Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sdss.exe

Overview

General Information

Sample name:sdss.exe
Analysis ID:1525387
MD5:4459a7eb4a040e16e462aed9face5033
SHA1:a6c388afbcfd0a2ae2810205be37c354b15feb86
SHA256:dcc72f90c1d3aac382ba8965c68109986771562f49d4112c5be1a0e9b645f621
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • sdss.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\sdss.exe" MD5: 4459A7EB4A040E16E462AED9FACE5033)
    • RegSvcs.exe (PID: 7388 cmdline: "C:\Users\user\Desktop\sdss.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs           "}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.4146826420.0000000002939000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 107.178.108.41, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7388, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: RegSvcs.exe.7388.1.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs "}
            Source: sdss.exeReversingLabs: Detection: 50%
            Source: sdss.exeVirustotal: Detection: 40%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: sdss.exeJoe Sandbox ML: detected
            Source: sdss.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: wntdll.pdbUGP source: sdss.exe, 00000000.00000003.1704378714.0000000004470000.00000004.00001000.00020000.00000000.sdmp, sdss.exe, 00000000.00000003.1704536660.0000000004610000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: sdss.exe, 00000000.00000003.1704378714.0000000004470000.00000004.00001000.00020000.00000000.sdmp, sdss.exe, 00000000.00000003.1704536660.0000000004610000.00000004.00001000.00020000.00000000.sdmp
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 107.178.108.41:587
            Source: Joe Sandbox ViewIP Address: 107.178.108.41 107.178.108.41
            Source: Joe Sandbox ViewASN Name: IOFLOODUS IOFLOODUS
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 107.178.108.41:587
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: mail.pgsu.co.id
            Source: RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.pgsu.co.id
            Source: RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pgsu.co.id
            Source: RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.or
            Source: RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
            Source: RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
            Source: RegSvcs.exe, 00000001.00000002.4151166869.0000000005C35000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: RegSvcs.exe, 00000001.00000002.4151166869.0000000005C35000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: sdss.exe, 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            System Summary

            barindex
            Source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: sdss.exe, 00000000.00000003.1704378714.0000000004593000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs sdss.exe
            Source: sdss.exe, 00000000.00000003.1703224936.000000000473D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs sdss.exe
            Source: sdss.exe, 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef1a08a05-b195-4d04-8a01-a86b7545550f.exe4 vs sdss.exe
            Source: sdss.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\sdss.exeFile created: C:\Users\user\AppData\Local\Temp\jaillessJump to behavior
            Source: sdss.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\sdss.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: sdss.exeReversingLabs: Detection: 50%
            Source: sdss.exeVirustotal: Detection: 40%
            Source: C:\Users\user\Desktop\sdss.exeFile read: C:\Users\user\Desktop\sdss.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\sdss.exe "C:\Users\user\Desktop\sdss.exe"
            Source: C:\Users\user\Desktop\sdss.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\sdss.exe"
            Source: C:\Users\user\Desktop\sdss.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\sdss.exe"Jump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: sdss.exeStatic file information: File size 1182259 > 1048576
            Source: Binary string: wntdll.pdbUGP source: sdss.exe, 00000000.00000003.1704378714.0000000004470000.00000004.00001000.00020000.00000000.sdmp, sdss.exe, 00000000.00000003.1704536660.0000000004610000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: sdss.exe, 00000000.00000003.1704378714.0000000004470000.00000004.00001000.00020000.00000000.sdmp, sdss.exe, 00000000.00000003.1704536660.0000000004610000.00000004.00001000.00020000.00000000.sdmp
            Source: sdss.exeStatic PE information: real checksum: 0xa2135 should be: 0x12d12d
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\sdss.exeAPI/Special instruction interceptor: Address: 3EF50FC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199948Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199843Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199515Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198968Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198640Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8843Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 990Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99438Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98333Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199948Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199843Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199515Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198968Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198640Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198203Jump to behavior
