', 'wNpfcY8KOf', 'z2Wf6aWxu8', 'WrOfJTGl8R', 'ExS4p96VIexyM1hSMWA', 'r1TfcE6pJgsP2eL2yX0'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, og5cV65Kcsp1yNio3M.csHigh entropy of concatenated method names: 'UUf7yGuNR', 'XvbsqIem5', 'Mjn8vhAew', 'RHLF3CGEW', 'VICbj2DNL', 'HUpOPWkoO', 'P611P1vEbCk4ssy3j7', 'kCGLUI7qNB89xHCRo4', 'SuW03HIg0', 'mx148OWcd'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, TT6svVaGeyoZERITjl.csHigh entropy of concatenated method names: 'D2R4SHkJBD', 'WAo4TjqOIZ', 'B764mrFsC3', 'nLx4N2ceqD', 'UqJ4HO5J75', 'ohL4EKVRt7', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, U9pQVqZCXwfLqFmJo7.csHigh entropy of concatenated method names: 'dLEmXqTMZw', 'sdomi1gtLy', 'XW5mTIRDGx', 'OQlmNLNuys', 'Q9KmEgYXCg', 'UPvTKKakXI', 'R9KT2WUBap', 'prrToASV0v', 'viBTxFXbOY', 'l1pTyTTSXv'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, iqQcEdoXHDKh7LQvUM.csHigh entropy of concatenated method names: 'AUpHMfDgqi', 'PvdHh0Qfer', 'lF3HHhqlXX', 'pqUHfrKpxR', 'eYUHucy2dL', 'SUMHgDDeiN', 'Dispose', 'DSX0q0Eo7f', 'Jt00iRDcxf', 'Y350SEkH8j'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, FlRQM5UP4kBNXs9Hgl.csHigh entropy of concatenated method names: 'TovpN5XD8F', 'me7pEo6ZmR', 'Mp8pCE2S2k', 'lEspvIkgpr', 'vx9pMtnK9p', 'nVqptCXwfL', 'ScEOOAnrO5ZRXD2t0r', 'of803XbNLJC41KQ2eU', 'EAKppbRGUB', 'VgrpA4bALj'
                Source: 0.2.041025.exe.4277d58.2.raw.unpack, m5XD8Feve7o6ZmRGMq.csHigh entropy of concatenated method names: 'RSwiBPHkUa', 'eEbi3P3sOR', 'niDiGy5XIL', 'gvairF8sse', 'IM4iKxgAFs', 'lrDi2pSO7b', 'Xv5io66dMS', 'wJqixZaa68', 'mLPiybsPg4', 'r4qiaU0uE8'
                Source: 0.2.041025.exe.5c10000.5.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                Source: 0.2.041025.exe.5c10000.5.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                Source: 0.2.041025.exe.5c10000.5.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, HhOhtdbp8E2S2kCEsI.csHigh entropy of concatenated method names: 'qObSsoZ9G3', 'BkdS8vKjna', 'cuqSeGFroT', 'rqwSb84bWH', 'T9gSMbYsBv', 'JWJStkSDjh', 'WkhShHVmqV', 'AhmS07gGEi', 'YOpSHYf2dl', 'YuQS4o9KX8'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, uf8F18iEeB2RSZaeKp.csHigh entropy of concatenated method names: 'Dispose', 'xKhpy7LQvU', 'wIo5cwpCIP', 'aQ2LK0J8Oa', 'oIJpa82jEw', 'DY3pz1tPiV', 'ProcessDialogKey', 'Rlw5kCIxSk', 'Yfe5p4TtlV', 'DJ155rT6sv'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, a4fF47WdMtamelaQQ8.csHigh entropy of concatenated method names: 'dcHQeaRuf2', 'NQhQbypSW0', 'mfTQZAUuSo', 'aJHQcnLJRH', 'LMaQJn7kMs', 'SRLQweY4yv', 'iklQ1WfwD4', 'SDjQPgpPPQ', 'udIQlobekW', 'xCEQV3oGgD'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, XIIqvjB8liROi6P9fq.csHigh entropy of concatenated method names: 'TtKMl6nS5S', 'WekMYyiV0v', 'abZMBdf2Ej', 'OevM3BZtSX', 'vHSMcD45H5', 'ipSM6kwC6d', 'AtOMJBVg6M', 'Yp5MwUCBEC', 'WkcMjFx0jj', 'ShhM1lluVd'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, S7iNeTGVR9Utb93TVN.csHigh entropy of concatenated method names: 'ToString', 'thPtVAc5DD', 'IictcG2Vgg', 'SGlt6e1ftc', 'TYstJiC1oM', 'PZftwUOeyX', 'UO7tjJLdKL', 'h02t1tJh7D', 'EmetPkkkx0', 'u1Itd3V3CX'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, DKyQdncw1NkKukSg1M.csHigh entropy of concatenated method names: 'LUN8NO0fUNlK9onHahd', 'kPom1303h4JaS2j7foY', 'EFPm00uMmO', 'uVJmHMkWQi', 'bWim45IRDl', 'mHsAfv0QcbgdDAg8Xyh', 'YVueo60FZcg89UEvcQJ', 'MY8TVT0tk9fpHPX3m3B'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, Oq0PiISUMLaG6ACixI.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'XSU5yRuYBS', 'GcQ5amVTSb', 'IdV5zltEq5', 'UoNAk534kD', 'enGApEoucM', 'aonA59Ig3N', 'rkXAAgYLN8', 'K6CQLCOkfUUKS7h9IZe'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, waQ1jmESc6sMItFAg4.csHigh entropy of concatenated method names: 'FGAAXGkHq5', 'mlrAqIEE86', 'DUZAieG6Sk', 'mrvASNy1yo', 'zZwAT0QLTY', 'MEkAmV3iki', 'H2mANGgbUM', 'sOtAEtokbQ', 'stEAIQkG2o', 'VXqACscrQd'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, WeeU0TpUMR3IUma7aB7.