Edit tour

Windows Analysis Report
rust-stealer-xss.exe

Overview

General Information

Sample name:rust-stealer-xss.exe
Analysis ID:1673469
MD5:c846ec5ff27a38919ed235cabcbfbd29
SHA1:e9c850b04af3a7f0a35da1b5a4503f2b1b425f98
SHA256:03f81bf69d93a28f75d30ebcdb2194c72c2872e25d8a283885d0877aa861602d
Tags:exeratrustyrustystealerstealertrojanuser-thedudefello
Infos:

Detection

Luca Stealer
Score:68
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Luca Stealer
Joe Sandbox ML detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • rust-stealer-xss.exe (PID: 6812 cmdline: "C:\Users\user\Desktop\rust-stealer-xss.exe" MD5: C846EC5FF27A38919ED235CABCBFBD29)
    • tasklist.exe (PID: 6956 cmdline: "tasklist" /FO CSV MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • conhost.exe (PID: 6968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6360 cmdline: "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 7328 cmdline: "wmic" cpu get MaxClockSpeed MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • conhost.exe (PID: 7336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
rust-stealer-xss.exeJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1230077275.0000000000DDA000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
      00000000.00000002.1357580762.0000000000DDA000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
        Process Memory Space: rust-stealer-xss.exe PID: 6812JoeSecurity_LucaStealerYara detected Luca StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.rust-stealer-xss.exe.ad0000.0.unpackJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
            0.0.rust-stealer-xss.exe.ad0000.0.unpackJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique", CommandLine: "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique", CommandLine|base64offset|contains: *&, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rust-stealer-xss.exe", ParentImage: C:\Users\user\Desktop\rust-stealer-xss.exe, ParentProcessId: 6812, ParentProcessName: rust-stealer-xss.exe, ProcessCommandLine: "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique", ProcessId: 6360, ProcessName: powershell.exe
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: rust-stealer-xss.exeVirustotal: Detection: 16%Perma Link
              Source: rust-stealer-xss.exeReversingLabs: Detection: 13%
              Source: Submited SampleNeural Call Log Analysis: 87.6%
              Source: rust-stealer-xss.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: rust-stealer-xss.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: rust_stealer_xss.pdb source: rust-stealer-xss.exe
              Source: rust-stealer-xss.exeString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-supportInvalidCode
              Source: rust-stealer-xss.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: rust-stealer-xss.exeBinary string: TzFailed to open \Device\Afd\Mio:
              Source: rust-stealer-xss.exeBinary string: Afdfd\Device\Afd\Mio
              Source: rust-stealer-xss.exeBinary string: Failed to open \Device\Afd\Mio:
              Source: classification engineClassification label: mal68.troj.evad.winEXE@10/3@0/0
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7336:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6968:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6396:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mgroqhbd.ztc.ps1Jump to behavior
              Source: rust-stealer-xss.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT MaxClockSpeed FROM WIN32_PROCESSOR
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
              Source: rust-stealer-xss.exe, 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
              Source: rust-stealer-xss.exeVirustotal: Detection: 16%
              Source: rust-stealer-xss.exeReversingLabs: Detection: 13%