            Source: sdss.exe, 00000000.00000002.1705411631.0000000000A8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: sdss.exe, 00000000.00000003.1682345899.0000000003DBC000.00000004.00000020.00020000.00000000.sdmp, jailless.0.drBinary or memory string: <8MWlHGFSu@RA8
            Source: RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\sdss.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\sdss.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 859008Jump to behavior
            Source: C:\Users\user\Desktop\sdss.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\sdss.exe"Jump to behavior
            Source: sdss.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4146826420.0000000002939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: sdss.exe PID: 7336, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7388, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: sdss.exe PID: 7336, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7388, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4146826420.0000000002939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: sdss.exe PID: 7336, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7388, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            212
            Process Injection
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            211
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            121
            Virtualization/Sandbox Evasion
            11
            Input Capture
            1
            Process Discovery
            Remote Desktop Protocol11
            Input Capture
            1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)212
            Process Injection
            1
            Credentials in Registry
            121
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Data from Local System
            11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS1
            Application Window Discovery
            Distributed Component Object Model1
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials124
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            sdss.exe50%ReversingLabsWin32.Trojan.AutoitInject
            sdss.exe40%VirustotalBrowse
            sdss.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            pgsu.co.id0%VirustotalBrowse
            mail.pgsu.co.id0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://account.dyn.com/0%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            http://pgsu.co.id0%VirustotalBrowse
            http://r10.i.lencr.org/00%VirustotalBrowse
            http://mail.pgsu.co.id0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            pgsu.co.id
            107.178.108.41
            truetrueunknown
            mail.pgsu.co.id
            unknown
            unknowntrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://pgsu.co.idRegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            http://r10.o.lencr.org0#RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://account.dyn.com/sdss.exe, 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://mail.pgsu.co.idRegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://r10.i.lencr.orRegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.4151166869.0000000005C35000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4151166869.0000000005C35000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://r10.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4146032385.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4151166869.0000000005C11000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                107.178.108.41
                pgsu.co.idUnited States
                53755IOFLOODUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1525387
                Start date and time:2024-10-04 05:15:01 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 27s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:sdss.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                TimeTypeDescription
                23:15:57API Interceptor13890709x Sleep call for process: RegSvcs.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                107.178.108.41veems.exeGet hashmaliciousAgentTeslaBrowse
                  kas.exeGet hashmaliciousAgentTeslaBrowse
                    27.exeGet hashmaliciousAgentTeslaBrowse
                      dm.exeGet hashmaliciousAgentTeslaBrowse
                        sd.exeGet hashmaliciousAgentTeslaBrowse
                          sspt.exeGet hashmaliciousAgentTeslaBrowse
                            sspt.exeGet hashmaliciousAgentTeslaBrowse
                              sspt.exeGet hashmaliciousAgentTeslaBrowse
                                psss1.exeGet hashmaliciousAgentTeslaBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  IOFLOODUSveems.exeGet hashmaliciousAgentTeslaBrowse
                                  • 107.178.108.41
                                  kas.exeGet hashmaliciousAgentTeslaBrowse
                                  • 107.178.108.41
                                  Website_Redesign_Project.xlsGet hashmaliciousUnknownBrowse
                                  • 148.163.100.180