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hXILHFUlew', 'uXEL4eDpbS', 'WfvLf79TkR', 'JSbLLjyDAN', 'SVNLuxK5Oe', 'oUZLnaw0Sc', 'SihLgVJXNu'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, Gr0xjdpAgjxKWT61Yrp.csHigh entropy of concatenated method names: 'M4vfaLSygr', 'gTefz9OYt1', 'm1vLkKM4Cy', 'Fj7AsF6RPlXX7BqGagy', 'vRstY064k0FdAsAuNIL', 'htLEC06cjeH3ogdSt0E', 'pEKCnL6qqDYt47xF9Ce', 'IIvifE6yeWLemMjfbN8'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, JCIxSkyafe4TtlVeJ1.csHigh entropy of concatenated method names: 'LhVHZFA4K3', 'SaeHcNbR6h', 'Uc2H6bp8sa', 'olsHJFY0UG', 'Y4lHw3E5sP', 'bjsHjDyP0f', 'XWmH1w9orZ', 'VobHPuAevM', 'mhgHd8Likk', 'kdgHlxqohJ'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, YsaX1JJJ631lYJHL5b.csHigh entropy of concatenated method names: 'v6Qmghjkne', 'oPYmD1FpKX', 'XoLm73c4oT', 'lJWmsHAvQS', 'Unum8EA4yt', 'bpcmFsUlMY', 'GfimbLbIUJ', 'GJSmOtAl6v', 'rDy1On0x9xrYqWkMRHB', 'dueiRt0iF9eWC541Yvu'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, SSy5FdzIh2yo3lHNDo.csHigh entropy of concatenated method names: 'QJS48TkV4A', 'mXM4eV22SD', 'qjS4bGvvY2', 'WGU4ZDqrIE', 'CP54cgdBMq', 'XCm4JKQMPQ', 'lnN4wNIygC', 'Vcv4gjNqvL', 'mV34DyVDxy', 'pkc4RVRJLo'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, jYgUmd1BdyNtslMfKI.csHigh entropy of concatenated method names: 'qbfNqgTKyS', 'dHpNSP3wEK', 'JxMNmxqKfl', 'WQ1maqrwZn', 'p1Bmzs3X7r', 'OGGNklbyne', 'bOrNpfcpvL', 'g39N581pIs', 'qILNAA9qfo', 'wyNNUJGmdA'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, CST41LdRyfPTMbcmED.csHigh entropy of concatenated method names: 'cMfNDALRg2', 'cGqNRrprml', 'UqIN78iyf0', 'dBSNsCfL5b', 'vQFN94Gs0A', 'LZmN88P0f1', 'oaGNFUjb77', 'jNfNesugU6', 'fWMNb9f8v5', 'GpiNOn5x0y'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, J7VhZ7rBOUpuVgQX8F.csHigh entropy of concatenated method names: 'QZ6hC5vOmc', 'Udehvpxupq', 'ToString', 'zOEhquvDLu', 'S41hij11wg', 'lqOhSCX9Qf', 'o6rhTlaW6X', 'UpIhmkJc29', 'AylhNJ5NW5', 'f1GhErg9Ou'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, JJJQsA2Lyrt72RBZUO.csHigh entropy of concatenated method names: 'z3MhxC6lL5', 'xJ6haE3WYc', 'Fe80kiHKH3', 'pqS0pTj9Gv', 'uZShVyOhbi', 'L0QhYE0QIK', 'pIuhWP5xeE', 'OpFhByyjG0', 'R26h3prdip', 'SfqhGr8efm'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, BHivNUpp4WnYU7bS15d.csHigh entropy of concatenated method names: 'gSf4a3qCgF', 'GK04zMk9ZU', 'sXWfkSh22p', 'X5XfpeMe4B', 'ED5f5vHweI', 'L5rfA0lvE8', 'BtGfUrgTJe', 'dSOfXA5uh4', 'lVkfqupLQq', 'BJhfi7ED39'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, fZmBtYpkUk2rMYktqAM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OTU4VMTkIB', 'DuX4YNrsFn', 'EtE4WSLCqv', 'HJ94BwRZ6T', 'QLP43x4POv', 'tcO4GGdi9o', 'i3V4rMM2UW'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, agprNjOkXc5eGux9tn.csHigh entropy of concatenated method names: 'V6NT94Frsp', 'ntvTFkOgbr', 'gm0S6SsIJ0', 'TUhSJ1JBZ9', 'RJMSwjEe7g', 't1eSjGOVN9', 'VT4S1QnoJE', 'uq1SPRmMm3', 'qhaSdBUdPT', 'gRdSl3rcQT'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, I3JUBsp5q2Krs9Qd848.csHigh entropy of concatenated method names: 'ToString', 'Yt7feTs2io', 'x8vfbBUTG9', 'sLCfOMJMH8', 'j4tfZ8qk3c', 'wNpfcY8KOf', 'z2Wf6aWxu8', 'WrOfJTGl8R', 'ExS4p96VIexyM1hSMWA', 'r1TfcE6pJgsP2eL2yX0'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, og5cV65Kcsp1yNio3M.csHigh entropy of concatenated method names: 'UUf7yGuNR', 'XvbsqIem5', 'Mjn8vhAew', 'RHLF3CGEW', 'VICbj2DNL', 'HUpOPWkoO', 'P611P1vEbCk4ssy3j7', 'kCGLUI7qNB89xHCRo4', 'SuW03HIg0', 'mx148OWcd'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, TT6svVaGeyoZERITjl.csHigh entropy of concatenated method names: 'D2R4SHkJBD', 'WAo4TjqOIZ', 'B764mrFsC3', 'nLx4N2ceqD', 'UqJ4HO5J75', 'ohL4EKVRt7', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, U9pQVqZCXwfLqFmJo7.csHigh entropy of concatenated method names: 'dLEmXqTMZw', 'sdomi1gtLy', 'XW5mTIRDGx', 'OQlmNLNuys', 'Q9KmEgYXCg', 'UPvTKKakXI', 'R9KT2WUBap', 'prrToASV0v', 'viBTxFXbOY', 'l1pTyTTSXv'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, iqQcEdoXHDKh7LQvUM.csHigh entropy of concatenated method names: 'AUpHMfDgqi', 'PvdHh0Qfer', 'lF3HHhqlXX', 'pqUHfrKpxR', 'eYUHucy2dL', 'SUMHgDDeiN', 'Dispose', 'DSX0q0Eo7f', 'Jt00iRDcxf', 'Y350SEkH8j'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, FlRQM5UP4kBNXs9Hgl.csHigh entropy of concatenated method names: 'TovpN5XD8F', 'me7pEo6ZmR', 'Mp8pCE2S2k', 'lEspvIkgpr', 'vx9pMtnK9p', 'nVqptCXwfL', 'ScEOOAnrO5ZRXD2t0r', 'of803XbNLJC41KQ2eU', 'EAKppbRGUB', 'VgrpA4bALj'
                Source: 0.2.041025.exe.7400000.6.raw.unpack, m5XD8Feve7o6ZmRGMq.csHigh entropy of concatenated method names: 'RSwiBPHkUa', 'eEbi3P3sOR', 'niDiGy5XIL', 'gvairF8sse', 'IM4iKxgAFs', 'lrDi2pSO7b', 'Xv5io66dMS', 'wJqixZaa68', 'mLPiybsPg4', 'r4qiaU0uE8'
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004063C6 ShellExecuteW,URLDownloadToFileW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\041025.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTR
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040E18D Sleep,ExitProcess,
