Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0yGDYqDKv5.exe

Overview

General Information

Sample name:0yGDYqDKv5.exe
renamed because original name is a hash value
Original sample name:25a8358dbb560482b6e59b518702a746.exe
Analysis ID:1520467
MD5:25a8358dbb560482b6e59b518702a746
SHA1:220ec6d3999372e7d06f9df88b0c1953caa3c6e2
SHA256:97d1edc59b66e32eb0f1f816312fa5d2011f987dfc48c4bc7c07d163fd614db9
Tags:exeuser-abuse_ch
Infos:

Detection

BlackMoon
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected BlackMoon Ransomware
AI detected suspicious sample
Detected VMProtect packer
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w10x64
  • 0yGDYqDKv5.exe (PID: 5536 cmdline: "C:\Users\user\Desktop\0yGDYqDKv5.exe" MD5: 25A8358DBB560482B6E59B518702A746)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
    00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
      Process Memory Space: 0yGDYqDKv5.exe PID: 5536JoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.0yGDYqDKv5.exe.a91197.4.raw.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
          0.2.0yGDYqDKv5.exe.a91197.4.raw.unpackMALWARE_Win_BlackMoonDetects executables using BlackMoon RunTimeditekSHen
          • 0xb0a20:$s1: blackmoon
          • 0xb0a60:$s2: BlackMoon RunTime Error:
          0.2.0yGDYqDKv5.exe.a91197.4.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
            0.2.0yGDYqDKv5.exe.a91197.4.unpackMALWARE_Win_BlackMoonDetects executables using BlackMoon RunTimeditekSHen
            • 0xb0a20:$s1: blackmoon
            • 0xb0a60:$s2: BlackMoon RunTime Error:
            0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
              Click to see the 11 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0yGDYqDKv5.exeReversingLabs: Detection: 50%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 0yGDYqDKv5.exeJoe Sandbox ML: detected
              Source: 0yGDYqDKv5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb/ source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD19.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD19.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb11 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb- source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\C++\hacking\cod_driver\x64\Release\kdmapper_driver.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\Labs\Shark-master\Build\Bins\AMD64\Shark.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD20.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Users\willwon\source\repos\mutante3\mutante\build\bin\mutante.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Windows\Start.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: e:\work\dangerzone\flashdriverwin32\Release\i386\amifldrv32.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD20.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: e:\work\dangerzone\flashdriverwin64\Release\amd64\amifldrv64.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: global trafficHTTP traffic detected: GET /BOT2/Var HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: 154.12.36.162Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 154.12.36.162
              Source: unknownTCP traffic detected without corresponding DNS query: 154.12.36.162
              Source: unknownTCP traffic detected without corresponding DNS query: 154.12.36.162
              Source: unknownTCP traffic detected without corresponding DNS query: 154.12.36.162
              Source: unknownTCP traffic detected without corresponding DNS query: 154.12.36.162
              Source: unknownTCP traffic detected without corresponding DNS query: 154.12.36.162
              Source: global trafficHTTP traffic detected: GET /BOT2/Var HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: 154.12.36.162Cache-Control: no-cache
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.239.244.218:8898/
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://103.239.244.218:8898/600006030021.00
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://154.12.36.162/BOT2/LDvar.exe
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://154.12.36.162/BOT2/Var
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.pki.jemmylovejenny.tk/EVRootCA.crt0?
