Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
stub.exe

Overview

General Information

Sample name:stub.exe
Analysis ID:1502470
MD5:96c62ca985ed966d7c6d274caa5bb41a
SHA1:97842b7b0d381ae027f8a92787ffff84eca2a698
SHA256:c1cf23cf49d7406b02b538db9d9636209c706d3f2fd9719bfda55aef5f65cbaa
Tags:exeStealeriumStealeriumStealer
Infos:

Detection

Stealerium
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Stealerium
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses taskkill to terminate processes
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • stub.exe (PID: 1732 cmdline: "C:\Users\user\Desktop\stub.exe" MD5: 96C62CA985ED966D7C6D274CAA5BB41A)
    • cmd.exe (PID: 1720 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp5F.tmp.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 6592 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
      • taskkill.exe (PID: 3872 cmdline: TaskKill /F /IM 1732 MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 5828 cmdline: Timeout /T 2 /Nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealeriumAccording to SecurityScorecard, Stealerium is an open-source stealer available on GitHub. The malware steals information from browsers, cryptocurrency wallets, and applications such as Discord, Pidgin, Outlook, Telegram, Skype, Element, Signal, Tox, Steam, Minecraft, and VPN clients. The binary also gathers data about the infected host, such as the running processes, Desktop and webcam screenshots, Wi-Fi networks, the Windows product key, and the public and private IP address. The stealer employs multiple anti-analysis techniques, such as detecting virtual machines, sandboxes, and malware analysis tools and checking if the process is being debugged. The malware also embedded a keylogger module and a clipper module that replaces cryptocurrency wallet addresses with the threat actors addresses if the victim makes a transaction. The stolen information is sent to a Discord channel using a Discord Webhook.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealerium
{"C2 url": "https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI"}
SourceRuleDescriptionAuthorStrings
stub.exeJoeSecurity_StealeriumYara detected StealeriumJoe Security
    stub.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      stub.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        stub.exeINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
        • 0x182dc5:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
        stub.exeINDICATOR_SUSPICIOUS_EXE_References_VPNDetects executables referencing many VPN software clients. Observed in infosteslersditekSHen
        • 0x188f05:$s1: \VPN\NordVPN
        • 0x188eeb:$s2: \VPN\OpenVPN
        • 0x188ecd:$s3: \VPN\ProtonVPN
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StealeriumYara detected StealeriumJoe Security
          00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
              • 0x182bc5:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
              00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                0.0.stub.exe.c70000.0.unpackJoeSecurity_StealeriumYara detected StealeriumJoe Security
                  0.0.stub.exe.c70000.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.0.stub.exe.c70000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      0.0.stub.exe.c70000.0.unpackINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
                      • 0x182dc5:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
                      0.0.stub.exe.c70000.0.unpackINDICATOR_SUSPICIOUS_EXE_References_VPNDetects executables referencing many VPN software clients. Observed in infosteslersditekSHen
                      • 0x188f05:$s1: \VPN\NordVPN
                      • 0x188eeb:$s2: \VPN\OpenVPN
                      • 0x188ecd:$s3: \VPN\ProtonVPN
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: stub.exeAvira: detected
                      Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Stealerium {"C2 url": "https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI"}
                      Source: stub.exeVirustotal: Detection: 76%Perma Link
                      Source: stub.exeReversingLabs: Detection: 91%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                      Source: stub.exeJoe Sandbox ML: detected
                      Source: stub.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 162.159.136.232:443 -> 192.168.2.4:49730 version: TLS 1.2
                      Source: stub.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: costura.polly.pdb.compressed|||Polly.pdb|FD65CB8378305DD2185A5847C599E82A6AA5AD7A|81672 source: stub.exe
                      Source: Binary string: D:\a\_work\1\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netfx\System.Memory.pdb source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: stub.exe
                      Source: Binary string: mscorlib.pdb source: stub.exe, 00000000.00000002.1714379327.000000000356E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed-discord-webhook-client[costura.discord-webhook-client.dll.compressed source: stub.exe
                      Source: Binary string: costura.polly.pdb.compressed source: stub.exe
                      Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdb source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1710686089.00000000014E1000.00000004.00000020.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.costura.pdb.compressed source: stub.exe
                      Source: Binary string: n0C:\Windows\mscorlib.pdb source: stub.exe, 00000000.00000002.1718750202.0000000006D2B000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed|||DotNetZip.pdb|565BABCBCD978AF66FE1150CC58FDEAFC9815822|622080 source: stub.exe
                      Source: Binary string: dotnetzipAcostura.dotnetzip.dll.compressedAcostura.dotnetzip.pdb.compressed;microsoft.bcl.asyncinterfacesicostura.microsoft.bcl.asyncinterfaces.dll.compressed source: stub.exe
                      Source: Binary string: $^q costura.dotnetzip.pdb.compressed source: stub.exe, 00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: stub.exe
                      Source: Binary string: polly9costura.polly.dll.compressed9costura.polly.pdb.compressed source: stub.exe
                      Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdbSHA256Qb source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1710686089.00000000014E1000.00000004.00000020.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI