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: 1280000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: 30F0000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: 2F90000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: 9190000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: 7600000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: A190000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: B190000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\041025.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Users\user\Desktop\041025.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\041025.exeWindow / User API: threadDelayed 3572
                Source: C:\Users\user\Desktop\041025.exeWindow / User API: threadDelayed 5889
                Source: C:\Users\user\Desktop\041025.exeWindow / User API: foregroundWindowGot 1768
                Source: C:\Users\user\Desktop\041025.exeAPI coverage: 10.0 %
                Source: C:\Users\user\Desktop\041025.exe TID: 7308Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\041025.exe TID: 7448Thread sleep count: 262 > 30
                Source: C:\Users\user\Desktop\041025.exe TID: 7448Thread sleep time: -131000s >= -30000s
                Source: C:\Users\user\Desktop\041025.exe TID: 7452Thread sleep count: 3572 > 30
                Source: C:\Users\user\Desktop\041025.exe TID: 7452Thread sleep time: -10716000s >= -30000s
                Source: C:\Users\user\Desktop\041025.exe TID: 7452Thread sleep count: 5889 > 30
                Source: C:\Users\user\Desktop\041025.exe TID: 7452Thread sleep time: -17667000s >= -30000s
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004068CD FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0044BA59 FindFirstFileExA,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,
                Source: C:\Users\user\Desktop\041025.exeThread delayed: delay time: 922337203685477
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BFA000.00000004.00000020.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXb
                Source: C:\Users\user\Desktop\041025.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\041025.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004407B5 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,
                Source: C:\Users\user\Desktop\041025.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004328FC SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\041025.exeMemory allocated: page read and write | page guard
                Source: C:\Users\user\Desktop\041025.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004175E1 mouse_event,
                Source: C:\Users\user\Desktop\041025.exeProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: C:\Users\user\Desktop\041025.exeProcess created: C:\Users\user\Desktop\041025.exe "C:\Users\user\Desktop\041025.exe"
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager(
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ1\
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3722036327.0000000000BE3000.00000004.00000020.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ1\39
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000BFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ1\`
                Source: 041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004329DA cpuid
                Source: C:\Users\user\Desktop\041025.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\041025.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\041025.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\041025.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\041025.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Users\user\Desktop\041025.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\Desktop\041025.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Users\user\Desktop\041025.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\Desktop\041025.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Users\user\Desktop\041025.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\041025.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\Desktop\041025.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                Source: C:\Users\user\Desktop\041025.exeQueries volume information: C:\Users\user\Desktop\041025.exe VolumeInformation
                Source: C:\Users\user\Desktop\041025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\041025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\041025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\041025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\041025.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_0040A0B0 GetLocalTime,wsprintfW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004195F8 GetComputerNameExW,GetUserNameW,
