Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:885493
MD5:da7adaa57242edd6c3d836b3731c5c76
SHA1:3cfb7ba031108a6dd3d840711ba31c5859af494d
SHA256:3d9d9746dab8d68d2149a28c8790910c9f0593a75bc42d61652b09ae97a3d691
Tags:exe
Infos:

Detection

PrivateLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected PrivateLoader
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect virtualization through RDTSC time measurements
May check the online IP address of the machine
PE file contains section with special chars
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Detected TCP or UDP traffic on non-standard ports
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
JA3 SSL client fingerprint seen in connection with other malware
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Entry point lies outside standard sections

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • file.exe (PID: 5092 cmdline: C:\Users\user\Desktop\file.exe MD5: DA7ADAA57242EDD6C3D836B3731C5C76)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
PrivateLoaderAccording to sekoia, PrivateLoader is a modular malware whose main capability is to download and execute one or several payloads. The loader implements anti-analysis techniques, fingerprints the compromised host and reports statistics to its C2 server.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.privateloader
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PrivateLoaderYara detected PrivateLoaderJoe Security
    00000000.00000002.795172104.0000000000F01000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_PrivateLoaderYara detected PrivateLoaderJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.file.exe.4150d78.2.raw.unpackJoeSecurity_PrivateLoaderYara detected PrivateLoaderJoe Security
        0.2.file.exe.f00000.0.unpackJoeSecurity_PrivateLoaderYara detected PrivateLoaderJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: file.exeVirustotal: Detection: 24%Perma Link
          Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49695 version: TLS 1.2
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.0.dr
          Source: Binary string: vcruntime140.i386.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.0.dr
          Source: Binary string: vcruntime140.i386.pdbGCTL source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.0.dr
          Source: Binary string: msvcp140.i386.pdbGCTL source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\mozglue\build\mozglue.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, mozglue.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\mozglue\build\mozglue.pdb22! source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, mozglue.dll.0.dr
          Source: Binary string: msvcp140.i386.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss3.pdb source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.0.dr

          Spreading

          barindex
          Source: Yara matchFile source: 0.2.file.exe.4150d78.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.file.exe.f00000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.795172104.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY

          Networking

          barindex
          Source: Yara matchFile source: 0.2.file.exe.4150d78.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.file.exe.f00000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.795172104.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\file.exeDNS query: name: ipinfo.io
          Source: C:\Users\user\Desktop\file.exeDNS query: name: ipinfo.io
          Source: global trafficHTTP traffic detected: GET /widget/demo/102.129.143.77 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36Host: ipinfo.io
          Source: global trafficTCP traffic: 192.168.2.4:49694 -> 194.169.175.123:50500
          Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
          Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
          Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
          Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: unknownTCP traffic detected without corresponding DNS query: 194.169.175.123
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
          Source: file.exe, 00000000.00000002.797293499.00000000023A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
          Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
          Source: file.exeString found in binary or memory: http://ocsp.sectigo.com0
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
          Source: mozglue.dll.0.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: http://www.mozilla.com0
          Source: file.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
          Source: file.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDllt
          Source: file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797293499.0000000002388000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797293499.00000000023A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
          Source: file.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/Content-Type:
          Source: file.exe, 00000000.00000002.797293499.0000000002388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
          Source: file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/N
          Source: file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/102.129.143.77
          Source: file.exe, 00000000.00000002.797293499.000000000237D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/102.129.143.77l
          Source: file.exeString found in binary or memory: https://sectigo.com/CPS0
          Source: file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
          Source: file.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
          Source: unknownDNS traffic detected: queries for: ipinfo.io
          Source: global trafficHTTP traffic detected: GET /widget/demo/102.129.143.77 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36Host: ipinfo.io
          Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49695 version: TLS 1.2
          Source: file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          System Summary