              Source: rust-stealer-xss.exeString found in binary or memory: -START(
              Source: unknownProcess created: C:\Users\user\Desktop\rust-stealer-xss.exe "C:\Users\user\Desktop\rust-stealer-xss.exe"
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\tasklist.exe "tasklist" /FO CSV
              Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" cpu get MaxClockSpeed
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\tasklist.exe "tasklist" /FO CSVJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique"Jump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" cpu get MaxClockSpeedJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\tasklist.exe "tasklist" /FO CSV
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: rust-stealer-xss.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: rust-stealer-xss.exeStatic file information: File size 4508160 > 1048576
              Source: rust-stealer-xss.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x308c00
              Source: rust-stealer-xss.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x127400
              Source: rust-stealer-xss.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: rust-stealer-xss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: rust_stealer_xss.pdb source: rust-stealer-xss.exe
              Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: rust-stealer-xss.exe, 00000000.00000002.1357890298.00000000015AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: rust-stealer-xss.exeBinary or memory string: TASKLIST/FOCSVPROCMONWIRESHARKPROCESSHACKEROLLYDBGIDAFIDDLERTCPVIEWAUTORUNSREGMONPROCEXPDUMPCAPGET-PROCESS | FOREACH-OBJECT { $_.MODULES } | SELECT-OBJECT MODULENAME | SORT-OBJECT MODULENAME -UNIQUEDBGHELP.DLLSYMSRV.DLLSGDLL.DLLWOW64LOG.DLLSCYLLA.DLLHOOKLIB.DLLDBGCORE.DLLVBOXHOOK.DLLSBIEDLL.DLLC:\PROGRAM FILES\WIRESHARKC:\PROGRAM FILES\X64DBGC:\PROGRAM FILES\PROCESS HACKER 2C:\PROGRAM FILES\HEX-RAYSC:\PROGRAM FILES\SYSINTERNALS SUITEC:\PROGRAM FILES\FIDDLERSRC\DEFENSE\ANTI_VM.RS
              Source: rust-stealer-xss.exeBinary or memory string: SELECT SIZE FROM WIN32_DISKDRIVESELECT MACADDRESS FROM WIN32_NETWORKADAPTERCONFIGURATION WHERE IPENABLED = TRUEMACADDRESS00:0C:2900:50:5600:05:6908:00:2752:54:00C:\WINDOWS\SYSTEM32\DRIVERS\VMMOUSE.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VMHGFS.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VBOXMOUSE.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VBOXGUEST.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VBOXSF.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VBOXVIDEO.SYSC:\WINDOWS\SYSTEM32\VBOXHOOK.DLLC:\WINDOWS\SYSTEM32\VBOXDISP.DLLC:\WINDOWS\SYSTEM32\QEMU-GA.EXEQMYCRK\$(KTN\|\$YJP:8\$RU{\$RMJPME{\$QMYCRK\$(KTN\|\$RJ\|\$UMIN{Q\$QMYCRK\$(KTN\|\$RJ\|\$RLQUJROYRIHPME{\$QMYCRK\$(KTN\|\$RJ\|\$QYNA\$QMYCRK\$(KTN\|\$YJP:8\$QUCJIQUMIN{Q\$QMYCRK\$(KTN\|\$YJP:8\$UMIN{QG{{EQ\$QMYCRK\$(KTN\|\$YJP:8\$UMIN{QFD}JRD\$QMYCRK\$(KTN\|\$YJP:8\$SLQUJREEUMIN{Q\$QMYCRK\$(KTN\|\$YJP:8\$S{NRDVVN{\$
              Source: rust-stealer-xss.exeBinary or memory string: N.TASKLIST/FOCSVPROCMONWIRESHARKPROCESSHACKEROLLYDBGIDAFIDDLERTCPVIEWAUTORUNSREGMONPROCEXPDUMPCAPGET-PROCESS | FOREACH-OBJECT { $_.MODULES } | SELECT-OBJECT MODULENAME | SORT-OBJECT MODULENAME -UNIQUEDBGHELP.DLLSYMSRV.DLLSGDLL.DLLWOW64LOG.DLLSCYLLA.DLLHOOKLIB.DLLDBGCORE.DLLVBOXHOOK.DLLSBIEDLL.DLLC:\PROGRAM FILES\WIRESHARKC:\PROGRAM FILES\X64DBGC:\PROGRAM FILES\PROCESS HACKER 2C:\PROGRAM FILES\HEX-RAYSC:\PROGRAM FILES\SYSINTERNALS SUITEC:\PROGRAM FILES\FIDDLERSRC\DEFENSE\ANTI_VM.RS