                Source: C:\Users\user\Desktop\041025.exeCode function: 4_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
                Source: C:\Users\user\Desktop\041025.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722512274.000000000265E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7408, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Users\user\Desktop\041025.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\Desktop\041025.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
                Source: C:\Users\user\Desktop\041025.exeCode function: \key3.db

                Remote Access Functionality

                barindex
                Source: C:\Users\user\Desktop\041025.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-OYYBQ1
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.041025.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.416ef90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.041025.exe.40f9970.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722512274.000000000265E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7288, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 041025.exe PID: 7408, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Users\user\Desktop\041025.exeCode function: cmd.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                1
                Deobfuscate/Decode Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                Logon Script (Windows)1
                Windows Service
                3
                Obfuscated Files or Information
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook22
                Process Injection
                12
                Software Packing
                NTDS2
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets33
                System Information Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials21
                Security Software Discovery
                VNCGUI Input Capture12
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync31
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc Filesystem3
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron22
                Process Injection
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1661512 Sample: 041025.exe Startdate: 10/04/2025 Architecture: WINDOWS Score: 100 22 vtrow.ydns.eu 2->22 24 geoplugin.net 2->24 30 Suricata IDS alerts for network traffic 2->30 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 8 other signatures 2->36 7 041025.exe 3 2->7         started        signatures3 process4 file5 18 C:\Users\user\AppData\...\041025.exe.log, ASCII 7->18 dropped 38 Contains functionalty to change the wallpaper 7->38 40 Contains functionality to steal Chrome passwords or cookies 7->40 42 Contains functionality to register a low level keyboard hook 7->42 44 2 other signatures 7->44 11 041025.exe 2 15 7->11         started        16 041025.exe 7->16         started        signatures6 process7 dnsIp8 26 vtrow.ydns.eu 188.93.233.42, 2404, 49687 NETSOLUTIONSNL Portugal 11->26 28 geoplugin.net 178.237.33.50, 49688, 80 ATOM86-ASATOM86NL Netherlands 11->28 20 C:\ProgramData\remcos\logs.dat, data 11->20 dropped 46 Detected Remcos RAT 11->46 48 Installs a global keyboard hook 11->48 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                041025.exe31%VirustotalBrowse
                041025.exe39%ReversingLabs
                SAMPLE100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                vtrow.ydns.eu100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  vtrow.ydns.eu
                  188.93.233.42
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpfalse
                      high
                      vtrow.ydns.eutrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gp/C041025.exe, 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, 041025.exe, 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://geoplugin.net/json.gpL041025.exe, 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://geoplugin.net/json.gpSystem32041025.exe, 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            188.93.233.42
                            vtrow.ydns.euPortugal
                            47674NETSOLUTIONSNLtrue
                            178.237.33.50
                            geoplugin.netNetherlands
                            8455ATOM86-ASATOM86NLfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1661512