                      Source: global trafficHTTP traffic detected: GET /api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI HTTP/1.1Host: discord.comConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 162.159.136.232 162.159.136.232
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI HTTP/1.1Host: discord.comConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: discord.com
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 01 Sep 2024 16:09:53 GMTContent-Type: application/jsonContent-Length: 45Connection: closeset-cookie: __dcfduid=9fa9e5be687c11efa2ff2e0ac1bafc8d; Expires=Fri, 31-Aug-2029 16:09:53 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Laxstrict-transport-security: max-age=31536000; includeSubDomains; preloadx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1725206994x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: MISSExpires: Sun, 01 Sep 2024 20:09:53 GMTCache-Control: public, max-age=14400Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TQlxRCUtIYXRlkKVdgg2Vs1N%2F6xsBEYGrAuryfnRy0LM8G%2FfNKROjA4Jyg%2BOsLU4Hf2%2FTeKjEU64P20%2Bc2zMcf17WqVYdAco7HT8H2wZ7fnRLaBHV371MwtLDGOj"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffContent-Security-Policy: frame-ancestors 'none'; default-src 'none'Set-Cookie: __sdcfduid=9fa9e5be687c11efa2ff2e0ac1bafc8dd571a141d5614895aa2bfadae526d02924b726e9d5a1b5271d4ff6ad1090086d; Expires=Fri, 31-Aug-2029 16:09:53 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                      Source: stub.exe, 00000000.00000002.1714379327.0000000003541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://discord.com
                      Source: stub.exe, 00000000.00000002.1714379327.0000000003541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://discord.comd
                      Source: stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/binaryformatter
                      Source: stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/dotnet-warnings/
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/serializationformat-binary-obsolete
                      Source: stub.exe, 00000000.00000002.1714379327.0000000003538000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                      Source: stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2Yn
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e3958
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39588
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/roslyn/issues/46646
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/roslyn/issues/46646~
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/runtime
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/runtime/issues/73124.
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/runtime8
                      Source: stub.exeString found in binary or memory: https://github.com/kgnfth
                      Source: stub.exe, 00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://user-images.githubusercontent.com/73314940/227717196-0165bb7f-c33a-4985-8be8-2bd898eacc2b.pn
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: unknownHTTPS traffic detected: 162.159.136.232:443 -> 192.168.2.4:49730 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: stub.exe, DesktopScreenshot.cs.Net Code: Make
                      Source: stub.exe, Keylogger.cs.Net Code: SetHook
                      Source: stub.exe, Keylogger.cs.Net Code: KeyboardLayout

                      System Summary

                      barindex
                      Source: stub.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: stub.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                      Source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                      Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                      Source: C:\Users\user\Desktop\stub.exeCode function: 0_2_014245500_2_01424550
                      Source: C:\Users\user\Desktop\stub.exeCode function: 0_2_014274290_2_01427429
                      Source: C:\Users\user\Desktop\stub.exeCode function: 0_2_01424E200_2_01424E20
                      Source: C:\Users\user\Desktop\stub.exeCode function: 0_2_014242080_2_01424208
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Text.Json.dll@ vs stub.exe
                      Source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Memory.dllT vs stub.exe
                      Source: stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Text.Json.dll@ vs stub.exe
                      Source: stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Text.Json.dll@ vs stub.exe
                      Source: stub.exe, 00000000.00000002.1710686089.00000000014E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Text.Json.dll@ vs stub.exe
                      Source: stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Memory.dllT vs stub.exe
                      Source: stub.exe, 00000000.00000002.1710686089.000000000145E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs stub.exe
                      Source: stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Text.Json.dll@ vs stub.exe
                      Source: stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Memory.dllT vs stub.exe
                      Source: stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Memory.dllT vs stub.exe
                      Source: stub.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: stub.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: stub.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                      Source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                      Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                      Source: stub.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/1@1/1
                      Source: C:\Users\user\Desktop\stub.exeFile created: C:\Users\user\AppData\Local\cdce37eb5392dda50c9d36846d9a361bJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\stub.exeMutant created: \Sessions\1\BaseNamedObjects\J2HAC7I0JMZ4NW61EGKI
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2188:120:WilError_03
                      Source: C:\Users\user\Desktop\stub.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5F.tmpJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp5F.tmp.bat
                      Source: stub.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: stub.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( ProcessId = 1732)
