Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:736713
MD5:67756a08917974f3e77b7b2e2bccf264
SHA1:4cbd4192bb33d1d6760214ee2758e8a2be7fc847
SHA256:ba3a496df23cb27c37b3765e630c4b637f3b82166621589e953906b1ca29b049
Tags:exe
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Tries to steal Crypto Currency Wallets
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Found evasive API chain (may stop execution after checking a module file name)
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)

Classification

  • System is w10x64
  • file.exe (PID: 5600 cmdline: C:\Users\user\Desktop\file.exe MD5: 67756A08917974F3E77B7B2E2BCCF264)
  • cleanup
{"C2 url": "193.106.191.25:47242", "Bot Id": "mix", "Authorization Header": "5469d87831a100553f2f10d3aadec8bb"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000002.305740549.0000000000959000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xb80:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.400000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            0.2.file.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 D2 88 44 24 2B 88 44 24 2F B0 10 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            0.2.file.exe.2820ee8.4.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              0.2.file.exe.2820ee8.4.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x28338:$pat14: , CommandLine:
              • 0x1ca87:$v2_1: ListOfProcesses
              • 0x1c255:$v4_3: base64str
              • 0x1c222:$v4_4: stringKey
              • 0x1c25f:$v4_5: BytesToStringConverted
              • 0x1c24a:$v4_6: FromBase64
              • 0x1c73b:$v4_8: procName
              0.2.file.exe.860e67.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 27 entries
                No Sigma rule has matched
                Timestamp:192.168.2.3193.106.191.2549699472422850027 11/03/22-06:43:26.443077
                SID:2850027
                Source Port:49699
                Destination Port:47242
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3193.106.191.2549699472422850286 11/03/22-06:43:32.777356
                SID:2850286
                Source Port:49699
                Destination Port:47242
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:193.106.191.25192.168.2.347242496992850353 11/03/22-06:43:29.233425
                SID:2850353
                Source Port:47242
                Destination Port:49699
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 193.106.191.25:47242Avira URL Cloud: Label: malware
                Source: file.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "193.106.191.25:47242", "Bot Id": "mix", "Authorization Header": "5469d87831a100553f2f10d3aadec8bb"}

                Compliance

                barindex
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: Binary string: _.pdb source: file.exe, 00000000.00000002.307391144.000000000284C000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.244148010.0000000000A11000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\gon97_ni.pdb source: file.exe
                Source: Binary string: H%C:\gon97_ni.pdb source: file.exe

                Networking

                barindex
                Source: TrafficSnort IDS: 2850027 ETPRO TROJAN RedLine Stealer TCP CnC net.tcp Init 192.168.2.3:49699 -> 193.106.191.25:47242
                Source: TrafficSnort IDS: 2850286 ETPRO TROJAN Redline Stealer TCP CnC Activity 192.168.2.3:49699 -> 193.106.191.25:47242
                Source: TrafficSnort IDS: 2850353 ETPRO MALWARE Redline Stealer TCP CnC - Id1Response 193.106.191.25:47242 -> 192.168.2.3:49699
                Source: Malware configuration extractorURLs: 193.106.191.25:47242
                Source: Joe Sandbox ViewASN Name: BOSPOR-ASRU BOSPOR-ASRU
                Source: Joe Sandbox ViewIP Address: 193.106.191.25 193.106.191.25
                Source: global trafficTCP traffic: 192.168.2.3:49699 -> 193.106.191.25:47242
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.25
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309054626.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                Source: file.exe, 00000000.00000002.309149352.0000000002AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                Source: file.exe, 00000000.00000002.308423894.0000000002A2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.o
                Source: file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                Source: file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: file.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: file.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                Source: file.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
                Source: file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
                Source: file.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
                Source: file.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: file.exe, 00000000.00000002.305686225.0000000000948000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2820ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.860e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2820000.5.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2336cbe.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.5220000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2820ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.3.file.exe.8d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2337ba6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2820000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.3.file.exe.9ce628.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.5220000.6.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2336cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.file.exe.2337ba6.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.3.file.exe.9ce628.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000000.00000002.305740549.0000000000959000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.305087718.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2820ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.860e67.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2820000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2336cbe.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.5220000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2820ee8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.3.file.exe.8d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2337ba6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2820000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.3.file.exe.9ce628.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.5220000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2336cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.file.exe.2337ba6.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.3.file.exe.9ce628.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000000.00000002.305740549.0000000000959000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.305087718.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408C60
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DC11
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407C3F
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418CCC
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406CA0
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004028B0
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041A4BE
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418244
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401650
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F20
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004193C4
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418788
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F89
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402B90
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004073A0
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008618B7
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086786D
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00863187
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008789EF
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008631F0
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00862B17
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008784AB
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00862DF7
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00867EA6
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00868EC7
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086DE78
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008677D9
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00866F07
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087A725
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00878F33
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040E1D8 appears 44 times
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0086E43F appears 44 times
                Source: file.exeStatic PE information: Resource name: RT_VERSION type: Intel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: file.exeBinary or memory string: OriginalFilename vs file.exe
                Source: file.exe, 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000002.307391144.000000000284C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000002.307391144.000000000284C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs file.exe
                Source: file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs file.exe
                Source: file.exe, 00000000.00000002.320322037.000000000525A000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs file.exe
                Source: file.exe, 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs file.exe