                            Start date and time:2025-04-10 08:34:12 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 7m 49s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:14
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:041025.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.evad.winEXE@5/3@2/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 184.31.69.3, 20.109.210.53
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            02:35:13API Interceptor6881373x Sleep call for process: 041025.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\041025.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):144
                            Entropy (8bit):3.365630494294252
                            Encrypted:false
                            SSDEEP:3:rglRKfVlPWlQlNUlR65JWRal2Jl+7R0DAlBG45klovDl6v:MlR62lQ8W5YcIeeDAlOWAv
                            MD5:BDEE7BD5A61F135EDB0F5A70683BCDD4
                            SHA1:381993955B2B4494856B4EA4BA70D3DB5332F8C8
                            SHA-256:74BB5432EEB5FD42048C2BFE05F18BA66DDD693721689EBA83D04777998FEF3A
                            SHA-512:7789102A1083AB6148A8AAFEBA208A7C97528469BC6BC4532617B52F7D29CE428BA367DDDF8C1CA70EE1410095103B36B234BFD70CC792DBF8274D5F87414170
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                            Reputation:low
                            Preview:....[.2.0.2.5./.0.4./.1.0. .0.2.:.3.5.:.1.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                            Process:C:\Users\user\Desktop\041025.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84qXKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3ogvitHo6hAHKzea
                            MD5:E193AFF55D4BDD9951CB4287A7D79653
                            SHA1:F94AD920B9E0EB43B5005D74552AB84EAA38E985
                            SHA-256:08DD5825B4EDCC256AEB08525DCBCDA342252A9C9746BE23FBC70A801F5A596E
                            SHA-512:86F6ECDB47C1A7FFA460F3BC6038ACAFC9D4DED4D1E8D1FB7B8FE9145D9D384AB4EE7A7C3BE959A25B265AFEDB8FD31BA10073EC116B65BFE3326EF2C53394E6
                            Malicious:true
                            Reputation:moderate, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Users\user\Desktop\041025.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):975
                            Entropy (8bit):5.00635384400645
                            Encrypted:false
                            SSDEEP:12:tkGSh+nd6CsGkMyGWKyGXPVGArwY3fosGIaWHHGIG2IArpv/mOAaNO+ao9W7iN56:qBhydRNuKyGX85iDvXhNlT3/7wcJWrZ
                            MD5:6D3945F9944878AEF3AABC087DE12E2A
                            SHA1:839E3953827F9F4A573AAA7DC9A8165C580422C6
                            SHA-256:2DBB16CF907E690862716CDB4A2DCE865F5A0F2025CEAA06DA800DF7A940D3F6
                            SHA-512:FFF612097268770E26E419C597E9AF4867A325C9CD9B870CAFBCF32FBC04EE80FE93A5B558B4B606FE8B2CE1819330AB22484DF2940586753597C8E5964F16D5
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:{. "geoplugin_request":"161.77.13.2",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Springfield",. "geoplugin_region":"Massachusetts",. "geoplugin_regionCode":"MA",. "geoplugin_regionName":"Massachusetts",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"543",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"42.0986",. "geoplugin_longitude":"-72.5931",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":null,. "geoplugin_currencySymbol_UTF8":"",. "geoplugin_currencyConverter":0.}
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.895435282986037
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:041025.exe
                            File size:908'800 bytes
                            MD5:61e4f067963c7dbd7547e1c8ad1c74a6
                            SHA1:2792be80df914df9c1f3ae21a2c4cde29f96529c
                            SHA256:f8984264632a0aba48bcd90967988aa1d2c10f9381d00abc08456431ea46d208
                            SHA512:97f94ea2425a99ba5f33e0b211a60457b98f12960a44e4b58ad7839d62ee8b9dd34d92cb0ac4889c06e1ca386bd80039a2ded18c008d1c0ff103e57bc1765e67
                            SSDEEP:24576:E5aGoULXPM6JyI3R3QrtgcIbUKMQgXkOjK:E5aPUjPZ3JctzSrMQYksK
                            TLSH:58151304611AC823D5925FB44D23C2B85B789E9D3917C343AFD9BEDFB4BB20D2684396
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. .......................@............`................................
                            Icon Hash:161741490761690f
                            Entrypoint:0x4de302