                                  O9M84hUenb.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 107.178.118.181
                                  SecuriteInfo.com.Linux.Siggen.9999.6095.9527.elfGet hashmaliciousMiraiBrowse
                                  • 104.161.30.172
                                  27.exeGet hashmaliciousAgentTeslaBrowse
                                  • 107.178.108.41
                                  file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                  • 107.189.171.131
                                  file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                  • 107.189.171.131
                                  dm.exeGet hashmaliciousAgentTeslaBrowse
                                  • 107.178.108.41
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\sdss.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):240128
                                  Entropy (8bit):6.7817501854922835
                                  Encrypted:false
                                  SSDEEP:6144:nvlmwi0jEEnV5lijNFazOynS+kwWRAnGM9mXvkUil:vLiO5gZcz9L9/r9zl
                                  MD5:D24BE234D544F2F02C5A976943263D86
                                  SHA1:182B1230D96B5A5F6E8604300699105FA6CD0468
                                  SHA-256:B0E7956CCA99629A43A2DEEE784F9771EB0AACB16E30EB34EE13ABD67674BBA9
                                  SHA-512:4E366E13A73164DC36853598455BB1288DA0A4D17611FCA3A66B91996B73393F6231F301BAD81F9C1A42D73AB0ACB51860D8D7E4B824FCD90EBF0F994F67BF77
                                  Malicious:false
                                  Reputation:low
                                  Preview:...FEUUBVA8K..08.NZPZX63r8MWD0FFUUBRA8KGA08KNZPZX6328MWD0FFU.BRA6T.O0.B.{.[...fP$$d@4)2'#?a[*)/_Lk,?p(-X.[Vm..cf+:1'|L5AcA08KNZP..63~9NWt.g UUBRA8KG.0:JE[[ZX.028EWD0FFUK.QA8kGA0.HNZP.X6.28MUD0BFUUBRA8OGA08KNZPZ\6308MWD0FDU..RA(KGQ08KNJPZH6328MWT0FFUUBRA8KG..;K.ZPZX.02~HWD0FFUUBRA8KGA08KNZ.YX:328MWD0FFUUBRA8KGA08KNZPZX6328MWD0FFUUBRA8KGA08KNZPZx63:8MWD0FFUUBRI.KG.08KNZPZX632.92<DFFUq.QA8kGA0.HNZRZX6328MWD0FFUUbRAXe52B[KNZ._X63.;MWB0FF.VBRA8KGA08KNZP.X6s.J(;+SFFYUBRA.HGA28KN.SZX6328MWD0FFU.BR.8KGA08KNZPZX6328M.G0FFUU.RA8IGD0..LZ.jY6028MVD0@FUUBRA8KGA08KNZPZX6328MWD0FFUUBRA8KGA08KNZPZX632%......k.?lKZL.g._.M..I..J.wB.Q.=R...L.....>H..Z.9....^.... .JW89....s.Q!T0eD.7,.Y....hc&.s.A/.B....h.X5..d..`e....NL....L..9?7vWCBT(y.Q ''<.P.9KGA0......ZJs.zG?XrG-....sSHn...$X63V8MW60FF4UBR.8KG.08K ZPZ&632FMWDvFFU.BRA.KGA.8KN7PZX.3283WD0.;ZZ..Q8.08KNZe...._.....q..t#.F.%y..*....3`.7%.3s....L.S..VbSMm..]Y077:JSG<{H....`:OCD2?OMVmT......q......3....=.L8KNZPZ.63.8MW.F.UUB.A.K..08K.P.X.3...W
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.271917343911407
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 95.11%
                                  • AutoIt3 compiled script executable (510682/80) 4.86%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:sdss.exe
                                  File size:1'182'259 bytes
                                  MD5:4459a7eb4a040e16e462aed9face5033
                                  SHA1:a6c388afbcfd0a2ae2810205be37c354b15feb86
                                  SHA256:dcc72f90c1d3aac382ba8965c68109986771562f49d4112c5be1a0e9b645f621
                                  SHA512:225ffbea03ace2d7a0943864c84ab41600266741b104f0e3a304b96f13a99476a75111f07e0ac906165a2d24fac3ceba60dadfac5a2ecaf8f73c4182a7c586f8
                                  SSDEEP:24576:WfmMv6Ckr7Mny5QbMp1LpiEYKRh/+EeNwEh:W3v+7/5QbMp1LpiEn1+EIwEh
                                  TLSH:8C45D012B2C680F5D99238711936E3169BF575383236CC8797E02E66BEEF1405E2EF61
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                  Icon Hash:01449a1a796c95a9
                                  Entrypoint:0x416310
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                  Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:0
                                  File Version Major:5
                                  File Version Minor:0
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:0
                                  Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                  Instruction
                                  call 00007F36CCC4686Ch
                                  jmp 00007F36CCC3A63Eh
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  push ebp
                                  mov ebp, esp
                                  push edi
                                  push esi
                                  mov esi, dword ptr [ebp+0Ch]
                                  mov ecx, dword ptr [ebp+10h]
                                  mov edi, dword ptr [ebp+08h]
                                  mov eax, ecx
                                  mov edx, ecx
                                  add eax, esi
                                  cmp edi, esi
                                  jbe 00007F36CCC3A7CAh
                                  cmp edi, eax
                                  jc 00007F36CCC3A96Ah
                                  cmp ecx, 00000100h
                                  jc 00007F36CCC3A7E1h
                                  cmp dword ptr [004A94E0h], 00000000h
                                  je 00007F36CCC3A7D8h
                                  push edi
                                  push esi
                                  and edi, 0Fh