                Source: file.exe, 00000000.00000002.305193044.0000000000470000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000003.244148010.0000000000A11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs file.exe
                Source: file.exe, 00000000.00000002.318252780.0000000003965000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exe, 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShelve.exeH vs file.exe
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Wind?wsJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
                Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                Source: C:\Users\user\Desktop\file.exeCommand line argument: 08A
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: file.exe, 00000000.00000002.307391144.000000000284C000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.244148010.0000000000A11000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\gon97_ni.pdb source: file.exe
                Source: Binary string: H%C:\gon97_ni.pdb source: file.exe

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041C40C push cs; iretd
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00423149 push eax; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041C50E push cs; iretd
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004231C8 push eax; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E21D push ecx; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041C6BE push ebx; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087C125 push ebx; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086E484 push ecx; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087BE73 push cs; iretd
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087BF75 push cs; iretd
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                Source: C:\Users\user\Desktop\file.exe TID: 4648Thread sleep time: -2767011611056431s >= -30000s
                Source: C:\Users\user\Desktop\file.exe TID: 5492Thread sleep count: 9447 > 30
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\file.exeRegistry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 9447
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end node
                Source: file.exe, 00000000.00000002.321352651.0000000005B45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ADB0 GetProcessHeap,HeapFree,
                Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086092B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00860D90 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guard
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004123F1 SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086E883 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086D070 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008771D1 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00872658 SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                Source: file.exe, 00000000.00000002.321352651.0000000005B45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.860e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2336cbe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5220000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2337ba6.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.9ce628.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5220000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2336cbe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2337ba6.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.9ce628.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.305087718.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5600, type: MEMORYSTR
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: l1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: l-cjelfplplebdjjenllpjcblmjkfcffne|JaxxxLiberty
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\wallets
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\wallets
                Source: file.exe, 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: l5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                Source: file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: Yara matchFile source: 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5600, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.860e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2336cbe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5220000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2337ba6.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2820000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.9ce628.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5220000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2336cbe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2337ba6.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.9ce628.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.305087718.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5600, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts221
                Windows Management Instrumentation
                Path InterceptionPath Interception1
                Masquerading
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Input Capture
                261
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts2
                Native API
                Logon Script (Windows)Logon Script (Windows)231
                Virtualization/Sandbox Evasion
                Security Account Manager231
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares3
                Data from Local System
                Automated Exfiltration1
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Deobfuscate/Decode Files or Information
                NTDS12
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Software Packing
                Cached Domain Credentials134
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://tempuri.org/0%URL Reputationsafe
                http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                https://api.ip.sb/ip0%URL Reputationsafe
                http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                http://www.w3.o0%URL Reputationsafe
                http://tempuri.org/Entity/Id10%URL Reputationsafe
                193.106.191.25:472422%VirustotalBrowse
                193.106.191.25:47242100%Avira URL Cloudmalware
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                193.106.191.25:47242true
                • 2%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Textfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/02/sc/sctfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/chrome_newtabfile.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/ac/?q=file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://tempuri.org/file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/Id2Responsefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrapfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Preparefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licensefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Abortedfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencefile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2004/10/wsat/faultfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2004/10/wsatfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renewfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/Registerfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://api.ip.sb/ipfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2004/04/scfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancelfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issuefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://tempuri.org/Entity/Id1Responsefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=file.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/Replayfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegofile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binaryfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/ws/2004/08/addressingfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://schemas.xmlsoap.org/ws/2004/10/wsat/Completionfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/ws/2004/04/trustfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponsefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancelfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/Noncefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/trust/Renewfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://schemas.xmlsoap.org/soap/envelope/file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://search.yahoo.com?fr=crmas_sfpffile.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/trustfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollbackfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://schemas.xmlsoap.org/ws/2004/06/addressingexfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wscoorfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/Noncefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponsefile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renewfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKeyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      http://www.w3.ofile.exe, 00000000.00000002.308423894.0000000002A2E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      • URL Reputation: safe
                                                                                                                                                      unknown