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0xAE11ECA4 [Tue Jul 18 01:04:36 2062 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            bound eax, dword ptr [eax]
                            add byte ptr [eax], al
                            push edi
                            add byte ptr [eax], al
                            add byte ptr [eax+eax+00h], bl
                            add byte ptr [edi+00h], bl
                            add byte ptr [eax], al
                            pop eax
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xde2b00x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe00000x1510.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe20000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xde2940x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xdc3200xdc400d430164bf08b169dd2b6cef97669e415False0.9539519189841089data7.901414926678369IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xe00000x15100x16004dee1b8f0e8b97e24db37753b587f097False0.73046875data6.841711959073226IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xe20000xc0x200441106e27142393e400324fc481c049eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xe01000xeb5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8942895086321381
                            RT_GROUP_ICON0xe0fc80x14data1.05
                            RT_VERSION0xe0fec0x324data0.4228855721393035
                            RT_MANIFEST0xe13200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            DescriptionData
                            Translation0x0000 0x04b0
                            Comments
                            CompanyName
                            FileDescriptionCommonPractice
                            FileVersion1.0.0.0
                            InternalNamemmRF.exe
                            LegalCopyrightCopyright 2020
                            LegalTrademarks
                            OriginalFilenamemmRF.exe
                            ProductNameCommonPractice
                            ProductVersion1.0.0.0
                            Assembly Version1.0.0.0
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-04-10T08:35:16.178684+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649687188.93.233.422404TCP
                            2025-04-10T08:35:17.862422+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649688178.237.33.5080TCP
                            • Total Packets: 30
                            • 2404 undefined
                            • 80 (HTTP)
                            • 53 (DNS)
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 10, 2025 08:35:15.412461042 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:15.585067034 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:15.585155010 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:15.590441942 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:15.849140882 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:16.134504080 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:16.178683996 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:16.349941969 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:16.354525089 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:16.651575089 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:16.651654005 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:16.954319954 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:16.966955900 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:16.969125032 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:17.153740883 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:17.194319963 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:17.521987915 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:35:17.689774990 CEST8049688178.237.33.50192.168.2.6
                            Apr 10, 2025 08:35:17.689862013 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:35:17.690171957 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:35:17.862339020 CEST8049688178.237.33.50192.168.2.6
                            Apr 10, 2025 08:35:17.862421989 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:35:17.921936989 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:18.161545992 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:18.862983942 CEST8049688178.237.33.50192.168.2.6