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeRDTSC instruction interceptor: First address: ADE622 second address: ADE5D5 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, dword ptr [esp+08h] 0x00000006 mov ebx, dword ptr [esp+0Ch] 0x0000000a sub ecx, dword ptr [esp+14h] 0x0000000e sbb esi, 00000000h 0x00000011 add ecx, eax 0x00000013 adc esi, 00000000h 0x00000016 jmp 00007F5CB4CBFC8Fh 0x00000018 cmp edi, dword ptr [esp+10h] 0x0000001c je 00007F5CB4CBFD6Fh 0x0000001e mov dword ptr [esp+08h], ecx 0x00000022 mov dword ptr [esp+04h], edi 0x00000026 rdtsc
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3031Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 694Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4160Thread sleep count: 3031 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3676Thread sleep count: 694 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5192Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3800Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT MaxClockSpeed FROM WIN32_PROCESSOR
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: rust-stealer-xss.exeBinary or memory string: SELECT Manufacturer, Version, SerialNumber FROM Win32_BIOSvmwarevirtualboxvirtualinnotekqemuxenkvm~
              Source: rust-stealer-xss.exeBinary or memory string: SELECT Manufacturer, Version, SerialNumber FROM Win32_BIOSvmwarevirtualboxvirtualinnotekqemuxenkvm
              Source: rust-stealer-xss.exeBinary or memory string: SELECT Size FROM Win32_DiskDriveSELECT MACAddress FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = TrueMACAddress00:0c:2900:50:5600:05:6908:00:2752:54:00C:\WINDOWS\system32\drivers\vmmouse.sysC:\WINDOWS\system32\drivers\vmhgfs.sysC:\WINDOWS\system32\drivers\VBoxMouse.sysC:\WINDOWS\system32\drivers\VBoxGuest.sysC:\WINDOWS\system32\drivers\VBoxSF.sysC:\WINDOWS\system32\drivers\VBoxVideo.sysC:\WINDOWS\system32\vboxhook.dllC:\WINDOWS\system32\vboxdisp.dllC:\WINDOWS\system32\qemu-ga.exeQmycrk\$(ktn\|\$Yjp:8\$Ru{\$Rmjpme{\$Qmycrk\$(ktn\|\$RJ\|\$Umin{q\$Qmycrk\$(ktn\|\$RJ\|\$Rlqujroyrihpme{\$Qmycrk\$(ktn\|\$RJ\|\$Qyna\$Qmycrk\$(ktn\|\$Yjp:8\$QUCJIQUmin{q\$Qmycrk\$(ktn\|\$Yjp:8\$Umin{qG{{eq\$Qmycrk\$(ktn\|\$Yjp:8\$Umin{qFd}jrd\$Qmycrk\$(ktn\|\$Yjp:8\$Slqujreeumin{q\$Qmycrk\$(ktn\|\$Yjp:8\$S{nrdvvn{\$
              Source: rust-stealer-xss.exe, 00000000.00000002.1357890298.00000000015AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxhook.dlldo
              Source: rust-stealer-xss.exeBinary or memory string: tasklist/FOCSVprocmonwiresharkprocesshackerollydbgidafiddlertcpviewautorunsregmonprocexpdumpcapGet-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Uniquedbghelp.dllsymsrv.dllsgdll.dllwow64log.dllscylla.dllhooklib.dlldbgcore.dllvboxhook.dllsbiedll.dllC:\Program Files\WiresharkC:\Program Files\x64dbgC:\Program Files\Process Hacker 2C:\Program Files\Hex-RaysC:\Program Files\Sysinternals SuiteC:\Program Files\Fiddlersrc\defense\anti_vm.rs
              Source: rust-stealer-xss.exe, 00000000.00000002.1357890298.00000000015AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxhook.dlld
              Source: rust-stealer-xss.exeBinary or memory string: n.tasklist/FOCSVprocmonwiresharkprocesshackerollydbgidafiddlertcpviewautorunsregmonprocexpdumpcapGet-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Uniquedbghelp.dllsymsrv.dllsgdll.dllwow64log.dllscylla.dllhooklib.dlldbgcore.dllvboxhook.dllsbiedll.dllC:\Program Files\WiresharkC:\Program Files\x64dbgC:\Program Files\Process Hacker 2C:\Program Files\Hex-RaysC:\Program Files\Sysinternals SuiteC:\Program Files\Fiddlersrc\defense\anti_vm.rs
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeCode function: 0_2_00B20440 GetProcessHeap,HeapFree,0_2_00B20440
              Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\tasklist.exe "tasklist" /FO CSVJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique"Jump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" cpu get MaxClockSpeedJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rust-stealer-xss.exeCode function: 0_2_00DCD3C3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00DCD3C3