          barindex
          Source: file.exeStatic PE information: section name: .vmp!+~&
          Source: file.exeStatic PE information: section name: .vmp!+~&
          Source: file.exeStatic PE information: section name: .vmp!+~&
          Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenss3.dll8 vs file.exe
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll8 vs file.exe
          Source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcp140.dll^ vs file.exe
          Source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs file.exe
          Source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll8 vs file.exe
          Source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll8 vs file.exe
          Source: file.exeStatic PE information: invalid certificate
          Source: file.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
          Source: file.exeVirustotal: Detection: 24%
          Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimblphXP_35PHcVJump to behavior
          Source: classification engineClassification label: mal72.troj.evad.winEXE@1/6@1/2
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: file.exe, 00000000.00000002.795401757.00000000010AB000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.795401757.00000000010AB000.00000004.00000001.01000000.00000003.sdmp, nss3.dll.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: SELECT ALL %s FROM %s WHERE id=$ID;
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: SELECT ALL id FROM %s WHERE %s;
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: SELECT ALL id FROM %s;
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
          Source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);docid INTEGER PRIMARY KEY%z, 'c%d%q'%z, langidCREATE TABLE %Q.'%q_content'(%s)CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);m
          Source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);/overflow%s%.3x+%.6x%s%.3x/internalleafcorruptedno such schema: %sSELECT 'sqlite_master' AS name, 1 AS rootpage, 'table' AS type UNION ALL SELECT name, rootpage, type FROM "%w".%s WHERE rootpage!=0 ORDER BY namedbstat2018-01-22 18:45:57 0c55d179733b46d8d0ba4d88e01a25e10677046ee3da1d5b1581e86726f2171d:
          Source: file.exeStatic file information: File size 7864024 > 1048576
          Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: file.exeStatic PE information: Raw size of .vmp!+~& is bigger than: 0x100000 < 0x760400
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.0.dr
          Source: Binary string: vcruntime140.i386.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.0.dr
          Source: Binary string: vcruntime140.i386.pdbGCTL source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.0.dr
          Source: Binary string: msvcp140.i386.pdbGCTL source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\mozglue\build\mozglue.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, mozglue.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\mozglue\build\mozglue.pdb22! source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, mozglue.dll.0.dr
          Source: Binary string: msvcp140.i386.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss3.pdb source: file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.0.dr
          Source: Binary string: z:\task_1542148442\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.0.dr
          Source: file.exeStatic PE information: section name: .vmp!+~&
          Source: file.exeStatic PE information: section name: .vmp!+~&
          Source: file.exeStatic PE information: section name: .vmp!+~&
          Source: msvcp140.dll.0.drStatic PE information: section name: .didat
          Source: mozglue.dll.0.drStatic PE information: section name: .didat
          Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp!+~&
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\msvcp140.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\nss3.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\softokn3.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\mozglue.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\freebl3.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\vcruntime140.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 2230005 value: E9 FB BF B0 75 Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 77D3C000 value: E9 0A 40 4F 8A Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 2240008 value: E9 AB E0 B3 75 Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 77D7E0B0 value: E9 60 1F 4C 8A Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 3DE0005 value: E9 CB 5A 7F 73 Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 775D5AD0 value: E9 3A A5 80 8C Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 3DF0005 value: E9 5B B0 80 73 Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 775FB060 value: E9 AA 4F 7F 8C Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 3F10005 value: E9 DB F8 C1 70 Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 74B2F8E0 value: E9 2A 07 3E 8F Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 3F20005 value: E9 FB 42 C3 70 Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: PID: 5092 base: 74B54300 value: E9 0A BD 3C 8F Jump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 00000000015769DB second address: 00000000013387E2 instructions: 0x00000000 rdtsc 0x00000002 inc cl 0x00000004 adc al, 5Eh 0x00000006 cmc 0x00000007 xor bl, cl 0x00000009 mov edx, dword ptr [esp+ecx] 0x0000000c movzx ax, dl 0x00000010 lea ebp, dword ptr [ebp-00000004h] 0x00000016 nop 0x00000018 mov dword ptr [ebp+00h], edx 0x0000001c lea edi, dword ptr [edi-00000004h] 0x00000022 mov eax, dword ptr [edi] 0x00000024 test si, 101Dh 0x00000029 cmp ebx, 01BB0A57h 0x0000002f xor eax, ebx 0x00000031 test esi, ecx 0x00000033 add eax, 7C8B5468h 0x00000038 not eax 0x0000003a dec eax 0x0000003b jmp 00007F5AE078E127h 0x00000040 ror eax, 1 0x00000042 clc 0x00000043 cmp cl, FFFFFFAAh 0x00000046 test eax, 02C60026h 0x0000004b xor ebx, eax 0x0000004d test cl, 0000007Eh 0x00000050 add esi, eax 0x00000052 jmp 00007F5AE04B9A50h 0x00000057 jmp 00007F5AE071FCA3h 0x0000005c lea eax, dword ptr [esp+60h] 0x00000060 cmp ebp, eax 0x00000062 jmp 00007F5AE07F71E7h 0x00000067 ja 00007F5AE06C5722h 0x0000006d jmp esi 0x0000006f sub edi, 00000001h 0x00000075 movzx ecx, byte ptr [edi] 0x00000078 sub ax, di 0x0000007b xor cl, bl 0x0000007d btr edx, 08h 0x00000081 xor cl, 00000032h 0x00000084 not dh 0x00000086 rdtsc
          Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 000000000182D6DE second address: 000000000182D6E9 instructions: 0x00000000 rdtsc 0x00000002 add ch, 0000006Bh 0x00000005 popfd 0x00000006 pop esi 0x00000007 pop ecx 0x00000008 movzx eax, di 0x0000000b rdtsc
          Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 868Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 8Thread sleep count: 39 > 30Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 8Thread sleep count: 39 > 30Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 1312Thread sleep count: 868 > 30Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 1312Thread sleep time: -86800s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\msvcp140.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\nss3.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\softokn3.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\mozglue.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\freebl3.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\vcruntime140.dllJump to dropped file
          Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
          Source: file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797293499.0000000002397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: file.exe, 00000000.00000002.797293499.0000000002397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-USnn

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.file.exe.4150d78.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.file.exe.f00000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.795172104.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.file.exe.4150d78.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.file.exe.f00000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.795172104.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          Virtualization/Sandbox Evasion
          1
          Credential API Hooking
          11
          Security Software Discovery
          Remote Services1
          Credential API Hooking
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkit1
          Input Capture
          1
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Input Capture
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Ingress Tool Transfer
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer2
          Non-Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size Limits13
          Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
          System Network Configuration Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync11
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          file.exe24%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\freebl3.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\freebl3.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\mozglue.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\mozglue.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\msvcp140.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\msvcp140.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\nss3.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\nss3.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\softokn3.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\vcruntime140.dll0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
          https://sectigo.com/CPS00%URL Reputationsafe
          http://ocsp.sectigo.com00%URL Reputationsafe
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
          http://ocsp.thawte.com00%URL Reputationsafe
          http://www.mozilla.com00%URL Reputationsafe