                                  and esi, 0Fh
                                  cmp edi, esi
                                  pop esi
                                  pop edi
                                  jne 00007F36CCC3A7CAh
                                  pop esi
                                  pop edi
                                  pop ebp
                                  jmp 00007F36CCC3AC2Ah
                                  test edi, 00000003h
                                  jne 00007F36CCC3A7D7h
                                  shr ecx, 02h
                                  and edx, 03h
                                  cmp ecx, 08h
                                  jc 00007F36CCC3A7ECh
                                  rep movsd
                                  jmp dword ptr [00416494h+edx*4]
                                  nop
                                  mov eax, edi
                                  mov edx, 00000003h
                                  sub ecx, 04h
                                  jc 00007F36CCC3A7CEh
                                  and eax, 03h
                                  add ecx, eax
                                  jmp dword ptr [004163A8h+eax*4]
                                  jmp dword ptr [004164A4h+ecx*4]
                                  nop
                                  jmp dword ptr [00416428h+ecx*4]
                                  nop
                                  mov eax, E4004163h
                                  arpl word ptr [ecx+00h], ax
                                  or byte ptr [ecx+eax*2+00h], ah
                                  and edx, ecx
                                  mov al, byte ptr [esi]
                                  mov byte ptr [edi], al
                                  mov al, byte ptr [esi+01h]
                                  mov byte ptr [edi+01h], al
                                  mov al, byte ptr [esi+02h]
                                  shr ecx, 02h
                                  mov byte ptr [edi+02h], al
                                  add esi, 03h
                                  add edi, 03h
                                  cmp ecx, 08h
                                  jc 00007F36CCC3A78Eh
                                  Programming Language:
                                  • [ASM] VS2008 SP1 build 30729
                                  • [ C ] VS2008 SP1 build 30729
                                  • [C++] VS2008 SP1 build 30729
                                  • [ C ] VS2005 build 50727
                                  • [IMP] VS2005 build 50727
                                  • [ASM] VS2008 build 21022
                                  • [RES] VS2008 build 21022
                                  • [LNK] VS2008 SP1 build 30729
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x136e8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0xab0000x136e80x13800c9173f7c8b271253d012f4d842cddf75False0.09770633012820513data3.2802381666465874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                  RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                  RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                  RT_ICON0xab7c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 30236 x 30236 px/mEnglishGreat Britain0.06435584999408495
                                  RT_MENU0xbbfe80x50dataEnglishGreat Britain0.9
                                  RT_DIALOG0xbc0380xfcdataEnglishGreat Britain0.6507936507936508
                                  RT_STRING0xbc1380x530dataEnglishGreat Britain0.33960843373493976
                                  RT_STRING0xbc6680x690dataEnglishGreat Britain0.26964285714285713
                                  RT_STRING0xbccf80x43adataEnglishGreat Britain0.3733826247689464
                                  RT_STRING0xbd1380x5fcdataEnglishGreat Britain0.3087467362924282
                                  RT_STRING0xbd7380x65cdataEnglishGreat Britain0.34336609336609336
                                  RT_STRING0xbdd980x388dataEnglishGreat Britain0.377212389380531
                                  RT_STRING0xbe1200x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                  RT_GROUP_ICON0xbe2780x14dataEnglishGreat Britain1.25
                                  RT_GROUP_ICON0xbe2900x14dataEnglishGreat Britain1.15
                                  RT_GROUP_ICON0xbe2a80x14dataEnglishGreat Britain1.25
                                  RT_GROUP_ICON0xbe2c00x14dataEnglishGreat Britain1.25
                                  RT_VERSION0xbe2d80x19cdataEnglishGreat Britain0.5339805825242718
                                  RT_MANIFEST0xbe4780x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                  DLLImport
                                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                  USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                  GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                  OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishGreat Britain
                                  EnglishUnited States