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: rust-stealer-xss.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.rust-stealer-xss.exe.ad0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.rust-stealer-xss.exe.ad0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1230077275.0000000000DDA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1357580762.0000000000DDA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rust-stealer-xss.exe PID: 6812, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: rust-stealer-xss.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.rust-stealer-xss.exe.ad0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.rust-stealer-xss.exe.ad0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1230077275.0000000000DDA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1357580762.0000000000DDA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rust-stealer-xss.exe PID: 6812, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              1
              DLL Side-Loading
              11
              Process Injection
              1
              Disable or Modify Tools
              OS Credential Dumping1
              System Time Discovery
              Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              LSASS Memory221
              Security Software Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
              Process Injection
              Security Account Manager2
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS31
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
              Application Window Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials113
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1673469 Sample: rust-stealer-xss.exe Startdate: 24/04/2025 Architecture: WINDOWS Score: 68 22 Multi AV Scanner detection for submitted file 2->22 24 Yara detected Luca Stealer 2->24 26 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->26 28 Joe Sandbox ML detected suspicious sample 2->28 7 rust-stealer-xss.exe 2->7         started        process3 signatures4 30 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->30 32 Tries to detect virtualization through RDTSC time measurements 7->32 10 powershell.exe 14 7->10         started        12 WMIC.exe 1 7->12         started        14 tasklist.exe 1 7->14         started        process5 process6 16 conhost.exe 10->16         started        18 conhost.exe 12->18         started        20 conhost.exe 14->20         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              rust-stealer-xss.exe17%VirustotalBrowse
              rust-stealer-xss.exe14%ReversingLabsWin32.Trojan.RustOff
              SAMPLE100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://docs.rs/getrandom#nodejs-es-module-supportInvalidCoderust-stealer-xss.exefalse
                high
                No contacted IP infos
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1673469
                Start date and time:2025-04-24 21:16:48 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 32s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:rust-stealer-xss.exe
                Detection:MAL
                Classification:mal68.troj.evad.winEXE@10/3@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 184.29.183.29, 20.109.210.53
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):1324
                Entropy (8bit):5.408576652191108
                Encrypted:false
                SSDEEP:24:3KWSKco4KmBs4RPT6BmFoUebIKomjKcmZ9tXt/NK3R88bJ0r+rv:6WSU4y4RQmFoUeWmfmZ9tlNWR83r+D
                MD5:815A268E4298AB1EE7CC4C57FEC485F2
                SHA1:3ED9B419E621E8F62724A54391C4581D3C82BB16
                SHA-256:9A48BB5721A1D64E56FDA46D5CA017408234EDE4713692FB17DCA521046B26F6
                SHA-512:AC1B9E8D08B63603AE09B46FD5FFE3B4A20E28127B7455336D04C2B8FBE1D8F583C6833F3B774F38AB26CFAF4C7EA1FDBE41733FAAC779A959D2E153F7E8C411
                Malicious:false
                Reputation:low
                Preview:@...e.................................Z.%.......................P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.598429856273911
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:rust-stealer-xss.exe
                File size:4'508'160 bytes
                MD5:c846ec5ff27a38919ed235cabcbfbd29
                SHA1:e9c850b04af3a7f0a35da1b5a4503f2b1b425f98
                SHA256:03f81bf69d93a28f75d30ebcdb2194c72c2872e25d8a283885d0877aa861602d
                SHA512:807808452e0c48d9341014ba760be5bb551d43594b6ce643fb580c3b73ddd5234f2a949db82ceb9f199014d0dfbe3249c47a4e2d80b25aeefe5794a7d1d9c6fe
                SSDEEP:49152:Af+LJuvuRs4I46VA+MB2vv4UTeryw+PR5vFxc/FwrUyNeWawG3RBzcFaDFmC2Kig:AmLcuRsq6VRMB2Dw+JVk93RBzcFa1tE
                TLSH:2426BFC1FEC381F6D58B0875603FB33FCF3559058628CA93EBE42D12E976321599A25A