          Download Network PCAP: filteredfull

          NameIPActiveMaliciousAntivirus DetectionReputation
          ipinfo.io
          34.117.59.81
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://ipinfo.io/widget/demo/102.129.143.77false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tfile.exefalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.winimage.com/zLibDlltfile.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpfalse
                high
                http://www.mozilla.com/en-US/blocklist/mozglue.dll.0.drfalse
                  high
                  https://sectigo.com/CPS0file.exefalse
                  • URL Reputation: safe
                  unknown
                  http://crl.thawte.com/ThawteTimestampingCA.crl0file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drfalse
                    high
                    http://ocsp.sectigo.com0file.exefalse
                    • URL Reputation: safe
                    unknown
                    https://ipinfo.io/file.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797293499.0000000002388000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797293499.00000000023A6000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://www.maxmind.com/en/locate-my-ip-addressfile.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpfalse
                        high
                        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#file.exefalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ocsp.thawte.com0file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.mozilla.com0file.exe, 00000000.00000002.797757865.00000000041E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.798123882.0000000004320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.0.dr, freebl3.dll.0.dr, nss3.dll.0.dr, mozglue.dll.0.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.winimage.com/zLibDllfile.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpfalse
                          high
                          https://ipinfo.io/widget/demo/102.129.143.77lfile.exe, 00000000.00000002.797293499.000000000237D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://t.me/RiseProSUPPORTfile.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://ipinfo.io/Nfile.exe, 00000000.00000002.797293499.0000000002338000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://ipinfo.io/Mozilla/5.0file.exe, 00000000.00000002.797293499.0000000002388000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://ipinfo.io/Content-Type:file.exe, 00000000.00000002.795374968.0000000001081000.00000002.00000001.01000000.00000003.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    34.117.59.81
                                    ipinfo.ioUnited States
                                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                    194.169.175.123
                                    unknownGermany
                                    43659CLOUDCOMPUTINGDEfalse
                                    Joe Sandbox Version:37.1.0 Beryl
                                    Analysis ID:885493
                                    Start date and time:2023-06-11 03:22:08 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 6m 16s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:3
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample file name:file.exe
                                    Detection:MAL
                                    Classification:mal72.troj.evad.winEXE@1/6@1/2
                                    EGA Information:Failed
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
                                    • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    34.117.59.81sample.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/json
                                    04451999.exe.lnkGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/json
                                    o5QR1PuuAx.exeGet hashmaliciousOrcusBrowse
                                    • ipinfo.io/ip
                                    SecuriteInfo.com.Win64.PWSX-gen.23885.14599.exeGet hashmaliciousBandit StealerBrowse
                                    • ipinfo.io/country
                                    RcNRT1gqfb.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/country
                                    0Y3hOsXLQ0.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/country
                                    Info_9_may_3263893.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    Notice_3_may_7692707.jsGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/ip
                                    Notice_3_may_2248985.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    Notice_3_may_9755407.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    Notice_3_may.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    https://fossiil.com/tkw6fGet hashmaliciousPhisherBrowse
                                    • ipinfo.io/ip
                                    Notice_3_may_1533151.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    https://panaka.net/x1/Get hashmaliciousUnknownBrowse
                                    • ipinfo.io/ip
                                    Notice_3_may_4766220.jsGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/ip
                                    https://datauncovered.com/snq3bGet hashmaliciousNetSupport RAT, PhisherBrowse
                                    • ipinfo.io/ip
                                    Notice_25_apr_5809264.jsGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/ip
                                    Notice_26_apr_7305393.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    https://brightideasfortheweb.com/lsi4bGet hashmaliciousNetSupport RAT, PhisherBrowse
                                    • ipinfo.io/ip
                                    Notice_25_apr_6088558.jsGet hashmaliciousNetSupport RATBrowse
                                    • ipinfo.io/ip
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ipinfo.ioATT68376.HTMGet hashmaliciousHTMLPhisherBrowse
                                    • 34.117.59.81
                                    fU8ln1UegE.exeGet hashmaliciousDCRatBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoader, VidarBrowse
                                    • 34.117.59.81
                                    PAYMENT SLIP.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    j1xb9O5lE3.exeGet hashmaliciousDCRatBrowse
                                    • 34.117.59.81
                                    nopagadafacturaSii.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    Sii_NopagadaFacMarzo.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    sample.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    Factmarzosiinopagada.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    facturanopagamarzoSii.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousVector StealerBrowse
                                    • 34.117.59.81
                                    https://dev-verficamospyitu.pantheonsite.io/Get hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    #Ud83c#Udfb5 vm_Sound attached.htmGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    Roblox_Game_Manager.exeGet hashmaliciousDCRatBrowse
                                    • 34.117.59.81
                                    SiiMarzo.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    ID-FACT.1685085247.zipGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    FACT64747.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttp://armycac.comGet hashmaliciousUnknownBrowse
                                    • 34.117.157.22
                                    https://gmlnk.com/api/v1/track/link/click/5e5d7c3c713292b8c35ef86a/1683146707297/?link=http://tvyordb.pocketlet.com/47251/*@*.com/*@*.comGet hashmaliciousUnknownBrowse
                                    • 34.117.179.238
                                    http://dev.hilotech.caGet hashmaliciousUnknownBrowse
                                    • 34.117.60.46
                                    ATT68376.HTMGet hashmaliciousHTMLPhisherBrowse
                                    • 34.117.59.81
                                    fU8ln1UegE.exeGet hashmaliciousDCRatBrowse
                                    • 34.117.59.81
                                    https://gmlnk.com/api/v1/track/link/click/5e5d7c3c713292b8c35ef86a/1683146707297/?link=http://peoti.021cityliving.co.za/?7128186=kris.ong@faro.comGet hashmaliciousUnknownBrowse