                                                                                                                                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentiffile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Committedfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              http://schemas.xmlsoap.org/ws/2004/10/wscoor/faultfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/sctfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponsefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        http://schemas.xmlsoap.org/ws/2005/02/trust/Cancelfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgementfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCTfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1file.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousfile.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrapfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      http://schemas.xmlsoap.org/ws/2002/12/policyfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        http://schemas.xmlsoap.org/ws/2005/02/sc/dkfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issuefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchfile.exe, 00000000.00000002.318900508.0000000003A35000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.311190508.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318080589.000000000393F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319643786.0000000003B30000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319251031.0000000003AB2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318633797.00000000039D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319732185.0000000003B4D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319019701.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.320023211.0000000003BC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318003971.0000000003922000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.318530796.00000000039B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319896306.0000000003BAA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issuefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/Commitfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/Issuefile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCTfile.exe, 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        http://tempuri.org/Entity/Id1file.exe, 00000000.00000002.307685962.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                                                                        unknown
                                                                                                                                                                                                        https://ac.ecosia.org/autocomplete?q=file.exe, 00000000.00000002.319381075.0000000003ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.309635503.0000000002B6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          • No. of IPs < 25%
                                                                                                                                                                                                          • 25% < No. of IPs < 50%
                                                                                                                                                                                                          • 50% < No. of IPs < 75%
                                                                                                                                                                                                          • 75% < No. of IPs
                                                                                                                                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                          193.106.191.25
                                                                                                                                                                                                          unknownRussian Federation
                                                                                                                                                                                                          42238BOSPOR-ASRUtrue
                                                                                                                                                                                                          Joe Sandbox Version:36.0.0 Rainbow Opal
                                                                                                                                                                                                          Analysis ID:736713
                                                                                                                                                                                                          Start date and time:2022-11-03 06:42:23 +01:00
                                                                                                                                                                                                          Joe Sandbox Product:CloudBasic
                                                                                                                                                                                                          Overall analysis duration:0h 6m 12s
                                                                                                                                                                                                          Hypervisor based Inspection enabled:false
                                                                                                                                                                                                          Report type:light
                                                                                                                                                                                                          Sample file name:file.exe
                                                                                                                                                                                                          Cookbook file name:default.jbs
                                                                                                                                                                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                                                                          Number of analysed new started processes analysed:12
                                                                                                                                                                                                          Number of new started drivers analysed:0
                                                                                                                                                                                                          Number of existing processes analysed:0
                                                                                                                                                                                                          Number of existing drivers analysed:0
                                                                                                                                                                                                          Number of injected processes analysed:0
                                                                                                                                                                                                          Technologies:
                                                                                                                                                                                                          • HCA enabled
                                                                                                                                                                                                          • EGA enabled
                                                                                                                                                                                                          • HDC enabled
                                                                                                                                                                                                          • AMSI enabled
                                                                                                                                                                                                          Analysis Mode:default
                                                                                                                                                                                                          Analysis stop reason:Timeout
                                                                                                                                                                                                          Detection:MAL
                                                                                                                                                                                                          Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
                                                                                                                                                                                                          EGA Information:
                                                                                                                                                                                                          • Successful, ratio: 100%