                      Source: C:\Users\user\Desktop\stub.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: stub.exeVirustotal: Detection: 76%
                      Source: stub.exeReversingLabs: Detection: 91%
                      Source: stub.exeString found in binary or memory: /C -StartDelay : Sleeping ISetFileCreationDate : Changing file
                      Source: C:\Users\user\Desktop\stub.exeFile read: C:\Users\user\Desktop\stub.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\stub.exe "C:\Users\user\Desktop\stub.exe"
                      Source: C:\Users\user\Desktop\stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp5F.tmp.bat
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 1732
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak
                      Source: C:\Users\user\Desktop\stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp5F.tmp.batJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 1732Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /NobreakJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
                      Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: stub.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: stub.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: stub.exeStatic file information: File size 1628160 > 1048576
                      Source: stub.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x18c000
                      Source: stub.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: stub.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: costura.polly.pdb.compressed|||Polly.pdb|FD65CB8378305DD2185A5847C599E82A6AA5AD7A|81672 source: stub.exe
                      Source: Binary string: D:\a\_work\1\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netfx\System.Memory.pdb source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: stub.exe
                      Source: Binary string: mscorlib.pdb source: stub.exe, 00000000.00000002.1714379327.000000000356E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed-discord-webhook-client[costura.discord-webhook-client.dll.compressed source: stub.exe
                      Source: Binary string: costura.polly.pdb.compressed source: stub.exe
                      Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdb source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1710686089.00000000014E1000.00000004.00000020.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.costura.pdb.compressed source: stub.exe
                      Source: Binary string: n0C:\Windows\mscorlib.pdb source: stub.exe, 00000000.00000002.1718750202.0000000006D2B000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed|||DotNetZip.pdb|565BABCBCD978AF66FE1150CC58FDEAFC9815822|622080 source: stub.exe
                      Source: Binary string: dotnetzipAcostura.dotnetzip.dll.compressedAcostura.dotnetzip.pdb.compressed;microsoft.bcl.asyncinterfacesicostura.microsoft.bcl.asyncinterfaces.dll.compressed source: stub.exe
                      Source: Binary string: $^q costura.dotnetzip.pdb.compressed source: stub.exe, 00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: stub.exe
                      Source: Binary string: polly9costura.polly.dll.compressed9costura.polly.pdb.compressed source: stub.exe
                      Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdbSHA256Qb source: stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1710686089.00000000014E1000.00000004.00000020.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: stub.exe, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                      Source: Yara matchFile source: stub.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: stub.exe PID: 1732, type: MEMORYSTR
                      Source: stub.exeStatic PE information: 0xAC1F6259 [Mon Jul 4 21:25:45 2061 UTC]
                      Source: stub.exeStatic PE information: section name: .text entropy: 7.936689660662959
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\stub.exeMemory allocated: 1420000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeMemory allocated: 3190000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeMemory allocated: 5190000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeWindow / User API: threadDelayed 706Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeWindow / User API: threadDelayed 1461Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2200Thread sleep count: 706 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2200Thread sleep count: 1461 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99765s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99546s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99320s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -99108s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exe TID: 2424Thread sleep time: -98953s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\stub.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99765Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99546Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99320Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99218Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 99108Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeThread delayed: delay time: 98953Jump to behavior
                      Source: stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                      Source: stub.exe, 00000000.00000002.1717731651.00000000059F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: stub.exeBinary or memory string: vmware
                      Source: stub.exe, 00000000.00000002.1717731651.00000000059F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: stub.exe, 00000000.00000002.1717997877.0000000005AF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'=
                      Source: stub.exeBinary or memory string: VMwareVBox
                      Source: stub.exeBinary or memory string: VirtualMachine:
                      Source: C:\Users\user\Desktop\stub.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\stub.exeCode function: 0_2_01428F90 CheckRemoteDebuggerPresent,0_2_01428F90
                      Source: C:\Users\user\Desktop\stub.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: stub.exe, Keylogger.csReference to suspicious API methods: MapVirtualKey(vkCode, 0u)
                      Source: stub.exe, Decryptor.csReference to suspicious API methods: WinApi.LoadLibrary(sPath + "\\mozglue.dll")