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crls.pki.jemmylovejenny.tk/EVRootCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crls.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crls.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0A
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0C
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0H
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0I
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.pki.jemmylovejenny.tk/EVRootCA0=
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA0O
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA0O
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.thawte.com0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://sf.symcb.com/sf.crl0f
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://sf.symcb.com/sf.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://sf.symcd.com0&
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://t2.symcb.com0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://tl.symcb.com/tl.crl0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://tl.symcb.com/tl.crt0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://tl.symcd.com0&
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000B44000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://d.symcb.com/cps0%
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://d.symcb.com/rpa0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/cadsondemak/kanit)
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://pki.jemmylovejenny.tk/cps0/
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://pki.jemmylovejenny.tk/rpa0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLThis
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLhttps://www.katatrad.comhttps://cadsondemak.comKatatrad
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.digicert.com/CPS0
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.thawte.com/cps0/
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.thawte.com/repository0

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.a91197.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.a91197.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.a87642.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.62901a.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.613a00.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.616eba.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.0yGDYqDKv5.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 0yGDYqDKv5.exe PID: 5536, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.2.0yGDYqDKv5.exe.a91197.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.a91197.4.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.a87642.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.62901a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.613a00.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.616eba.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0.2.0yGDYqDKv5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
              Source: 0yGDYqDKv5.exeStatic PE information: .vmp0 and .vmp1 section names
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs 0yGDYqDKv5.exe
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameShark.sys, vs 0yGDYqDKv5.exe
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs 0yGDYqDKv5.exe
              Source: 0yGDYqDKv5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 0.2.0yGDYqDKv5.exe.a91197.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.a91197.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.a87642.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.62901a.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.613a00.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.616eba.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: 0.2.0yGDYqDKv5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
              Source: classification engineClassification label: mal88.rans.evad.winEXE@1/0@0/1
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 0yGDYqDKv5.exeReversingLabs: Detection: 50%
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: avifil32.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: d3d9.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: 0yGDYqDKv5.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: 0yGDYqDKv5.exeStatic file information: File size 8818688 > 1048576
              Source: 0yGDYqDKv5.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x866000
              Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb/ source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD19.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD19.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb11 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb- source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\C++\hacking\cod_driver\x64\Release\kdmapper_driver.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: D:\Labs\Shark-master\Build\Bins\AMD64\Shark.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD20.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Users\willwon\source\repos\mutante3\mutante\build\bin\mutante.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: C:\Windows\Start.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: e:\work\dangerzone\flashdriverwin32\Release\i386\amifldrv32.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: UI\x64\Release\COD20.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
              Source: Binary string: e:\work\dangerzone\flashdriverwin64\Release\amd64\amifldrv64.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
              Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
              Source: 0yGDYqDKv5.exeStatic PE information: section name: .vmp0
              Source: 0yGDYqDKv5.exeStatic PE information: section name: .vmp1

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 35B0005 value: E9 2B BA 90 73 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 76EBBA30 value: E9 DA 45 6F 8C Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 36C0008 value: E9 8B 8E 84 73 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 76F08E90 value: E9 80 71 7B 8C Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 36D0005 value: E9 8B 4D 3A 72 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 75A74D90 value: E9 7A B2 C5 8D Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 36F0005 value: E9 EB EB 39 72 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 75A8EBF0 value: E9 1A 14 C6 8D Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 3700005 value: E9 8B 8A 75 72 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 75E58A90 value: E9 7A 75 8A 8D Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 3710005 value: E9 2B 02 77 72 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 75E80230 value: E9 DA FD 88 8D Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 3720005 value: E9 8B 2F 7D 73 Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeMemory written: PID: 5536 base: 76EF2F90 value: E9 7A D0 82 8C Jump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295843603.0000000000C07000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: 4SBIEDLL.DLL
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3295843603.0000000000C07000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: 4SBIEDLL.DLL=
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeRDTSC instruction interceptor: First address: 13844C5 second address: 13844D7 instructions: 0x00000000 rdtsc 0x00000002 xor cl, FFFFFFA0h 0x00000005 stc 0x00000006 rol cl, 1 0x00000008 or al, 5Ch 0x0000000a neg ah 0x0000000c rol dx, FF80h 0x00000010 xor bl, cl 0x00000012 rdtsc
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeRDTSC instruction interceptor: First address: C9DBF7 second address: C9DC09 instructions: 0x00000000 rdtsc 0x00000002 xor cl, FFFFFFA0h 0x00000005 stc 0x00000006 rol cl, 1 0x00000008 or al, 5Ch 0x0000000a neg ah 0x0000000c rol dx, FF80h 0x00000010 xor bl, cl 0x00000012 rdtsc
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeRDTSC instruction interceptor: First address: CA5EB8 second address: CA5EBB instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 rdtsc
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: 0yGDYqDKv5.exe, 00000000.00000002.3296531490.00000000019FB000.00000004.00000020.00020000.00000000.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\0yGDYqDKv5.exeProcess information queried: ProcessInformationJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Credential API Hooking
              21