                                    • 34.117.179.238
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoader, VidarBrowse
                                    • 34.117.59.81
                                    PAYMENT SLIP.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    ZparFzqF3A.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 34.117.168.233
                                    File.exeGet hashmaliciousAmadey, Fabookie, Nymaim, PrivateLoader, RedLine, SmokeLoader, SystemBCBrowse
                                    • 34.117.59.81
                                    nopagadafacturaSii.msiGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    https://mikkymax.comGet hashmaliciousUnknownBrowse
                                    • 34.117.157.22
                                    U_prilogu_je_predracun.exeGet hashmaliciousFormBookBrowse
                                    • 34.117.168.233
                                    http://reg.ruGet hashmaliciousUnknownBrowse
                                    • 34.117.157.22
                                    NEW_ORDER89028902.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 34.117.168.233
                                    winrar-64-6.21-installer_AmGAP-1.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.223.223
                                    winrar-64-6.21-installer_AmGAP-1.exeGet hashmaliciousRedAlertBrowse
                                    • 34.117.223.223
                                    marzofacnopagada.zipGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ce5f3254611a8c095a3d821d44539877file.exeGet hashmaliciousFabookieBrowse
                                    • 34.117.59.81
                                    rhipolito-da03669nit.vbsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    TRX23732373.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    TRX23732373.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    Kq026ekoTY.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoader, VidarBrowse
                                    • 34.117.59.81
                                    341760070.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    PURCHASE_ORDER.docx.docGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                    • 34.117.59.81
                                    file.exeGet hashmaliciousFabookieBrowse
                                    • 34.117.59.81
                                    fetxySvFfs.exeGet hashmaliciousBluStealer, ThunderFox Stealer, a310LoggerBrowse
                                    • 34.117.59.81
                                    148428995.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    yCPXLYK1n3.exeGet hashmaliciousBluStealer, ThunderFox Stealer, a310LoggerBrowse
                                    • 34.117.59.81
                                    weeklyi43804380.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    weeklyi43804380.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    pdf598598.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    TRX326326.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    Calculation-of-costs-647746213.jsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    lhanish-ic17726eun.vbsGet hashmaliciousUnknownBrowse
                                    • 34.117.59.81
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\LocalSimbaphXP_35PHcV\freebl3.dllfile.exeGet hashmaliciousPrivateLoaderBrowse
                                      file.exeGet hashmaliciousPrivateLoader, VidarBrowse
                                        file.exeGet hashmaliciousPrivateLoaderBrowse
                                          file.exeGet hashmaliciousClipboard Hijacker, PrivateLoaderBrowse
                                            file.exeGet hashmaliciousPrivateLoaderBrowse
                                              file.exeGet hashmaliciousPrivateLoaderBrowse
                                                file.exeGet hashmaliciousPrivateLoaderBrowse
                                                  file.exeGet hashmaliciousPrivateLoaderBrowse
                                                    file.exeGet hashmaliciousPrivateLoaderBrowse
                                                      file.exeGet hashmaliciousClipboard Hijacker, PrivateLoaderBrowse
                                                        file.exeGet hashmaliciousClipboard Hijacker, PrivateLoaderBrowse
                                                          file.exeGet hashmaliciousClipboard Hijacker, PrivateLoaderBrowse
                                                            file.exeGet hashmaliciousClipboard Hijacker, PrivateLoaderBrowse
                                                              file.exeGet hashmaliciousPrivateLoaderBrowse
                                                                file.exeGet hashmaliciousPrivateLoaderBrowse
                                                                  file.exeGet hashmaliciousClipboard Hijacker, PrivateLoaderBrowse
                                                                    file.exeGet hashmaliciousLaplas Clipper, PrivateLoaderBrowse
                                                                      file.exeGet hashmaliciousLaplas Clipper, PrivateLoaderBrowse
                                                                        file.exeGet hashmaliciousPrivateLoaderBrowse
                                                                          file.exeGet hashmaliciousPrivateLoaderBrowse
                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):334288
                                                                            Entropy (8bit):6.807000203861606
                                                                            Encrypted:false
                                                                            SSDEEP:6144:C8YBC2NpfYjGg7t5xb7WOBOLFwh8yGHrIrvqqDL6XPowD:CbG7F35BVh8yIZqn65D
                                                                            MD5:EF2834AC4EE7D6724F255BEAF527E635
                                                                            SHA1:5BE8C1E73A21B49F353C2ECFA4108E43A883CB7B
                                                                            SHA-256:A770ECBA3B08BBABD0A567FC978E50615F8B346709F8EB3CFACF3FAAB24090BA
                                                                            SHA-512:C6EA0E4347CBD7EF5E80AE8C0AFDCA20EA23AC2BDD963361DFAF562A9AED58DCBC43F89DD826692A064D76C3F4B3E92361AF7B79A6D16A75D9951591AE3544D2
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                            Joe Sandbox View:
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                            Reputation:high, very likely benign file
                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........./...AV..AV..AV...V..AV].@W..AV.1.V..AV].BW..AV].DW..AV].EW..AV..@W..AVO.@W..AV..@V.AVO.BW..AVO.EW..AVO.AW..AVO.V..AVO.CW..AVRich..AV........................PE..L....b.[.........."!.........f......)........................................p.......s....@.........................p...P............@..x....................P......0...T...............................@...............8............................text...t........................... ..`.rdata..............................@..@.data...,H..........................@....rsrc...x....@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):137168
                                                                            Entropy (8bit):6.78390291752429
                                                                            Encrypted:false
                                                                            SSDEEP:3072:7Gyzk/x2Wp53pUzPoNpj/kVghp1qt/dXDyp4D2JJJvPhrSeTuk:6yQ2Wp53iO/kVghp12/dXDyyD2JJJvPR
                                                                            MD5:8F73C08A9660691143661BF7332C3C27
                                                                            SHA1:37FA65DD737C50FDA710FDBDE89E51374D0C204A
                                                                            SHA-256:3FE6B1C54B8CF28F571E0C5D6636B4069A8AB00B4F11DD842CFEC00691D0C9CD
                                                                            SHA-512:0042ECF9B3571BB5EBA2DE893E8B2371DF18F7C5A589F52EE66E4BFBAA15A5B8B7CC6A155792AAA8988528C27196896D5E82E1751C998BACEA0D92395F66AD89