                      Source: stub.exe, Decryptor.csReference to suspicious API methods: WinApi.GetProcAddress(_hNss3, "NSS_Init")
                      Source: C:\Users\user\Desktop\stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp5F.tmp.batJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 1732Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /NobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 1732Jump to behavior
                      Source: C:\Users\user\Desktop\stub.exeQueries volume information: C:\Users\user\Desktop\stub.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ValueTuple\v4.0_4.0.0.0__cc7b13ffcd2ddd51\System.ValueTuple.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: stub.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: stub.exeString found in binary or memory: Electrum#\Electrum\wallets
                      Source: stub.exeString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
                      Source: stub.exeString found in binary or memory: Exodus+\Exodus\exodus.wallet
                      Source: stub.exeString found in binary or memory: Ethereum%\Ethereum\keystore
                      Source: stub.exeString found in binary or memory: Exodus+\Exodus\exodus.wallet
                      Source: stub.exeString found in binary or memory: Ethereum%\Ethereum\keystore
                      Source: stub.exeString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
                      Source: stub.exeString found in binary or memory: Ethereum%\Ethereum\keystore
                      Source: Yara matchFile source: stub.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: stub.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.stub.exe.c70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      Valid Accounts121
                      Windows Management Instrumentation
                      1
                      Scripting
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      Input Capture
                      1
                      File and Directory Discovery
                      Remote Services1
                      Archive Collected Data
                      3
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Obfuscated Files or Information
                      LSASS Memory23
                      System Information Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts2
                      Command and Scripting Interpreter
                      Logon Script (Windows)Logon Script (Windows)12
                      Software Packing
                      Security Account Manager331
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Screen Capture
                      3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Timestomp
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      14
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets161
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items161
                      Virtualization/Sandbox Evasion
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      stub.exe76%VirustotalBrowse
                      stub.exe92%ReversingLabsByteCode-MSIL.Infostealer.Stealgen
                      stub.exe100%AviraTR/Dropper.Gen
                      stub.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      discord.com0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://aka.ms/dotnet-warnings/0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://github.com/dotnet/runtime80%Avira URL Cloudsafe
                      https://discord.com0%Avira URL Cloudsafe
                      https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39580%Avira URL Cloudsafe
                      https://github.com/kgnfth0%Avira URL Cloudsafe
                      https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI0%Avira URL Cloudsafe
                      https://github.com/dotnet/roslyn/issues/46646~0%Avira URL Cloudsafe
                      https://aka.ms/serializationformat-binary-obsolete0%Avira URL Cloudsafe
                      https://discord.com0%VirustotalBrowse
                      https://github.com/kgnfth1%VirustotalBrowse
                      https://user-images.githubusercontent.com/73314940/227717196-0165bb7f-c33a-4985-8be8-2bd898eacc2b.pn0%Avira URL Cloudsafe
                      https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI2%VirustotalBrowse
                      https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2Yn0%Avira URL Cloudsafe
                      https://aka.ms/binaryformatter0%Avira URL Cloudsafe
                      https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39580%VirustotalBrowse
                      https://github.com/dotnet/runtime/issues/73124.0%Avira URL Cloudsafe
                      https://github.com/dotnet/roslyn/issues/46646~0%VirustotalBrowse
                      http://discord.com0%Avira URL Cloudsafe
                      https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2Yn1%VirustotalBrowse
                      https://aka.ms/serializationformat-binary-obsolete0%VirustotalBrowse
                      http://discord.comd0%Avira URL Cloudsafe
                      https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e395880%Avira URL Cloudsafe
                      https://github.com/dotnet/runtime/issues/73124.0%VirustotalBrowse
                      https://github.com/dotnet/runtime0%Avira URL Cloudsafe
                      https://github.com/dotnet/roslyn/issues/466460%Avira URL Cloudsafe
                      https://aka.ms/binaryformatter0%VirustotalBrowse
                      http://discord.com0%VirustotalBrowse
                      https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e395880%VirustotalBrowse
                      https://github.com/dotnet/runtime80%VirustotalBrowse
                      https://user-images.githubusercontent.com/73314940/227717196-0165bb7f-c33a-4985-8be8-2bd898eacc2b.pn0%VirustotalBrowse
                      https://github.com/dotnet/runtime0%VirustotalBrowse
                      https://github.com/dotnet/roslyn/issues/466460%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      discord.com
                      162.159.136.232
                      truetrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aItrue
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://discord.comstub.exe, 00000000.00000002.1714379327.0000000003538000.00000004.00000800.00020000.00000000.sdmptrue