              Security Software Discovery
              Remote Services1
              Credential API Hooking
              1
              Non-Application Layer Protocol
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media11
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager11
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              0yGDYqDKv5.exe50%ReversingLabsWin32.Trojan.Generic
              0yGDYqDKv5.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
              http://ocsp.thawte.com00%URL Reputationsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://154.12.36.162/BOT2/Varfalse
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://154.12.36.162/BOT2/LDvar.exe0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmpfalse
                  unknown
                  http://cacerts.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA.crt00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                    unknown
                    https://scripts.sil.org/OFLThis0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                      unknown
                      http://www.eyuyan.com)DVarFileInfo$0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000B44000.00000002.00000001.01000000.00000003.sdmpfalse
                        unknown
                        https://pki.jemmylovejenny.tk/rpa00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                          unknown
                          http://crl.thawte.com/ThawteTimestampingCA.crl00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.thawte.com/cps0/0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                            unknown
                            https://scripts.sil.org/OFLhttps://www.katatrad.comhttps://cadsondemak.comKatatrad0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                              unknown
                              http://ocsp.thawte.com00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crls.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA.crl00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                unknown
                                http://cacerts.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA.crt00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                  unknown
                                  http://ocsp.pki.jemmylovejenny.tk/EVRootCA0=0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                    unknown
                                    https://pki.jemmylovejenny.tk/cps0/0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                      unknown
                                      https://www.thawte.com/repository00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                        unknown
                                        http://cacerts.pki.jemmylovejenny.tk/EVRootCA.crt0?0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                          unknown
                                          http://ocsp.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA0O0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                            unknown
                                            http://103.239.244.218:8898/600006030021.000yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmpfalse
                                              unknown
                                              http://ocsp.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA0O0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                                unknown
                                                http://crls.pki.jemmylovejenny.tk/EVRootCA.crl00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                                  unknown
                                                  https://github.com/cadsondemak/kanit)0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                                    unknown
                                                    http://103.239.244.218:8898/0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://crls.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA.crl00yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmpfalse
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        154.12.36.162
                                                        unknownUnited States
                                                        54133UNMETEREDCAfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1520467
                                                        Start date and time:2024-09-27 11:30:10 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 4m 12s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:4
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:0yGDYqDKv5.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:25a8358dbb560482b6e59b518702a746.exe
                                                        Detection:MAL
                                                        Classification:mal88.rans.evad.winEXE@1/0@0/1
                                                        EGA Information:Failed
                                                        HCA Information:
                                                        • Successful, ratio: 100%
                                                        • Number of executed functions: 0
                                                        • Number of non-executed functions: 0
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • VT rate limit hit for: 0yGDYqDKv5.exe
                                                        No simulations
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        154.12.36.162SecuriteInfo.com.W32.GenKryptik.DLII.tr.897.20988.exeGet hashmaliciousBlackMoonBrowse
                                                        • 154.12.36.162/BOT/Var
                                                        SecuriteInfo.com.Variant.Strictor.290402.14971.7159.exeGet hashmaliciousBlackMoonBrowse
                                                        • 154.12.36.162/ZZ/Var
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        UNMETEREDCASecuriteInfo.com.W32.GenKryptik.DLII.tr.897.20988.exeGet hashmaliciousBlackMoonBrowse
                                                        • 154.12.36.162
                                                        SecuriteInfo.com.Variant.Strictor.290402.14971.7159.exeGet hashmaliciousBlackMoonBrowse
                                                        • 154.12.36.162
                                                        ExeFile (347).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        ExeFile (349).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        ExeFile (369).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        ExeFile (367).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        ExeFile (371).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        ExeFile (378).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        ExeFile (160).exeGet hashmaliciousEmotetBrowse
                                                        • 38.88.126.202
                                                        185.196.11.135-arm-2024-08-06T18_49_53.elfGet hashmaliciousMiraiBrowse
                                                        • 38.147.202.219
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.979434142838091
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.94%
                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:0yGDYqDKv5.exe
                                                        File size:8'818'688 bytes
                                                        MD5:25a8358dbb560482b6e59b518702a746
                                                        SHA1:220ec6d3999372e7d06f9df88b0c1953caa3c6e2
                                                        SHA256:97d1edc59b66e32eb0f1f816312fa5d2011f987dfc48c4bc7c07d163fd614db9
                                                        SHA512:d9573907c31efc7b536a8d77595e22d3a1a38bbf40d3c6bbc1f146f8d9311f2984fcc9102d745b82e00aa1af4c40958dd29b2f5b43d173c896218ea595bd86ea
                                                        SSDEEP:196608:r3IVeodRuG3wPtEd1adiz+Mte7Qd/r36/rpCCWlM:LIo2RNAP67ei6MuQFopCJ
                                                        TLSH:BB96337317665082D5E0C83AC62BBDD432FA43AF4B8278B565FBACC52126DE0E613D53
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X%.f.................P....p..............`....@...........................@............................................