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                            Reputation:high, very likely benign file
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..;..;..;.....;.W....;...8..;...?..;...:..;...>..;...:...;..:.w.;...?..;...>..;...;..;......;...9..;.Rich.;.........................PE..L...._.[.........."!.....z...................................................@.......3....@A........................@...t.......,.... ..x....................0..h.......T...................T.......h...@...................l........................text....x.......z.................. ..`.rdata..^e.......f...~..............@..@.data...............................@....didat..8...........................@....rsrc...x.... ......................@..@.reloc..h....0......................@..B........................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):462120
                                                                            Entropy (8bit):6.6647691095514485
                                                                            Encrypted:false
                                                                            SSDEEP:12288:E3QUergtVD7jfIobCFvUkBShUgiW6QR7t5s03Ooc8dHkC2esII:NUXzD3IoCFvUy03Ooc8dHkC2eJI
                                                                            MD5:F027303816D6D2AFEAB12183C67B1348
                                                                            SHA1:735E1625B17E4122608EB3AFF3702B97E08F1E51
                                                                            SHA-256:75DDC9778C23EE95B6C57DB6B689F11C07D164D5A4C158D4C0ACB87A520B8004
                                                                            SHA-512:F55F6DF42F266CC5F5F23690A5942068248D50D1C302708BF34D1F9D8831C7BFA174489DE029DADA30707DF4544275B14FBB3DDA09A0A022EB343E2618401797
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.$._.w._.w._.w..2w._.w.'Nw._.w._.w._.w.9.v._.w.9.v._.w.9.v._.w.9.v._.w.9.v._.w.9.v._.w.9"w._.w.9.v._.wRich._.w........................PE..L.....Z.........."!.....T..........@........p...............................0......a&....@A...................................,.......................(?......`@...w..8............................-..@...................`...@....................text...2R.......T.................. ..`.data...T(...p.......X..............@....idata...............p..............@..@.didat..4...........................@....rsrc...............................@..@.reloc..`@.......B..................@..B........................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):1246160
                                                                            Entropy (8bit):6.765536416094505
                                                                            Encrypted:false
                                                                            SSDEEP:24576:Sb5zzlswYNYLVJAwfpeYQ1Dw/fEE8DhSJVIVfRyAkgO6S/V/jbHpls4MSRSMxkoo:4zW5ygDwnEZIYkjgWjblMSRSMqH
                                                                            MD5:BFAC4E3C5908856BA17D41EDCD455A51
                                                                            SHA1:8EEC7E888767AA9E4CCA8FF246EB2AACB9170428
                                                                            SHA-256:E2935B5B28550D47DC971F456D6961F20D1633B4892998750140E0EAA9AE9D78
                                                                            SHA-512:2565BAB776C4D732FFB1F9B415992A4C65B81BCD644A9A1DF1333A269E322925FC1DF4F76913463296EFD7C88EF194C3056DE2F1CA1357D7B5FE5FF0DA877A66
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                            Reputation:high, very likely benign file
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.4.g.Z.g.Z.g.Z.n...s.Z..[.e.Z..B..c.Z..Y.j.Z.._.m.Z..^.l.Z.E.[.o.Z..[.d.Z.g.[..Z..^.m.Z..Z.f.Z....f.Z..X.f.Z.Richg.Z.................PE..L....b.[.........."!................w........................................@............@..................................=..T.......p........................}..p...T..............................@............................................text............................... ..`.rdata...R.......T..................@..@.data...tG...`..."...B..............@....rsrc...p............d..............@..@.reloc...}.......~...h..............@..B........................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):144848
                                                                            Entropy (8bit):6.539750563864442
                                                                            Encrypted:false
                                                                            SSDEEP:3072:UAf6suip+d7FEk/oJz69sFaXeu9CoT2nIVFetBWsqeFwdMIo:p6PbsF4CoT2OeU4SMB
                                                                            MD5:A2EE53DE9167BF0D6C019303B7CA84E5
                                                                            SHA1:2A3C737FA1157E8483815E98B666408A18C0DB42
                                                                            SHA-256:43536ADEF2DDCC811C28D35FA6CE3031029A2424AD393989DB36169FF2995083
                                                                            SHA-512:45B56432244F86321FA88FBCCA6A0D2A2F7F4E0648C1D7D7B1866ADC9DAA5EDDD9F6BB73662149F279C9AB60930DAD1113C8337CB5E6EC9EED5048322F65F7D8
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l$...JO..JO..JO.u.O..JO?oKN..JO?oIN..JO?oON..JO?oNN..JO.mKN..JO-nKN..JO..KO~.JO-nNN..JO-nJN..JO-n.O..JO-nHN..JORich..JO........PE..L....b.[.........."!.........b...............................................P............@..........................................0..x....................@..`.......T...........................(...@...............l............................text.............................. ..`.rdata...D.......F..................@..@.data........ ......................@....rsrc...x....0......................@..@.reloc..`....@......................@..B........................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):87352
                                                                            Entropy (8bit):6.882331969273483
                                                                            Encrypted:false
                                                                            SSDEEP:1536:fGcAKWRMbpuRQci+7uXTKLWe+27JofZo0ENm2eK7oJnoUSgpAY8ODcDcm7cIsXh0:fG3KiRQcJ7uj8f7Jofm0ENm2eK7mnoUS
                                                                            MD5:AC139E08070885A2F021E30FAB609EEE
                                                                            SHA1:3D3C2877CF3C4AA1A1F62708494375404D02CF22
                                                                            SHA-256:EEA2DF0C3D2BF84EE8BC811439A81578F6521C8B28B6CC815C93FB870AC7A0D7
                                                                            SHA-512:072DC8A2297EEA0778F72F70AB5C8DC0400CECBE399115A4CEE0CB7381D494565019D756F602D80077C22AB635B324EC10C644BF3C219A68D9C75840A8B5309F
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... .id..:d..:d..:..=:f..:m.A:o..:d..:L..:w..;k..:w..;w..:w..;`..:w..;...:w..;e..:w.-:e..:w..;e..:Richd..:........PE..L.....Z.........."!......... ..............................................P............@A................................. .......0..................8?...@..H...p ..8............................ ..@............ ...............................text............................... ..`.data...............................@....idata....... ......................@..@.rsrc........0......................@..@.reloc..H....@......................@..B........................................................................................................................................................................................................................................................................................................................
                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Entropy (8bit):7.9673301520478725
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:file.exe
                                                                            File size:7864024
                                                                            MD5:da7adaa57242edd6c3d836b3731c5c76
                                                                            SHA1:3cfb7ba031108a6dd3d840711ba31c5859af494d
                                                                            SHA256:3d9d9746dab8d68d2149a28c8790910c9f0593a75bc42d61652b09ae97a3d691