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e3958stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/dotnet/runtime8stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/dotnet-warnings/stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/kgnfthstub.exefalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/dotnet/roslyn/issues/46646~stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/serializationformat-binary-obsoletestub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://user-images.githubusercontent.com/73314940/227717196-0165bb7f-c33a-4985-8be8-2bd898eacc2b.pnstub.exe, 00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://discord.com/api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2Ynstub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmptrue
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/binaryformatterstub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/dotnet/runtime/issues/73124.stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://discord.comstub.exe, 00000000.00000002.1714379327.0000000003541000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://discord.comdstub.exe, 00000000.00000002.1714379327.0000000003541000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39588stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718394403.0000000006030000.00000004.08000000.00040000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namestub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/dotnet/runtimestub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/dotnet/roslyn/issues/46646stub.exe, 00000000.00000002.1717104214.000000000430F000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1718232203.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, stub.exe, 00000000.00000002.1717104214.00000000041F7000.00000004.00000800.00020000.00000000.sdmp, stub.exe, 00000000.00000002.1714379327.00000000033E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      162.159.136.232
                      discord.comUnited States
                      13335CLOUDFLARENETUStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1502470
                      Start date and time:2024-09-01 18:09:04 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 9s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:stub.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@10/1@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 7
                      • Number of non-executed functions: 1
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      TimeTypeDescription
                      12:09:52API Interceptor9x Sleep call for process: stub.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      162.159.136.232S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                      • discord.com/administrator/index.php
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      discord.comget wifi info temp.exeGet hashmaliciousBabuk, TrojanRansomBrowse
                      • 162.159.135.232
                      soinjector.exeGet hashmaliciousUnknownBrowse
                      • 162.159.128.233
                      N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                      • 162.159.135.232
                      N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                      • 162.159.136.232
                      http://relay.csgoze520.com/Get hashmaliciousUnknownBrowse
                      • 162.159.138.232
                      ibero.batGet hashmaliciousSilverRatBrowse
                      • 162.159.136.232
                      Invoice0.exeGet hashmaliciousSilverRatBrowse
                      • 162.159.135.232
                      spglr64.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                      • 162.159.136.232
                      obvious.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                      • 162.159.136.232
                      Fatality.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                      • 162.159.136.232
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSfirmware.mipsel.elfGet hashmaliciousUnknownBrowse
                      • 104.30.194.47
                      file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousAmadey, StealcBrowse
                      • 172.64.41.3
                      ^=L@test_PC_FilE_2024_as_P@ssKey=^.zipGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                      • 188.114.97.3
                      file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                      • 172.64.41.3
                      http://virastman.irGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 188.114.97.3
                      snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 188.114.96.3
                      vir.zipGet hashmaliciousLummaC StealerBrowse
                      • 188.114.96.3
                      https://pinpoint-insights.com/interx/tracker?op=click&id=1bcf8.e84f&url=https://splendo-alu.com/proposed-report22.html#skolverket@skolverket.se&id=71deGet hashmaliciousHTMLPhisherBrowse
                      • 172.67.163.137
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      3b5074b1b5d032e5620f69f9f700ff0esnake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 162.159.136.232
                      snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 162.159.136.232
                      jFzg3KFP48.exeGet hashmaliciousUnknownBrowse
                      • 162.159.136.232
                      BsMXrWBfhT.exeGet hashmaliciousUnknownBrowse
                      • 162.159.136.232
                      BsMXrWBfhT.exeGet hashmaliciousUnknownBrowse
                      • 162.159.136.232
                      n0PDCyrFnf.exeGet hashmaliciousPureLog StealerBrowse
                      • 162.159.136.232
                      n0PDCyrFnf.exeGet hashmaliciousPureLog StealerBrowse
                      • 162.159.136.232
                      https://uppholldlgins.mystrikingly.com/Get hashmaliciousUnknownBrowse
                      • 162.159.136.232
                      http://www.chacararecantodosol.com.br/wp-admin/js/milissa/swisssa2024/swisscom/index2.phpGet hashmaliciousUnknownBrowse
                      • 162.159.136.232
                      https://bfb76b24ef4f39994db41677dff3eb5ffaa8600730bf804477ddba0f4e.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                      • 162.159.136.232
                      No context