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#...g...g...g...n.?.u....d..r....d..v....d..@.......p...g...E...tc..|...g...k...tc..f...Richg...................PE..L....t.h...
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x6fc986
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x680A74E2 [Thu Apr 24 17:29:06 2025 UTC]
                TLS Callbacks:0x5d1750
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:ebf2a91cfa9a21620d19c6d65ec3072b
                Instruction
                call 00007F5CB4E8C13Ah
                jmp 00007F5CB4E8B529h
                push ebx
                push esi
                mov eax, dword ptr [esp+18h]
                or eax, eax
                jne 00007F5CB4E8B6CAh
                mov ecx, dword ptr [esp+14h]
                mov eax, dword ptr [esp+10h]
                xor edx, edx
                div ecx
                mov ebx, eax
                mov eax, dword ptr [esp+0Ch]
                div ecx
                mov edx, ebx
                jmp 00007F5CB4E8B6F3h
                mov ecx, eax
                mov ebx, dword ptr [esp+14h]
                mov edx, dword ptr [esp+10h]
                mov eax, dword ptr [esp+0Ch]
                shr ecx, 1
                rcr ebx, 1
                shr edx, 1
                rcr eax, 1
                or ecx, ecx
                jne 00007F5CB4E8B6A6h
                div ebx
                mov esi, eax
                mul dword ptr [esp+18h]
                mov ecx, eax
                mov eax, dword ptr [esp+14h]
                mul esi
                add edx, ecx
                jc 00007F5CB4E8B6C0h
                cmp edx, dword ptr [esp+10h]
                jnbe 00007F5CB4E8B6BAh
                jc 00007F5CB4E8B6B9h
                cmp eax, dword ptr [esp+0Ch]
                jbe 00007F5CB4E8B6B3h
                dec esi
                xor edx, edx
                mov eax, esi
                pop esi
                pop ebx
                retn 0010h
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                push ecx
                lea ecx, dword ptr [esp+04h]
                sub ecx, eax
                sbb eax, eax
                not eax
                and ecx, eax
                mov eax, esp
                and eax, FFFFF000h
                cmp ecx, eax
                jc 00007F5CB4E8B6BCh
                mov eax, ecx
                pop ecx
                xchg eax, esp
                mov eax, dword ptr [eax]
                mov dword ptr [esp], eax
                ret
                sub eax, 00001000h
                test dword ptr [eax], eax
                jmp 00007F5CB4E8B69Bh
                int3
                int3
                int3
                int3
                int3
                push edi
                push esi
                push ebx
                xor edi, edi
                mov eax, dword ptr [esp+14h]
                or eax, eax
                jnl 00007F5CB4E8B6C6h
                inc edi
                mov edx, dword ptr [esp+10h]
                neg eax
                neg edx
                sbb eax, 00000000h
                mov dword ptr [esp+14h], eax
                Programming Language:
                • [IMP] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x42f5940x1cc.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x4380000x17d54.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x42cdc80x54.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x42ce400x18.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x42cd080x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x30a0000x4b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x308b100x308c00f582b5b9f3cd60c63452b7fbe3caeb8funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x30a0000x1272180x1274007e41c5e2c6ca6b1f2d6c0a9980165a59False0.40894402254445383data5.900690457082195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x4320000x51b80x4800f99d8ab4104b4928679bf873a37798feFalse0.5403645833333334data5.121661781215105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .reloc0x4380000x17d540x17e00a96dac7a803185f0283b556dbafd313eFalse0.6267281577225131data6.62853621012873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                DLLImport