                                                                            SHA512:9522e2d8ebfb1747b753646def331f8b28b86804fe17f097b7cd0f98f1e754da6ed4961c71c3bfe1d51349aee08c012eb5478611191de466d4c86aa8bb2f3aad
                                                                            SSDEEP:196608:xkAVh0QLZY36FsVa2yJB59CyaWXoxBiV4DzCzTm0cySYxNHVA:xkAN1K7Va26Tkw4xBiCCf++HC
                                                                            TLSH:ED86236323250141E1DACD3EC633FCC634F22BBE9F40987E16E9A5C62A759E5DA43643
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..............."......4.....h.z...........@...................................x...@................................
                                                                            Icon Hash:0c1c0ce4a4ac78e4
                                                                            Entrypoint:0xbae568
                                                                            Entrypoint Section:.vmp!+~&
                                                                            Digitally signed:true
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x6482E8A3 [Fri Jun 9 08:53:55 2023 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:6
                                                                            OS Version Minor:0
                                                                            File Version Major:6
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:6
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:00143c7843a6bccd9702bb42aef6cd34
                                                                            Signature Valid:false
                                                                            Signature Issuer:CN=HDD Western Digital My Book 16TB (WDBBGB0160HBK-EESN)
                                                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                            Error Number:-2146762487
                                                                            Not Before, Not After
                                                                            • 6/8/2023 1:27:09 PM 6/9/2033 1:27:09 PM
                                                                            Subject Chain
                                                                            • CN=HDD Western Digital My Book 16TB (WDBBGB0160HBK-EESN)
                                                                            Version:3
                                                                            Thumbprint MD5:92C2CBD5AA483BD02E39DE1FBFD2CF90
                                                                            Thumbprint SHA-1:FD61242B40D5CA53220446F47A4DA3E493F98DAC
                                                                            Thumbprint SHA-256:6421AC8B68D8FCFE488DB738E7A6AD62F8DD9A7A7ECDC7E05CD4A603EE970F45
                                                                            Serial:600479562A475A9544F26D0DCE72E3AE
                                                                            Instruction
                                                                            push 2DF93442h
                                                                            mov dword ptr [esp+00h], 289635DAh
                                                                            not dword ptr [esp+00h]
                                                                            call 00007F5AE0ABCF21h
                                                                            rol edx, 03h
                                                                            clc
                                                                            cmp edi, ebx
                                                                            sub edx, 2987521Bh
                                                                            clc
                                                                            jmp 00007F5AE0A80F8Ch
                                                                            dec edx
                                                                            test si, 3E01h
                                                                            not edx
                                                                            xor ebx, edx
                                                                            add ebp, edx
                                                                            jmp 00007F5AE0A36147h
                                                                            add cl, al
                                                                            mov word ptr [ebp+04h], cx
                                                                            xchg ah, al
                                                                            lahf
                                                                            movsx eax, ax
                                                                            pushfd
                                                                            test bx, 68DFh
                                                                            rcl ax, cl
                                                                            pop dword ptr [ebp+00h]
                                                                            lea edi, dword ptr [edi-00000004h]
                                                                            sar ax, FF85h
                                                                            shl ah, FFFFFFB1h
                                                                            mov eax, dword ptr [edi]
                                                                            cmp al, dl
                                                                            xor eax, ebx
                                                                            dec eax
                                                                            stc
                                                                            jmp 00007F5AE111BCDBh
                                                                            jmp edi
                                                                            mov cx, word ptr [edi]
                                                                            mov ax, word ptr [edi+02h]
                                                                            sub edi, 00000002h
                                                                            add cx, ax
                                                                            jmp 00007F5AE0B1E320h
                                                                            inc edx
                                                                            stc
                                                                            cmc
                                                                            ror edx, 02h
                                                                            clc
                                                                            add edx, 3EBF5A88h
                                                                            jmp 00007F5AE0C052DAh
                                                                            jmp esi
                                                                            test esi, eax
                                                                            bswap eax
                                                                            cmp ax, ax
                                                                            jmp 00007F5AE10F9938h
                                                                            jmp esi
                                                                            mov ecx, dword ptr [esi]
                                                                            bts eax, ecx
                                                                            add esi, 00000004h
                                                                            bsf ax, di
                                                                            xor ah, FFFFFFA3h
                                                                            add ah, al