                                                        Icon Hash:1371579633311392
                                                        Entrypoint:0x144c4e3
                                                        Entrypoint Section:.vmp1
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                        DLL Characteristics:
                                                        Time Stamp:0x66EC2558 [Thu Sep 19 13:21:28 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:0
                                                        File Version Major:5
                                                        File Version Minor:0
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:0
                                                        Import Hash:2cbb343f31943476e7ffd3952e3d673c
                                                        Instruction
                                                        push 80BF15DCh
                                                        call 00007F6E0518E47Dh
                                                        jmp 00007F6E0568043Ch
                                                        inc eax
                                                        stc
                                                        rol eax, 1
                                                        xor eax, 3F903741h
                                                        xor ebx, eax
                                                        stc
                                                        add edi, eax
                                                        jmp 00007F6E0518FA4Ah
                                                        dec ecx
                                                        stc
                                                        not ecx
                                                        xor ebx, ecx
                                                        cmc
                                                        cmp esp, eax
                                                        add ebp, ecx
                                                        jmp 00007F6E05180C84h
                                                        dec ecx
                                                        test ah, 00000020h
                                                        xor ebx, ecx
                                                        cmc
                                                        test ebx, edi
                                                        add edi, ecx
                                                        jmp 00007F6E056736D8h
                                                        inc ecx
                                                        xor ebx, 332C2CCAh
                                                        jmp 00007F6E05156383h
                                                        bswap eax
                                                        jmp 00007F6E04E625BFh
                                                        dec eax
                                                        clc
                                                        rol eax, 02h
                                                        xor ebx, eax
                                                        cmp si, di
                                                        test ebx, 6BD94035h
                                                        add ebp, eax
                                                        jmp 00007F6E052CC325h
                                                        jl 00007F6E052D0C56h
                                                        loopne 00007F6E052D0CA7h
                                                        inc ebp
                                                        call 00007F6E3781399Bh
                                                        int3
                                                        inc ch
                                                        sub ebp, dword ptr [edx+15ABE17Eh]
                                                        adc byte ptr [edx+ebx+54h], bh
                                                        out dx, al
                                                        aad 00h
                                                        push cs
                                                        aad 9Ah
                                                        xlatb
                                                        in eax, dx
                                                        and eax, 935F522Bh
                                                        fldcw word ptr [edx-2A6CD3C7h]
                                                        push esp
                                                        mov dl, F9h
                                                        pop edi
                                                        bound ebp, dword ptr [ebx-17E8C29Fh]
                                                        sub al, byte ptr [edi]
                                                        into
                                                        push ds
                                                        fild qword ptr [edx]
                                                        jnp 00007F6E052D0C74h
                                                        in al, 18h
                                                        cld
                                                        mov ah, 26h
                                                        sbb al, B6h
                                                        mov seg?, word ptr [ebx+706FBDE5h]
                                                        adc al, CEh
                                                        pop edx
                                                        dec edi
                                                        push ds
                                                        lodsd
                                                        dec ebx
                                                        loop 00007F6E052D0C0Dh
                                                        call 00007F6DCCC63859h
                                                        imul esp, eax, A6h
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xf51e1c0x1cc.vmp1
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x140a0000x1885.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0xfa00000xe4.vmp1