                      Process:C:\Users\user\Desktop\stub.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):57
                      Entropy (8bit):4.74664182186836
                      Encrypted:false
                      SSDEEP:3:HFTEOuMJcFKsoOorswBRP:yOuMJNO7wL
                      MD5:833BE36E2B3FCDF32573452AC465456B
                      SHA1:BE2241CC9F6F879AA7ECF6EE968B9897A1265C43
                      SHA-256:F41BC09BA67841DF902C8003F5D868758247B814D5E26AA36835A61C396CFE9D
                      SHA-512:D13CC613ADB09B403C7E5D4E53ADE201C2042825459674C27A96A169D02458940504D8418363962AD682128B948FDD87B4D96CF98786AE9836998480F66D87D1
                      Malicious:false
                      Reputation:low
                      Preview:chcp 65001..TaskKill /F /IM 1732..Timeout /T 2 /Nobreak..
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.932860113683286
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      • Win32 Executable (generic) a (10002005/4) 49.75%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Windows Screen Saver (13104/52) 0.07%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      File name:stub.exe
                      File size:1'628'160 bytes
                      MD5:96c62ca985ed966d7c6d274caa5bb41a
                      SHA1:97842b7b0d381ae027f8a92787ffff84eca2a698
                      SHA256:c1cf23cf49d7406b02b538db9d9636209c706d3f2fd9719bfda55aef5f65cbaa
                      SHA512:66e086fdd0f39f0f166c3d9253805de4095e95b47eee38393a113e2279d4f90c13c8584f3827f45c85b2bca71a9119a48dca6f59d006d4015e9c2f6dafedcde5
                      SSDEEP:49152:LkTq24GjdGSiqkqXfd+/9AqYanieKdsG:L1EjdGSiqkqXf0FLYW
                      TLSH:7975225473F84E04E2FF6F79ACF101116671FD269C65D68E258920BD0F32B49AE12B2B
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Yb............"...0.............n.... ........@.. ....................... ............`................................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x58df6e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0xAC1F6259 [Mon Jul 4 21:25:45 2061 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add al, byte ptr [eax]
                      adc byte ptr [eax], al
                      add byte ptr [eax], al
                      and byte ptr [eax], al
                      add byte ptr [eax+00000018h], al
                      push eax
                      add byte ptr [eax], al
                      add byte ptr [eax], 00000000h
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add dword ptr [eax], eax
                      add dword ptr [eax], eax
                      add byte ptr [eax], al
                      cmp byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x18df1c0x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x18e0000x1228.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1900000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x18df000x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x18bf740x18c000b21b3a0db91fa768688eb1f3de5a5fccFalse0.9394481928661617data7.936689660662959IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x18e0000x12280x1400bb9efeaa602b8de0d1bc5776d2f50d24False0.3576171875data4.834718872452092IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1900000xc0x20003652f468204c4cc9961803ab4b1ce59False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x18e0900x348data0.43214285714285716
                      RT_MANIFEST0x18e3e80xe3bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.38649464726873456
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 1, 2024 18:09:52.793693066 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:52.793725967 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:52.793797970 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:52.802109957 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:52.802124023 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.278846979 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.278963089 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:53.281636000 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:53.281642914 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.281867981 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.333251953 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:53.472203016 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:53.512501001 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.649811029 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.649933100 CEST44349730162.159.136.232192.168.2.4
                      Sep 1, 2024 18:09:53.649985075 CEST49730443192.168.2.4162.159.136.232
                      Sep 1, 2024 18:09:53.848047018 CEST49730443192.168.2.4162.159.136.232
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 1, 2024 18:09:52.778834105 CEST5809853192.168.2.41.1.1.1
                      Sep 1, 2024 18:09:52.787983894 CEST53580981.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 1, 2024 18:09:52.778834105 CEST192.168.2.41.1.1.10xf749Standard query (0)discord.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 1, 2024 18:09:52.787983894 CEST1.1.1.1192.168.2.40xf749No error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                      Sep 1, 2024 18:09:52.787983894 CEST1.1.1.1192.168.2.40xf749No error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                      Sep 1, 2024 18:09:52.787983894 CEST1.1.1.1192.168.2.40xf749No error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                      Sep 1, 2024 18:09:52.787983894 CEST1.1.1.1192.168.2.40xf749No error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                      Sep 1, 2024 18:09:52.787983894 CEST1.1.1.1192.168.2.40xf749No error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                      • discord.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.449730162.159.136.2324431732C:\Users\user\Desktop\stub.exe
                      TimestampBytes transferredDirectionData
                      2024-09-01 16:09:53 UTC162OUTGET /api/webhooks/1216977598710812722/eEJiGM8jVlIOF9WMbphPIuNdIEZhhSSu4T_LZSo0WE_S2YnMqS8z5lz1bmAKfC9V08aI HTTP/1.1
                      Host: discord.com
                      Connection: Keep-Alive
                      2024-09-01 16:09:53 UTC1308INHTTP/1.1 404 Not Found
                      Date: Sun, 01 Sep 2024 16:09:53 GMT
                      Content-Type: application/json
                      Content-Length: 45
                      Connection: close