                kernel32.dllWaitForSingleObjectEx, LoadLibraryA, lstrlenW, GetCurrentProcessId, CreateMutexA, WideCharToMultiByte, GetStdHandle, GetConsoleMode, GetConsoleOutputCP, ReleaseMutex, MultiByteToWideChar, WriteConsoleW, GetEnvironmentVariableW, GetModuleHandleA, CreateWaitableTimerExW, SetWaitableTimer, RtlCaptureContext, QueryPerformanceFrequency, FormatMessageW, GetSystemInfo, GetTempPathW, GetFileInformationByHandleEx, GetCurrentProcess, GetFullPathNameW, SetFilePointerEx, FindNextFileW, CreateDirectoryW, FindFirstFileExW, FindClose, GetCurrentDirectoryW, AddVectoredExceptionHandler, SetThreadStackGuarantee, GetCurrentThread, SetHandleInformation, CompareStringOrdinal, GetSystemDirectoryW, CreateProcessW, GetWindowsDirectoryW, GetFileAttributesW, DuplicateHandle, CreateNamedPipeW, CreateThread, ReadFileEx, SleepEx, WriteFileEx, WaitForMultipleObjects, GetOverlappedResult, CreateEventW, CancelIo, SwitchToThread, HeapReAlloc, QueryPerformanceCounter, GetSystemTimePreciseAsFileTime, HeapAlloc, CreateFileW, CopyFileExW, PostQueuedCompletionStatus, HeapFree, GetProcessHeap, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FlushFileBuffers, TerminateProcess, IsProcessorFeaturePresent, InitializeSListHead, IsDebuggerPresent, GetExitCodeProcess, WaitForSingleObject, GetTickCount, MapViewOfFile, CreateFileMappingW, FormatMessageA, GetSystemTime, GetSystemTimeAsFileTime, FreeLibrary, GetFileSize, LockFileEx, LocalFree, UnlockFile, HeapDestroy, HeapCompact, LoadLibraryW, DeleteFileA, CreateFileA, FlushViewOfFile, OutputDebugStringW, GetFileAttributesExW, GetFileAttributesA, GetDiskFreeSpaceA, GetTempPathA, HeapSize, HeapValidate, UnmapViewOfFile, CreateMutexW, UnlockFileEx, SetEndOfFile, GetFullPathNameA, SetFilePointer, LockFile, OutputDebugStringA, GetDiskFreeSpaceW, WriteFile, HeapCreate, AreFileApisANSI, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, GetCurrentThreadId, RtlUnwind, ExitProcess, GetModuleFileNameW, GetLastError, GetProcAddress, GetFileInformationByHandle, GetModuleHandleW, SetFileInformationByHandle, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, CloseHandle, TlsGetValue, TlsSetValue, TlsFree, GetFinalPathNameByHandleW, GetQueuedCompletionStatusEx, SetFileCompletionNotificationModes, DeleteFileW, ReadFile, CreateIoCompletionPort, LoadLibraryExW, Sleep, SystemTimeToFileTime, RaiseException
                api-ms-win-core-synch-l1-2-0.dllWakeByAddressAll, WaitOnAddress, WakeByAddressSingle
                bcryptprimitives.dllProcessPrng
                oleaut32.dllSysFreeString, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayUnaccessData, VariantClear, SysAllocStringLen, SafeArrayAccessData, SafeArrayDestroy
                ws2_32.dllgetsockname, getpeername, getaddrinfo, setsockopt, WSASocketW, getsockopt, select, ioctlsocket, socket, WSAStartup, accept, listen, bind, WSACleanup, recv, send, closesocket, WSAGetLastError, connect, WSASend, shutdown, freeaddrinfo, WSAIoctl
                crypt32.dllCertFreeCertificateChain, CertVerifyCertificateChainPolicy, CertFreeCertificateContext, CryptUnprotectData, CertGetCertificateChain, CertEnumCertificatesInStore, CertAddCertificateContextToStore, CertDuplicateCertificateContext, CertOpenStore, CertCloseStore, CertDuplicateStore, CertDuplicateCertificateChain
                rstrtmgr.dllRmGetList, RmRegisterResources, RmStartSession
                advapi32.dllSystemFunction036, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, RegOpenKeyExW, RegQueryValueExW, RegCloseKey
                ole32.dllCoInitializeSecurity, CoInitializeEx, CoSetProxyBlanket, CoCreateInstance
                user32.dllEnumDisplayMonitors, EnumDisplaySettingsExW, GetMonitorInfoW
                gdi32.dllCreateDCW, DeleteDC, GetDIBits, GetDeviceCaps, CreateCompatibleDC, CreateCompatibleBitmap, DeleteObject, SelectObject, SetStretchBltMode, StretchBlt, GetObjectW
                ntdll.dllNtDeviceIoControlFile, RtlNtStatusToDosError, NtWriteFile, NtReadFile, NtCancelIoFileEx, NtCreateFile
                bcrypt.dllBCryptGenRandom
                secur32.dllApplyControlToken, QueryContextAttributesW, AcquireCredentialsHandleA, InitializeSecurityContextW, AcceptSecurityContext, EncryptMessage, FreeCredentialsHandle, DeleteSecurityContext, FreeContextBuffer, DecryptMessage
                api-ms-win-crt-string-l1-1-0.dllstrcspn, strcmp, strlen, strncmp, strcpy_s, wcsncmp
                api-ms-win-crt-math-l1-1-0.dlltruncf, __setusermatherr, roundf, pow, _dclass, log, ceil, exp2f
                api-ms-win-crt-heap-l1-1-0.dll_msize, _set_new_mode, free, malloc, realloc, calloc
                api-ms-win-crt-utility-l1-1-0.dll_rotl64, qsort
                api-ms-win-crt-time-l1-1-0.dll_localtime64_s
                api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _exit, exit, _initterm_e, _beginthreadex, _initialize_narrow_environment, __p___argc, __p___argv, abort, _cexit, _c_exit, _register_thread_local_exe_atexit_callback, _endthreadex, terminate, _controlfp_s, _seh_filter_exe, _initialize_onexit_table, _configure_narrow_argv, _initterm, _register_onexit_function, _crt_atexit, _set_app_type
                api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                No network behavior found