                                                                            xor ecx, ebx
                                                                            rol ecx, 1
                                                                            setnp ah
                                                                            dec ecx
                                                                            ror ax, cl
                                                                            movsx ax, dl
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8017700x104.vmp!+~&
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe7c0000x1ce61.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x77e6000x18d8.vmp!+~&
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe7b0000x600.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x728c340x18.vmp!+~&
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe7a2100x40.vmp!+~&
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x7190000x564.vmp!+~&
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x17f2fd0x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x1810000x296d60x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x1ab0000xa7600x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .vmp!+~&0x1b60000x5624bc0x0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .vmp!+~&0x7190000x6f00x800False0.58154296875data4.526615592136478IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .vmp!+~&0x71a0000x7602d00x760400unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .reloc0xe7b0000x6000x600False0.53515625data4.357104909822443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .rsrc0xe7c0000x1ce610x1d000False0.6327283135775862data7.283420783456975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_ICON0xe7c1600x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536
                                                                            RT_ICON0xe8c9880xbdf9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                            RT_GROUP_ICON0xe987840x22data
                                                                            RT_VERSION0xe987a80x2b8COM executable for DOSEnglishUnited States
                                                                            RT_MANIFEST0xe98a600x401XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                                                                            DLLImport
                                                                            KERNEL32.dllFreeResource, CreateToolhelp32Snapshot, CreateEventW, MultiByteToWideChar, Sleep, GetTempPathA, GetModuleHandleExA, GetTimeZoneInformation, CopyFileA, GetLastError, GetFileAttributesA, TzSpecificLocalTimeToSystemTime, CreateFileA, SetEvent, LoadLibraryA, GetVersionExA, LockResource, DeleteFileA, Process32Next, CloseHandle, GetSystemInfo, CreateThread, GetWindowsDirectoryA, LoadResource, SetFileAttributesA, GetLocalTime, GetProcAddress, LocalFree, RemoveDirectoryA, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, FreeLibrary, WideCharToMultiByte, CreateDirectoryA, GetSystemTime, CreateFileMappingW, MapViewOfFile, GetPrivateProfileStringA, IsWow64Process, GetComputerNameA, SetUnhandledExceptionFilter, lstrcatA, lstrcpyA, HeapFree, HeapAlloc, lstrcpynA, GetProcessHeap, ReadFile, SetFilePointer, CreateFileW, GetLocaleInfoA, AreFileApisANSI, TryEnterCriticalSection, HeapCreate, FindClose, GetFullPathNameW, GetDiskFreeSpaceW, OutputDebugStringA, LockFile, LeaveCriticalSection, InitializeCriticalSection, GetFullPathNameA, SetEndOfFile, UnlockFileEx, GetTempPathW, CreateMutexW, GetFileAttributesW, UnmapViewOfFile, HeapValidate, HeapSize, FormatMessageW, GetDiskFreeSpaceA, GetFileAttributesExW, OutputDebugStringW, FlushViewOfFile, WaitForSingleObjectEx, DeleteFileW, HeapReAlloc, LoadLibraryW, HeapCompact, HeapDestroy, UnlockFile, LockFileEx, GetFileSize, DeleteCriticalSection, SystemTimeToFileTime, GetSystemTimeAsFileTime, FormatMessageA, QueryPerformanceCounter, GetTickCount, FlushFileBuffers, WriteConsoleW, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, SetStdHandle, GetModuleHandleA, GetCurrentThreadId, LocalAlloc, WaitForSingleObject, GetVolumeInformationA, lstrlenA, FindResourceA, FindNextFileA, GetUserDefaultLocaleName, TerminateProcess, WriteFile, GetCurrentProcess, FindFirstFileA, Process32First, EnumSystemLocalesW, GetModuleFileNameA, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetFileSizeEx, GetConsoleOutputCP, ReadConsoleW, GetConsoleMode, GetStdHandle, GetModuleFileNameW, GetPrivateProfileSectionNamesA, SizeofResource, EnterCriticalSection, FreeLibraryAndExitThread, ExitThread, GetModuleHandleExW, GetFileType, SetFilePointerEx, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, SetLastError, RaiseException, RtlUnwind, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetFinalPathNameByHandleW, GetModuleHandleW, GetFileInformationByHandleEx, GetLocaleInfoEx, InitializeSRWLock, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, LCMapStringEx, InitializeCriticalSectionEx, EncodePointer, DecodePointer, CompareStringEx, GetCPInfo, GetStringTypeW, InitializeCriticalSectionAndSpinCount, ResetEvent, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, GetStartupInfoW, InitializeSListHead
                                                                            USER32.dllReleaseDC, GetDesktopWindow, GetKeyboardLayoutList, wsprintfA, GetSystemMetrics, GetDC, GetWindowRect, EnumDisplayDevicesA, CharNextA
                                                                            GDI32.dllCreateCompatibleBitmap, SelectObject, CreateCompatibleDC, DeleteObject, BitBlt
                                                                            ADVAPI32.dllSystemFunction036, RegOpenKeyExA, GetUserNameA, CredFree, RegCloseKey, GetCurrentHwProfileA, RegQueryValueExA, CredEnumerateA, RegEnumKeyExA
                                                                            SHELL32.dllShellExecuteA, SHGetFolderPathA
                                                                            WS2_32.dllclosesocket, getaddrinfo, WSACleanup, send, socket, connect, WSAStartup, freeaddrinfo, setsockopt, WSAGetLastError, shutdown, recv
                                                                            CRYPT32.dllCryptUnprotectData, CryptStringToBinaryA
                                                                            gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipSaveImageToFile, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipCreateBitmapFromHBITMAP, GdipAlloc, GdipCloneImage, GdipGetImageEncoders
                                                                            SETUPAPI.dllSetupDiGetDeviceInterfaceDetailA, SetupDiGetClassDevsA, SetupDiEnumDeviceInterfaces, SetupDiEnumDeviceInfo
                                                                            KERNEL32.dllGetSystemTimeAsFileTime, GetModuleHandleA, CreateEventA, GetModuleFileNameW, TerminateProcess, GetCurrentProcess, CreateToolhelp32Snapshot, Thread32First, GetCurrentProcessId, GetCurrentThreadId, OpenThread, Thread32Next, CloseHandle, SuspendThread, ResumeThread, WriteProcessMemory, GetSystemInfo, VirtualAlloc, VirtualProtect, VirtualFree, GetProcessAffinityMask, SetProcessAffinityMask, GetCurrentThread, SetThreadAffinityMask, Sleep, LoadLibraryA, FreeLibrary, GetTickCount, SystemTimeToFileTime, FileTimeToSystemTime, GlobalFree, LocalAlloc, LocalFree, GetProcAddress, ExitProcess, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, GetModuleHandleW, LoadResource, MultiByteToWideChar, FindResourceExW, FindResourceExA, WideCharToMultiByte, GetThreadLocale, GetUserDefaultLCID, GetSystemDefaultLCID, EnumResourceNamesA, EnumResourceNamesW, EnumResourceLanguagesA, EnumResourceLanguagesW, EnumResourceTypesA, EnumResourceTypesW, CreateFileW, LoadLibraryW, GetLastError, FlushFileBuffers, WriteConsoleW, SetStdHandle, IsProcessorFeaturePresent, DecodePointer, GetCommandLineA, RaiseException, HeapFree, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, LCMapStringW, GetStringTypeW, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, HeapCreate, HeapDestroy, QueryPerformanceCounter, HeapSize, WriteFile, RtlUnwind, SetFilePointer, GetConsoleCP, GetConsoleMode, HeapReAlloc, VirtualQuery
                                                                            USER32.dllCharUpperBuffW
                                                                            KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States