                      set-cookie: __dcfduid=9fa9e5be687c11efa2ff2e0ac1bafc8d; Expires=Fri, 31-Aug-2029 16:09:53 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                      strict-transport-security: max-age=31536000; includeSubDomains; preload
                      x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                      x-ratelimit-limit: 5
                      x-ratelimit-remaining: 4
                      x-ratelimit-reset: 1725206994
                      x-ratelimit-reset-after: 1
                      via: 1.1 google
                      alt-svc: h3=":443"; ma=86400
                      CF-Cache-Status: MISS
                      Expires: Sun, 01 Sep 2024 20:09:53 GMT
                      Cache-Control: public, max-age=14400
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TQlxRCUtIYXRlkKVdgg2Vs1N%2F6xsBEYGrAuryfnRy0LM8G%2FfNKROjA4Jyg%2BOsLU4Hf2%2FTeKjEU64P20%2Bc2zMcf17WqVYdAco7HT8H2wZ7fnRLaBHV371MwtLDGOj"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      X-Content-Type-Options: nosniff
                      Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                      Set-Cookie: __sdcfduid=9fa9e5be687c11efa2ff2e0ac1bafc8dd571a141d5614895aa2bfadae526d02924b726e9d5a1b5271d4ff6ad1090086d; Expires=Fri, 31-Aug-2029 16:09:53 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                      2024-09-01 16:09:53 UTC347INData Raw: 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 5f 5f 63 66 72 75 69 64 3d 63 30 39 36 34 62 63 63 35 38 33 32 61 66 36 30 34 65 61 36 33 32 31 30 35 31 38 36 61 64 39 66 37 65 36 38 31 62 31 61 2d 31 37 32 35 32 30 36 39 39 33 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 64 69 73 63 6f 72 64 2e 63 6f 6d 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 65 63 75 72 65 3b 20 53 61 6d 65 53 69 74 65 3d 4e 6f 6e 65 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 5f 63 66 75 76 69 64 3d 6a 4a 6b 4a 6f 77 55 62 7a 6e 72 56 36 76 4e 73 45 66 72 49 53 2e 69 7a 7a 6f 34 38 53 6d 38 6e 49 38 49 65 41 75 55 78 6c 64 77 2d 31 37 32 35 32 30 36 39 39 33 36 30 33 2d 30 2e 30 2e 31 2e 31 2d 36 30 34 38 30 30 30 30 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 64 69 73 63 6f 72
                      Data Ascii: Set-Cookie: __cfruid=c0964bcc5832af604ea632105186ad9f7e681b1a-1725206993; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneSet-Cookie: _cfuvid=jJkJowUbznrV6vNsEfrIS.izzo48Sm8nI8IeAuUxldw-1725206993603-0.0.1.1-604800000; path=/; domain=.discor
                      2024-09-01 16:09:53 UTC45INData Raw: 7b 22 6d 65 73 73 61 67 65 22 3a 20 22 55 6e 6b 6e 6f 77 6e 20 57 65 62 68 6f 6f 6b 22 2c 20 22 63 6f 64 65 22 3a 20 31 30 30 31 35 7d
                      Data Ascii: {"message": "Unknown Webhook", "code": 10015}


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:09:51
                      Start date:01/09/2024
                      Path:C:\Users\user\Desktop\stub.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\stub.exe"
                      Imagebase:0xc70000
                      File size:1'628'160 bytes
                      MD5 hash:96C62CA985ED966D7C6D274CAA5BB41A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Stealerium, Description: Yara detected Stealerium, Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1632374521.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1714379327.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:12:09:54
                      Start date:01/09/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp5F.tmp.bat
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:12:09:54
                      Start date:01/09/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:12:09:54
                      Start date:01/09/2024
                      Path:C:\Windows\SysWOW64\chcp.com
                      Wow64 process (32bit):true
                      Commandline:chcp 65001
                      Imagebase:0xca0000
                      File size:12'800 bytes
                      MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:4
                      Start time:12:09:54
                      Start date:01/09/2024
                      Path:C:\Windows\SysWOW64\taskkill.exe
                      Wow64 process (32bit):true
                      Commandline:TaskKill /F /IM 1732
                      Imagebase:0x430000
                      File size:74'240 bytes
                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:5
                      Start time:12:09:54
                      Start date:01/09/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:Timeout /T 2 /Nobreak
                      Imagebase:0x320000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:15.2%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:100%
                        Total number of Nodes:3
                        Total number of Limit Nodes:0
                        execution_graph 7642 1428f90 7643 1428fd4 CheckRemoteDebuggerPresent 7642->7643 7644 1429016 7643->7644

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 561 1428f90-1429014 CheckRemoteDebuggerPresent 563 1429016-142901c 561->563 564 142901d-1429058 561->564 563->564
                        APIs
                        • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 01429007
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710460299.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1420000_stub.jbxd
                        Similarity
                        • API ID: CheckDebuggerPresentRemote
                        • String ID:
                        • API String ID: 3662101638-0
                        • Opcode ID: 28df9b58a61cb3289475a2cc0fae4cb7f7464c42333a48cbdfd7ee0db5bc76ce
                        • Instruction ID: ee30c50d05af304eb8fbde9aef7d66cec2d55bbdeb0767ebdc2765458f4b5f92
                        • Opcode Fuzzy Hash: 28df9b58a61cb3289475a2cc0fae4cb7f7464c42333a48cbdfd7ee0db5bc76ce