                            Apr 10, 2025 08:35:18.863082886 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:35:56.350506067 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:35:56.360460043 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:35:56.661458969 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:36:36.236046076 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:36:36.244177103 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:36:36.553971052 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:37:07.306554079 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:07.819385052 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:08.710141897 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:10.460969925 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:14.022617102 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:15.083479881 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:37:15.087785959 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:37:15.361160994 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:37:21.022547007 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:34.819430113 CEST4968880192.168.2.6178.237.33.50
                            Apr 10, 2025 08:37:53.494527102 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:37:53.496088028 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:37:54.022562981 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:37:54.205435038 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:38:33.343393087 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:38:33.348747015 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:38:33.654670954 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:39:13.306893110 CEST240449687188.93.233.42192.168.2.6
                            Apr 10, 2025 08:39:13.311414003 CEST496872404192.168.2.6188.93.233.42
                            Apr 10, 2025 08:39:13.571367979 CEST240449687188.93.233.42192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 10, 2025 08:35:15.201746941 CEST5824953192.168.2.61.1.1.1
                            Apr 10, 2025 08:35:15.391652107 CEST53582491.1.1.1192.168.2.6
                            Apr 10, 2025 08:35:17.309334040 CEST5218253192.168.2.61.1.1.1
                            Apr 10, 2025 08:35:17.413151979 CEST53521821.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 10, 2025 08:35:15.201746941 CEST192.168.2.61.1.1.10x9776Standard query (0)vtrow.ydns.euA (IP address)IN (0x0001)false
                            Apr 10, 2025 08:35:17.309334040 CEST192.168.2.61.1.1.10xcf70Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 10, 2025 08:35:15.391652107 CEST1.1.1.1192.168.2.60x9776No error (0)vtrow.ydns.eu188.93.233.42A (IP address)IN (0x0001)false
                            Apr 10, 2025 08:35:17.413151979 CEST1.1.1.1192.168.2.60xcf70No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                            • geoplugin.net
                            Target ID:0
                            Start time:02:35:12
                            Start date:10/04/2025
                            Path:C:\Users\user\Desktop\041025.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\041025.exe"
                            Imagebase:0xc20000
                            File size:908'800 bytes
                            MD5 hash:61E4F067963C7DBD7547E1C8AD1C74A6
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1278437167.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:02:35:14
                            Start date:10/04/2025
                            Path:C:\Users\user\Desktop\041025.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\041025.exe"
                            Imagebase:0x370000
                            File size:908'800 bytes
                            MD5 hash:61E4F067963C7DBD7547E1C8AD1C74A6
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:4
                            Start time:02:35:14
                            Start date:10/04/2025
                            Path:C:\Users\user\Desktop\041025.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\041025.exe"
                            Imagebase:0x400000
                            File size:908'800 bytes
                            MD5 hash:61E4F067963C7DBD7547E1C8AD1C74A6
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3722036327.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3722512274.000000000265E000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3722036327.0000000000B87000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000004.00000002.3721118318.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:false

                            No disassembly