                                                                            Download Network PCAP: filteredfull

                                                                            • Total Packets: 21
                                                                            • 50500 undefined
                                                                            • 443 (HTTPS)
                                                                            • 53 (DNS)
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jun 11, 2023 03:23:00.465500116 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:00.492361069 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:23:00.492544889 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:00.520092964 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:23:00.573349953 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:00.733788967 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:00.760757923 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:23:00.807832956 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:01.139144897 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.139240026 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.139369011 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.143112898 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.143155098 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.205610991 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.205878973 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.227166891 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.227221012 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.227648020 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.276845932 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.453165054 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.496301889 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.587950945 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.588109016 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.588417053 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.591439009 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.591509104 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.591547012 CEST49695443192.168.2.434.117.59.81
                                                                            Jun 11, 2023 03:23:01.591562033 CEST4434969534.117.59.81192.168.2.4
                                                                            Jun 11, 2023 03:23:01.592303991 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:01.674948931 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:23:03.934226990 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:04.003173113 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:23:35.941334963 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:23:36.018965960 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:24:07.365874052 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:24:07.456659079 CEST5050049694194.169.175.123192.168.2.4
                                                                            Jun 11, 2023 03:24:38.868856907 CEST4969450500192.168.2.4194.169.175.123
                                                                            Jun 11, 2023 03:24:38.956785917 CEST5050049694194.169.175.123192.168.2.4
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jun 11, 2023 03:23:01.106024027 CEST5856553192.168.2.48.8.8.8
                                                                            Jun 11, 2023 03:23:01.125612020 CEST53585658.8.8.8192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Jun 11, 2023 03:23:01.106024027 CEST192.168.2.48.8.8.80x4715Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Jun 11, 2023 03:23:01.125612020 CEST8.8.8.8192.168.2.40x4715No error (0)ipinfo.io34.117.59.81A (IP address)IN (0x0001)false
                                                                            • https:
                                                                              • ipinfo.io
                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            0192.168.2.44969534.117.59.81443C:\Users\user\Desktop\file.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            2023-06-11 01:23:01 UTC0OUTGET /widget/demo/102.129.143.77 HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Referer: https://ipinfo.io/
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                            Host: ipinfo.io
                                                                            2023-06-11 01:23:01 UTC0INHTTP/1.1 200 OK
                                                                            access-control-allow-origin: *
                                                                            x-frame-options: SAMEORIGIN
                                                                            x-xss-protection: 1; mode=block
                                                                            x-content-type-options: nosniff
                                                                            referrer-policy: strict-origin-when-cross-origin
                                                                            content-type: application/json; charset=utf-8
                                                                            content-length: 1006
                                                                            date: Sun, 11 Jun 2023 01:23:01 GMT
                                                                            x-envoy-upstream-service-time: 2
                                                                            strict-transport-security: max-age=2592000; includeSubDomains
                                                                            vary: Accept-Encoding
                                                                            Via: 1.1 google
                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                            Connection: close
                                                                            2023-06-11 01:23:01 UTC0INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 37 37 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 37 37 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 5a c3 bc 72 69 63 68 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 5a 75 72 69 63 68 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 43 48 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 37 2e 33 37 32 31 2c 38 2e 35 34 31 37 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 32 31 32 32 33 38 20 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 38 30 30 31 22 2c 0a 20 20 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22 45 75 72 6f 70 65 2f 5a
                                                                            Data Ascii: { "input": "102.129.143.77", "data": { "ip": "102.129.143.77", "city": "Zrich", "region": "Zurich", "country": "CH", "loc": "47.3721,8.5417", "org": "AS212238 Datacamp Limited", "postal": "8001", "timezone": "Europe/Z
                                                                            2023-06-11 01:23:01 UTC1INData Raw: 72 65 73 73 22 3a 20 22 33 30 30 20 41 63 61 63 69 61 20 52 6f 61 64 2c 20 44 61 72 72 65 6e 77 6f 6f 64 2c 20 52 61 6e 64 62 75 72 67 2c 20 47 61 75 74 65 6e 67 20 32 31 39 34 2c 20 53 6f 75 74 68 20 41 66 72 69 63 61 2c 20 52 61 6e 64 62 75 72 67 2c 20 4f 74 68 65 72 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 5a 41 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 56 69 6e 63 65 6e 74 61 73 20 47 72 69 6e 69 75 73 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 30 32 2e 31 32 39 2e 31 32 38 2e 30 2f 31 37 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 74 65 6c 3a 2b 32 37 2d 31 30 2d 35 39 35 2d 31 32 37
                                                                            Data Ascii: ress": "300 Acacia Road, Darrenwood, Randburg, Gauteng 2194, South Africa, Randburg, Other", "country": "ZA", "email": "abuse@ipxo.com", "name": "Vincentas Grinius", "network": "102.129.128.0/17", "phone": "tel:+27-10-595-127


                                                                            050100s020406080100

                                                                            Click to jump to process

                                                                            050100s0.001020MB

                                                                            Click to jump to process

                                                                            • File
                                                                            • Network

                                                                            Click to dive into process behavior distribution

                                                                            Target ID:0
                                                                            Start time:03:22:58
                                                                            Start date:11/06/2023
                                                                            Path:C:\Users\user\Desktop\file.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\file.exe
                                                                            Imagebase:0xf00000
                                                                            File size:7864024 bytes
                                                                            MD5 hash:DA7ADAA57242EDD6C3D836B3731C5C76
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 00000000.00000002.797616715.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 00000000.00000002.795172104.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            No disassembly