                        • Instruction Fuzzy Hash: 6C2145B1800269CFCB10CF9AD484BEEBBF4AF48324F14842AE458A3250D778A984CF60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 567 1424550-14245b6 569 1424600-1424602 567->569 570 14245b8-14245c3 567->570 571 1424604-142461d 569->571 570->569 572 14245c5-14245d1 570->572 578 1424669-142466b 571->578 579 142461f-142462b 571->579 573 14245d3-14245dd 572->573 574 14245f4-14245fe 572->574 576 14245e1-14245f0 573->576 577 14245df 573->577 574->571 576->576 580 14245f2 576->580 577->576 582 142466d-14246c5 578->582 579->578 581 142462d-1424639 579->581 580->574 583 142463b-1424645 581->583 584 142465c-1424667 581->584 591 14246c7-14246d2 582->591 592 142470f-1424711 582->592 585 1424647 583->585 586 1424649-1424658 583->586 584->582 585->586 586->586 588 142465a 586->588 588->584 591->592 593 14246d4-14246e0 591->593 594 1424713-142472b 592->594 595 14246e2-14246ec 593->595 596 1424703-142470d 593->596 601 1424775-1424777 594->601 602 142472d-1424738 594->602 597 14246f0-14246ff 595->597 598 14246ee 595->598 596->594 597->597 600 1424701 597->600 598->597 600->596 603 1424779-14247de 601->603 602->601 604 142473a-1424746 602->604 613 14247e0-14247e6 603->613 614 14247e7-1424807 603->614 605 1424748-1424752 604->605 606 1424769-1424773 604->606 608 1424756-1424765 605->608 609 1424754 605->609 606->603 608->608 610 1424767 608->610 609->608 610->606 613->614 618 1424811-1424847 614->618 621 1424857-142485b 618->621 622 1424849-142484d 618->622 624 142486b-142486f 621->624 625 142485d-1424861 621->625 622->621 623 142484f 622->623 623->621 627 1424871-1424875 624->627 628 142487f-1424883 624->628 625->624 626 1424863 625->626 626->624 627->628 629 1424877-142487a call 14203a4 627->629 630 1424893-1424897 628->630 631 1424885-1424889 628->631 629->628 634 14248a7-14248ab 630->634 635 1424899-142489d 630->635 631->630 633 142488b-142488e call 14203a4 631->633 633->630 638 14248bb-14248bf 634->638 639 14248ad-14248b1 634->639 635->634 637 142489f-14248a2 call 14203a4 635->637 637->634 642 14248c1-14248c5 638->642 643 14248cf 638->643 639->638 641 14248b3 639->641 641->638 642->643 644 14248c7 642->644 645 14248d0 643->645 644->643 645->645
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710460299.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1420000_stub.jbxd
                        Similarity
                        • API ID:
                        • String ID: \Vl
                        • API String ID: 0-682378881
                        • Opcode ID: 9571592cb1e8e207fa916fd74345f9f7ec5606ce74c743076f1e70e09395edae
                        • Instruction ID: 55529e95c04294b726d1860c3e63b5d9e3e6eb40d6b6dd5f68eb5ab2a800e49f
                        • Opcode Fuzzy Hash: 9571592cb1e8e207fa916fd74345f9f7ec5606ce74c743076f1e70e09395edae
                        • Instruction Fuzzy Hash: CBB16074E00219CFDB14CFA9D98579EBBF2EF88314F58812AD419A7364EB749885CB81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710460299.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1420000_stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: df5ea993bc58bef8f0c37f4e2b273f83eca89be4067e2e025fa949075aabcdd4
                        • Instruction ID: fdaf0e3baaadf843c4b4766bb04f78ae96473eadcad51c27514df5497c4c07e2
                        • Opcode Fuzzy Hash: df5ea993bc58bef8f0c37f4e2b273f83eca89be4067e2e025fa949075aabcdd4
                        • Instruction Fuzzy Hash: 98E19E31E002598FDB11CFB8D94468DBBF2BF8A300F658295E805BB365DB75AD86CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710460299.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1420000_stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 62957c3e0eb91e16a1dc032bd8041b571c778404e3d040d42eb948dc08c61287
                        • Instruction ID: 93f5fc1e8c37132d3e65dcfc3d3f529380d9ad1ed2403174fcee996c7584e319
                        • Opcode Fuzzy Hash: 62957c3e0eb91e16a1dc032bd8041b571c778404e3d040d42eb948dc08c61287
                        • Instruction Fuzzy Hash: 32B15370E002198FDB14CFA9D9957EEBBF1EF88314F58812AD415EB364EB749885CB81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 555 1428f89-1429014 CheckRemoteDebuggerPresent 557 1429016-142901c 555->557 558 142901d-1429058 555->558 557->558
                        APIs
                        • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 01429007
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710460299.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1420000_stub.jbxd
                        Similarity
                        • API ID: CheckDebuggerPresentRemote
                        • String ID:
                        • API String ID: 3662101638-0
                        • Opcode ID: d3feef0813d7ffbf490293474be3b9f27862f099fbbd272ca6831346b75fc961
                        • Instruction ID: 6c54525ff76f101434b20144f3bbae6ce2ef836ed350a0bc72d370c137bfdacf
                        • Opcode Fuzzy Hash: d3feef0813d7ffbf490293474be3b9f27862f099fbbd272ca6831346b75fc961
                        • Instruction Fuzzy Hash: 012136B2C00259CFCB14CFA9D484BEEBBF4EF59324F24846AE455A7251D778A944CF60
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710351548.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_13cd000_stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8acef3750bc2c40315b648c813dc4fbfa7d55ac7e83df218f2e4cf807781686d
                        • Instruction ID: 271a01c771da0dcdd2805734e18a97b834d2a3aa998cb5e1acb7c8c1753e6736
                        • Opcode Fuzzy Hash: 8acef3750bc2c40315b648c813dc4fbfa7d55ac7e83df218f2e4cf807781686d
                        • Instruction Fuzzy Hash: AD01DF310083449AE7108EA9CE84767BF98EF40B28F18C43EFD094A686C2799C40C7F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710351548.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_13cd000_stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 364fcc2be737274f1dd4c0f4c2bfe5f2ad40d300ac3eb58368f296919c9fe80a
                        • Instruction ID: 4f54f22488c4b3e9b0f3f35588971de26e17635ae721971db31f97aae6f55c1a
                        • Opcode Fuzzy Hash: 364fcc2be737274f1dd4c0f4c2bfe5f2ad40d300ac3eb58368f296919c9fe80a
                        • Instruction Fuzzy Hash: D9F062714043449AE7118A5AD9C4B63FFE8EB45728F18C45AFD4C4F286C279A844CBB1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1710460299.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1420000_stub.jbxd
                        Similarity
                        • API ID:
                        • String ID: \Vl
                        • API String ID: 0-682378881
                        • Opcode ID: ae65f27567b31a708477c70d714d19498d560ff222553837b733e3b576a59a4d
                        • Instruction ID: 957a87a31762ac51005339e299fd177fa234ac9892db0fc7c889d35b285b2d8c
                        • Opcode Fuzzy Hash: ae65f27567b31a708477c70d714d19498d560ff222553837b733e3b576a59a4d
                        • Instruction Fuzzy Hash: E6915170E00219DFDF14CFA9D98179EBBF2EF88314F58812AD415A73A4EB749885CB91