                                                                                                                                                                                                          HDC Information:
                                                                                                                                                                                                          • Successful, ratio: 40.5% (good quality ratio 38.8%)
                                                                                                                                                                                                          • Quality average: 84.9%
                                                                                                                                                                                                          • Quality standard deviation: 24.9%
                                                                                                                                                                                                          HCA Information:
                                                                                                                                                                                                          • Successful, ratio: 100%
                                                                                                                                                                                                          • Number of executed functions: 0
                                                                                                                                                                                                          • Number of non-executed functions: 0
                                                                                                                                                                                                          Cookbook Comments:
                                                                                                                                                                                                          • Found application associated with file extension: .exe
                                                                                                                                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                                                                                                          • Excluded IPs from analysis (whitelisted): 209.197.3.8
                                                                                                                                                                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
                                                                                                                                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                          TimeTypeDescription
                                                                                                                                                                                                          06:44:23API Interceptor65x Sleep call for process: file.exe modified
                                                                                                                                                                                                          No context
                                                                                                                                                                                                          No context
                                                                                                                                                                                                          No context
                                                                                                                                                                                                          No context
                                                                                                                                                                                                          No context
                                                                                                                                                                                                          Process:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                          Size (bytes):2291
                                                                                                                                                                                                          Entropy (8bit):5.3192079301865585
                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                          SSDEEP:48:MIHK5HKXRfHK7HKhBHKdHKB1AHKzvQTHmYHKhQnoPtHoxHImHK1HG1qH5HZHDJH6:Pq5qXdq7qLqdqUqzcGYqhQnoPtIxHbq0
                                                                                                                                                                                                          MD5:7D9A4122E2F2920B18399BEE36A6987C
                                                                                                                                                                                                          SHA1:201FAC07241D6DA7885E81E3980C62F994DB58CC
                                                                                                                                                                                                          SHA-256:024B1A66ADDF6A7829F618EA7BA9CCB626646E4D116FB362174766E218EC62CC
                                                                                                                                                                                                          SHA-512:6DB9776956B2959B98B63EB69C7B04E63CCFDBD4E62B6FC75A05AA385F73D9BEF63CF3A67C021DA2CBF7C06AE2CCC6A111FCFE09E7D3BD8D49A93CB47C7B680F
                                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                                          Reputation:moderate, very likely benign file
                                                                                                                                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.IdentityModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b
                                                                                                                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                          Entropy (8bit):7.463503080951417
                                                                                                                                                                                                          TrID:
                                                                                                                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.83%
                                                                                                                                                                                                          • Windows Screen Saver (13104/52) 0.13%
                                                                                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                          File name:file.exe
                                                                                                                                                                                                          File size:357888
                                                                                                                                                                                                          MD5:67756a08917974f3e77b7b2e2bccf264
                                                                                                                                                                                                          SHA1:4cbd4192bb33d1d6760214ee2758e8a2be7fc847
                                                                                                                                                                                                          SHA256:ba3a496df23cb27c37b3765e630c4b637f3b82166621589e953906b1ca29b049
                                                                                                                                                                                                          SHA512:5c4b27efb5375644203d04c2ba9d49cc4bf0c273ec34f208bef4adf9dfa19acc61788fbea40032a1f7cdba68c16b3493465dc962fdc3e3ad1855e404772bbb0d
                                                                                                                                                                                                          SSDEEP:6144:gUaDQpMwaLww3ZKP2IA0/Ihoi1uT+873/6appA8F9P9pysfnF:gUOQfasw3IOJP+x7CappAA9P9p7fF
                                                                                                                                                                                                          TLSH:1B74F1223591C072D66A12348C15CAB56FAFB87409359BAB3FC91ABD4F342D2DE3531B
                                                                                                                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.^.".^.".^.".@...C.".@.....".y.Y.Y.".^.#...".@...l.".@..._.".@..._.".Rich^.".........PE..L....Q.a.....................N.....