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x1045360x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x1060000x6744280x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x77b0000x8b4ca0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .vmp00x8070000x39c0330x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .vmp10xba40000x865b200x866000f739bb2e89561ee5aef644383c9a7167unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x140a0000x18850x20007c6d00d2ac06dd53ca35696cbb5dafa4False0.45751953125data4.959444021608528IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x140a1c40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                                        RT_ICON0x140a4ac0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                                        RT_ICON0x140a5d40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.6852720450281425
                                                        RT_GROUP_ICON0x140b67c0x14data1.2
                                                        RT_GROUP_ICON0x140b6900x14dataChineseChina1.2
                                                        RT_GROUP_ICON0x140b6a40x14dataChineseChina1.25
                                                        RT_MANIFEST0x140b6b80x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                                                        DLLImport
                                                        iphlpapi.dllGetAdaptersInfo
                                                        WINMM.dllwaveOutUnprepareHeader
                                                        WS2_32.dllinet_ntoa
                                                        MSVFW32.dllDrawDibDraw
                                                        AVIFIL32.dllAVIStreamInfoA
                                                        RASAPI32.dllRasGetConnectStatusA
                                                        KERNEL32.dllGetVersion, GetVersionExA
                                                        USER32.dllGetSysColorBrush
                                                        GDI32.dllGetPolyFillMode
                                                        WINSPOOL.DRVClosePrinter
                                                        comdlg32.dllGetFileTitleA
                                                        ADVAPI32.dllRegCreateKeyExA
                                                        SHELL32.dllShellExecuteA
                                                        ole32.dllCLSIDFromProgID
                                                        OLEAUT32.dllVariantClear
                                                        COMCTL32.dllImageList_Destroy
                                                        WININET.dllHttpQueryInfoA
                                                        WTSAPI32.dllWTSSendMessageW
                                                        KERNEL32.dllVirtualQuery
                                                        USER32.dllGetUserObjectInformationW
                                                        KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                        USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                                        Language of compilation systemCountry where language is spokenMap
                                                        ChineseChina
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 27, 2024 11:31:05.121102095 CEST4970480192.168.2.5154.12.36.162
                                                        Sep 27, 2024 11:31:05.125909090 CEST8049704154.12.36.162192.168.2.5
                                                        Sep 27, 2024 11:31:05.126019001 CEST4970480192.168.2.5154.12.36.162
                                                        Sep 27, 2024 11:31:05.126126051 CEST4970480192.168.2.5154.12.36.162
                                                        Sep 27, 2024 11:31:05.130911112 CEST8049704154.12.36.162192.168.2.5
                                                        Sep 27, 2024 11:31:05.733006001 CEST8049704154.12.36.162192.168.2.5
                                                        Sep 27, 2024 11:31:05.733135939 CEST4970480192.168.2.5154.12.36.162
                                                        Sep 27, 2024 11:32:05.732645988 CEST8049704154.12.36.162192.168.2.5
                                                        Sep 27, 2024 11:32:05.732712030 CEST4970480192.168.2.5154.12.36.162
                                                        Sep 27, 2024 11:32:54.926493883 CEST4970480192.168.2.5154.12.36.162
                                                        Sep 27, 2024 11:32:54.931400061 CEST8049704154.12.36.162192.168.2.5
                                                        • 154.12.36.162
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.549704154.12.36.162805536C:\Users\user\Desktop\0yGDYqDKv5.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 27, 2024 11:31:05.126126051 CEST149OUTGET /BOT2/Var HTTP/1.1
                                                        Accept: */*
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
                                                        Host: 154.12.36.162
                                                        Cache-Control: no-cache
                                                        Sep 27, 2024 11:31:05.733006001 CEST244INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 27 Sep 2024 09:31:05 GMT
                                                        Content-Type: application/octet-stream
                                                        Content-Length: 2
                                                        Last-Modified: Thu, 19 Sep 2024 13:28:12 GMT
                                                        Connection: keep-alive
                                                        ETag: "66ec26ec-2"
                                                        Accept-Ranges: bytes
                                                        Data Raw: 31 31
                                                        Data Ascii: 11


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:05:31:01
                                                        Start date:27/09/2024
                                                        Path:C:\Users\user\Desktop\0yGDYqDKv5.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\0yGDYqDKv5.exe"
                                                        Imagebase:0x400000
                                                        File size:8'818'688 bytes
                                                        MD5 hash:25A8358DBB560482B6E59B518702A746
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        No disassembly