                Click to jump to process

                Click to jump to process

                • File
                • Registry

                Click to dive into process behavior distribution

                Target ID:0
                Start time:15:17:44
                Start date:24/04/2025
                Path:C:\Users\user\Desktop\rust-stealer-xss.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\rust-stealer-xss.exe"
                Imagebase:0xad0000
                File size:4'508'160 bytes
                MD5 hash:C846EC5FF27A38919ED235CABCBFBD29
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_LucaStealer, Description: Yara detected Luca Stealer, Source: 00000000.00000000.1230077275.0000000000DDA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_LucaStealer, Description: Yara detected Luca Stealer, Source: 00000000.00000002.1357580762.0000000000DDA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:15:17:45
                Start date:24/04/2025
                Path:C:\Windows\SysWOW64\tasklist.exe
                Wow64 process (32bit):true
                Commandline:"tasklist" /FO CSV
                Imagebase:0xb70000
                File size:79'360 bytes
                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                Target ID:2
                Start time:15:17:45
                Start date:24/04/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff68dae0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:15:17:45
                Start date:24/04/2025
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"powershell" -Command "Get-Process | ForEach-Object { $_.Modules } | Select-Object ModuleName | Sort-Object ModuleName -Unique"
                Imagebase:0xbe0000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:15:17:45
                Start date:24/04/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff68dae0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:15:17:56
                Start date:24/04/2025
                Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                Wow64 process (32bit):true
                Commandline:"wmic" cpu get MaxClockSpeed
                Imagebase:0xdb0000
                File size:427'008 bytes
                MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                Target ID:13
                Start time:15:17:56
                Start date:24/04/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff68dae0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Execution Graph