                                                                                                                                                                                                          Icon Hash:a0b0b0b4e8c6ce4a
                                                                                                                                                                                                          Entrypoint:0x4094f6
                                                                                                                                                                                                          Entrypoint Section:.text
                                                                                                                                                                                                          Digitally signed:false
                                                                                                                                                                                                          Imagebase:0x400000
                                                                                                                                                                                                          Subsystem:windows gui
                                                                                                                                                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                                                                                          Time Stamp:0x618851BF [Sun Nov 7 22:22:55 2021 UTC]
                                                                                                                                                                                                          TLS Callbacks:
                                                                                                                                                                                                          CLR (.Net) Version:
                                                                                                                                                                                                          OS Version Major:5
                                                                                                                                                                                                          OS Version Minor:0
                                                                                                                                                                                                          File Version Major:5
                                                                                                                                                                                                          File Version Minor:0
                                                                                                                                                                                                          Subsystem Version Major:5
                                                                                                                                                                                                          Subsystem Version Minor:0
                                                                                                                                                                                                          Import Hash:8fb85d04360d27123c3a8e1c2ffb7f7e
                                                                                                                                                                                                          Instruction
                                                                                                                                                                                                          call 00007F5C5CAAB632h
                                                                                                                                                                                                          jmp 00007F5C5CAA361Eh
                                                                                                                                                                                                          mov edi, edi
                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                          mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                          test eax, eax
                                                                                                                                                                                                          je 00007F5C5CAA37B4h
                                                                                                                                                                                                          sub eax, 08h
                                                                                                                                                                                                          cmp dword ptr [eax], 0000DDDDh
                                                                                                                                                                                                          jne 00007F5C5CAA37A9h
                                                                                                                                                                                                          push eax
                                                                                                                                                                                                          call 00007F5C5CAA2C72h
                                                                                                                                                                                                          pop ecx
                                                                                                                                                                                                          pop ebp
                                                                                                                                                                                                          ret
                                                                                                                                                                                                          mov edi, edi
                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                          mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                          push esi
                                                                                                                                                                                                          mov esi, ecx
                                                                                                                                                                                                          mov byte ptr [esi+0Ch], 00000000h
                                                                                                                                                                                                          test eax, eax
                                                                                                                                                                                                          jne 00007F5C5CAA3805h
                                                                                                                                                                                                          call 00007F5C5CAA8110h
                                                                                                                                                                                                          mov dword ptr [esi+08h], eax
                                                                                                                                                                                                          mov ecx, dword ptr [eax+6Ch]
                                                                                                                                                                                                          mov dword ptr [esi], ecx
                                                                                                                                                                                                          mov ecx, dword ptr [eax+68h]
                                                                                                                                                                                                          mov dword ptr [esi+04h], ecx
                                                                                                                                                                                                          mov ecx, dword ptr [esi]
                                                                                                                                                                                                          cmp ecx, dword ptr [00453E88h]
                                                                                                                                                                                                          je 00007F5C5CAA37B4h
                                                                                                                                                                                                          mov ecx, dword ptr [00453DA0h]
                                                                                                                                                                                                          test dword ptr [eax+70h], ecx
                                                                                                                                                                                                          jne 00007F5C5CAA37A9h
                                                                                                                                                                                                          call 00007F5C5CAA49B1h
                                                                                                                                                                                                          mov dword ptr [esi], eax
                                                                                                                                                                                                          mov eax, dword ptr [esi+04h]
                                                                                                                                                                                                          cmp eax, dword ptr [00453CA8h]
                                                                                                                                                                                                          je 00007F5C5CAA37B8h
                                                                                                                                                                                                          mov eax, dword ptr [esi+08h]
                                                                                                                                                                                                          mov ecx, dword ptr [00453DA0h]
                                                                                                                                                                                                          test dword ptr [eax+70h], ecx
                                                                                                                                                                                                          jne 00007F5C5CAA37AAh
                                                                                                                                                                                                          call 00007F5C5CAAB869h
                                                                                                                                                                                                          mov dword ptr [esi+04h], eax
                                                                                                                                                                                                          mov eax, dword ptr [esi+08h]
                                                                                                                                                                                                          test byte ptr [eax+70h], 00000002h
                                                                                                                                                                                                          jne 00007F5C5CAA37B6h
                                                                                                                                                                                                          or dword ptr [eax+70h], 02h
                                                                                                                                                                                                          mov byte ptr [esi+0Ch], 00000001h
                                                                                                                                                                                                          jmp 00007F5C5CAA37ACh
                                                                                                                                                                                                          mov ecx, dword ptr [eax]
                                                                                                                                                                                                          mov dword ptr [esi], ecx
                                                                                                                                                                                                          mov eax, dword ptr [eax+04h]
                                                                                                                                                                                                          mov dword ptr [esi+04h], eax
                                                                                                                                                                                                          mov eax, esi
                                                                                                                                                                                                          pop esi
                                                                                                                                                                                                          pop ebp
                                                                                                                                                                                                          retn 0004h
                                                                                                                                                                                                          mov edi, edi
                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                          sub esp, 14h
                                                                                                                                                                                                          mov eax, dword ptr [004533ACh]
                                                                                                                                                                                                          xor eax, ebp
                                                                                                                                                                                                          mov dword ptr [ebp-04h], eax
                                                                                                                                                                                                          push ebx
                                                                                                                                                                                                          push esi
                                                                                                                                                                                                          xor ebx, ebx
                                                                                                                                                                                                          Programming Language:
                                                                                                                                                                                                          • [ASM] VS2008 build 21022
                                                                                                                                                                                                          • [ C ] VS2008 build 21022
                                                                                                                                                                                                          • [IMP] VS2005 build 50727
                                                                                                                                                                                                          • [C++] VS2008 build 21022
                                                                                                                                                                                                          • [RES] VS2008 build 21022
                                                                                                                                                                                                          • [LNK] VS2008 build 21022
                                                                                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7e40x50.text
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ae0000x4310.rsrc
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x12800x1c.text
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43480x40.text
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x220.text
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                          .text0x10000x1e44a0x1e600False0.5126189557613169data6.390774871628584IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                          .data0x200000x18d9840x34800False0.9630022321428572data7.9198667435711165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                          .rsrc0x1ae0000x43100x4400False0.5094784007352942data4.749144797854934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                          NameRVASizeTypeLanguageCountry
                                                                                                                                                                                                          RIWEZOZAC0x1b17000x55fASCII text, with very long lines (1375), with no line terminatorsRomanianRomania
                                                                                                                                                                                                          RT_ICON0x1ae3300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRomanianRomania
                                                                                                                                                                                                          RT_ICON0x1aebd80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsRomanianRomania
                                                                                                                                                                                                          RT_ICON0x1af2a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRomanianRomania
                                                                                                                                                                                                          RT_ICON0x1af8080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RomanianRomania
                                                                                                                                                                                                          RT_ICON0x1b08b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304RomanianRomania
                                                                                                                                                                                                          RT_ICON0x1b12380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RomanianRomania
                                                                                                                                                                                                          RT_STRING0x1b1e080xb6dataRomanianRomania
                                                                                                                                                                                                          RT_STRING0x1b1ec00x2aedataRomanianRomania
                                                                                                                                                                                                          RT_STRING0x1b21700x19cdataRomanianRomania
                                                                                                                                                                                                          RT_ACCELERATOR0x1b1c600x58dataRomanianRomania
                                                                                                                                                                                                          RT_GROUP_ICON0x1b16a00x5adataRomanianRomania
                                                                                                                                                                                                          RT_VERSION0x1b1cb80x14cIntel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                                                                                                                                                                                          DLLImport
                                                                                                                                                                                                          KERNEL32.dllLocalSize, InterlockedExchange, GetTickCount, CopyFileExA, GetConsoleAliasExesLengthW, EnumSystemCodePagesA, TlsGetValue, MoveFileWithProgressA, VerifyVersionInfoW, LocalUnlock, DebugBreak, GlobalGetAtomNameA, MapViewOfFileEx, GetWindowsDirectoryA, GetModuleHandleA, lstrlenW, GlobalDeleteAtom, SizeofResource, WriteConsoleInputA, CopyFileW, SetWaitableTimer, GetVersionExA, FindResourceW, OpenEventA, SearchPathA, GetThreadPriority, CallNamedPipeA, GetProcAddress, GlobalAlloc, SetFileTime, GetConsoleAliasesLengthA, GetComputerNameA, GetSystemWindowsDirectoryA, GetMailslotInfo, GetTapeParameters, OpenJobObjectW, GetPrivateProfileIntA, ReadConsoleInputW, _lread, LockFile, GetPrivateProfileStructW, GetDiskFreeSpaceExW, DefineDosDeviceW, GetACP, SetProcessAffinityMask, GlobalFindAtomW, InterlockedDecrement, VerifyVersionInfoA, CreateActCtxW, FindNextVolumeA, GetComputerNameW, CancelDeviceWakeupRequest, EnumCalendarInfoA, InterlockedCompareExchange, GetPrivateProfileStructA, EnumCalendarInfoW, EnterCriticalSection, InterlockedIncrement, GetNamedPipeHandleStateW, AreFileApisANSI, LoadLibraryA, SetLastError, WriteConsoleW, GetVolumeInformationA, OpenFileMappingA, LoadLibraryW, Sleep, InitializeCriticalSection, DeleteCriticalSection, LeaveCriticalSection, RtlUnwind, RaiseException, GetLastError, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetStartupInfoW, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetCPInfo, GetModuleHandleW, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapCreate, VirtualFree, VirtualAlloc, HeapSize, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, GetStartupInfoA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, InitializeCriticalSectionAndSpinCount, SetFilePointer, GetConsoleCP, GetConsoleMode, GetLocaleInfoW, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CloseHandle, CreateFileA
                                                                                                                                                                                                          GDI32.dllGetCharWidthA
                                                                                                                                                                                                          ADVAPI32.dllSetThreadToken
                                                                                                                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                          RomanianRomania
                                                                                                                                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                                                                          192.168.2.3193.106.191.2549699472422850027 11/03/22-06:43:26.443077TCP2850027ETPRO TROJAN RedLine Stealer TCP CnC net.tcp Init4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          192.168.2.3193.106.191.2549699472422850286 11/03/22-06:43:32.777356TCP2850286ETPRO TROJAN Redline Stealer TCP CnC Activity4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          193.106.191.25192.168.2.347242496992850353 11/03/22-06:43:29.233425TCP2850353ETPRO MALWARE Redline Stealer TCP CnC - Id1Response4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                          Nov 3, 2022 06:43:26.097611904 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:26.155242920 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:26.155344963 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:26.443077087 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:26.500793934 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:26.546669960 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:29.175399065 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:29.233424902 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:29.287863970 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.777355909 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.846524000 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.846554041 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.846565962 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.846577883 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.846591949 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:32.846884012 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:43.922715902 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:43.980326891 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:43.980422974 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:43.980453968 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:43.982151985 CET4724249699193.106.191.25192.168.2.3
                                                                                                                                                                                                          Nov 3, 2022 06:43:44.022700071 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          Nov 3, 2022 06:43:44.028961897 CET4969947242192.168.2.3193.106.191.25
                                                                                                                                                                                                          No statistics
                                                                                                                                                                                                          Target ID:0
                                                                                                                                                                                                          Start time:06:44:01
                                                                                                                                                                                                          Start date:03/11/2022
                                                                                                                                                                                                          Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                          Commandline:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                          Imagebase:0x400000
                                                                                                                                                                                                          File size:357888 bytes
                                                                                                                                                                                                          MD5 hash:67756A08917974F3E77B7B2E2BCCF264
                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                                          Yara matches:
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.305323613.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.305740549.0000000000959000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.306398043.00000000022F6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.243234104.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.305087718.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.305087718.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.307296597.0000000002820000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.307819441.0000000002942000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000003.242826685.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.320137797.0000000005220000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.312027149.0000000002C80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                          Reputation:low

                                                                                                                                                                                                          No disassembly