                Execution Coverage

                Dynamic/Packed Code Coverage

                Signature Coverage

                Execution Coverage:26.7%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:28.6%
                Total number of Nodes:14
                Total number of Limit Nodes:1
                Show Legend
                Hide Nodes/Edges
                execution_graph 33 dcc986 36 dcd410 33->36 35 dcc98b 35->35 37 dcd426 36->37 39 dcd42f 37->39 40 dcd3c3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 37->40 39->35 40->39 24 cb52f0 SetThreadStackGuarantee 25 cb5347 24->25 26 cb535e 25->26 30 b20440 25->30 28 b20440 2 API calls 26->28 29 cb536b 28->29 31 b2044b GetProcessHeap HeapFree 30->31 32 b20448 30->32 31->26 32->31

                Callgraph

                Hide Legend
                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00B20440 1 Function_00DCC986 3 Function_00DCD410 1->3 2 Function_00CB52F0 2->0 4 Function_00DCD3C3 3->4

                Executed Functions

                Control-flow Graph

                APIs
                • SetThreadStackGuarantee.KERNELBASE(?), ref: 00CB532B
                  • Part of subcall function 00B20440: GetProcessHeap.KERNEL32(?,00CB536B), ref: 00B2044B
                  • Part of subcall function 00B20440: HeapFree.KERNEL32(00000000,00000000,?), ref: 00B20455
                Memory Dump Source
                • Source File: 00000000.00000002.1357349963.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                • Associated: 00000000.00000002.1357331853.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357580762.0000000000DDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357690642.0000000000F02000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357710933.0000000000F03000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357736813.0000000000F06000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357754275.0000000000F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_ad0000_rust-stealer-xss.jbxd
                Yara matches
                Similarity
                • API ID: Heap$FreeGuaranteeProcessStackThread
                • String ID:
                • API String ID: 3167176110-0
                • Opcode ID: 91bf3623346facc4adc8a6e012a01bcf849790324ac2b024f5038655d1d4e470
                • Instruction ID: 279d27a59af7cc599d11bf6e89e0d3d6dea6c3dd104d0693f1171c1b2c600724
                • Opcode Fuzzy Hash: 91bf3623346facc4adc8a6e012a01bcf849790324ac2b024f5038655d1d4e470
                • Instruction Fuzzy Hash: 6B113CB1900249CFCB10DF98D845BDEBBF4FB48324F148569E519A7391C739A944CBA5

                Non-executed Functions

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 7 b20440-b20446 8 b2044b-b2045c GetProcessHeap HeapFree 7->8 9 b20448 7->9 9->8
                APIs
                • GetProcessHeap.KERNEL32(?,00CB536B), ref: 00B2044B
                • HeapFree.KERNEL32(00000000,00000000,?), ref: 00B20455
                Memory Dump Source
                • Source File: 00000000.00000002.1357349963.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                • Associated: 00000000.00000002.1357331853.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357580762.0000000000DDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357580762.0000000000E35000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357690642.0000000000F02000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357710933.0000000000F03000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357736813.0000000000F06000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1357754275.0000000000F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_ad0000_rust-stealer-xss.jbxd
                Yara matches
                Similarity
                • API ID: Heap$FreeProcess
                • String ID:
                • API String ID: 3859560861-0
                • Opcode ID: affa251e8ce72c747d64a486f46dc51cbe6ca2a8512bbbc7ad9457040cff527e
                • Instruction ID: eb984656f37436ee0311e038d18b697a555d46ff771f0a49df09a27ad54e3068
                • Opcode Fuzzy Hash: affa251e8ce72c747d64a486f46dc51cbe6ca2a8512bbbc7ad9457040cff527e
                • Instruction Fuzzy Hash: D9C08C3242B230ABCA203B29BC0CBCA7F6CEB06321F098082F105E322086A01C4087E9