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 4, 2024 05:15:59.175029993 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:15:59.180811882 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:15:59.181075096 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:15:59.788866997 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:15:59.790612936 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:15:59.795687914 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:15:59.946120977 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:15:59.946576118 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:15:59.951823950 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.104113102 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.112251997 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.117455959 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.301810980 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.301856995 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.301894903 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.301932096 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.301955938 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.302103043 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.326875925 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.332565069 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.483603001 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.499381065 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.504657984 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.654834986 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.655977964 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.661120892 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.812479019 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.814584017 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.819518089 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.974277973 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:00.974616051 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:00.980365038 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.131561995 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.131983042 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:01.137469053 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.519829988 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.520463943 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:01.525496960 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.675937891 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.676574945 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:01.676671028 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:01.676671028 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:01.676671028 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:16:01.681615114 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.681648016 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.681734085 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.681761980 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.896121025 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:16:01.946158886 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:17:37.977390051 CEST49730587192.168.2.4107.178.108.41
                                  Oct 4, 2024 05:17:37.982595921 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:17:38.133923054 CEST58749730107.178.108.41192.168.2.4
                                  Oct 4, 2024 05:17:38.140494108 CEST49730587192.168.2.4107.178.108.41
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 4, 2024 05:15:57.959918976 CEST5909353192.168.2.41.1.1.1
                                  Oct 4, 2024 05:15:58.962186098 CEST5909353192.168.2.41.1.1.1
                                  Oct 4, 2024 05:15:59.159610033 CEST53590931.1.1.1192.168.2.4
                                  Oct 4, 2024 05:15:59.159660101 CEST53590931.1.1.1192.168.2.4
                                  Oct 4, 2024 05:16:16.172290087 CEST53619681.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 4, 2024 05:15:57.959918976 CEST192.168.2.41.1.1.10x9cb0Standard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                  Oct 4, 2024 05:15:58.962186098 CEST192.168.2.41.1.1.10x9cb0Standard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 4, 2024 05:15:59.159610033 CEST1.1.1.1192.168.2.40x9cb0No error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                  Oct 4, 2024 05:15:59.159610033 CEST1.1.1.1192.168.2.40x9cb0No error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                  Oct 4, 2024 05:15:59.159660101 CEST1.1.1.1192.168.2.40x9cb0No error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                  Oct 4, 2024 05:15:59.159660101 CEST1.1.1.1192.168.2.40x9cb0No error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Oct 4, 2024 05:15:59.788866997 CEST58749730107.178.108.41192.168.2.4220-grogolvps.padinet.com ESMTP Exim 4.97.1 #2 Fri, 04 Oct 2024 10:15:59 +0700
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 4, 2024 05:15:59.790612936 CEST49730587192.168.2.4107.178.108.41EHLO 936905
                                  Oct 4, 2024 05:15:59.946120977 CEST58749730107.178.108.41192.168.2.4250-grogolvps.padinet.com Hello 936905 [8.46.123.33]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 4, 2024 05:15:59.946576118 CEST49730587192.168.2.4107.178.108.41STARTTLS
                                  Oct 4, 2024 05:16:00.104113102 CEST58749730107.178.108.41192.168.2.4220 TLS go ahead

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:23:15:54
                                  Start date:03/10/2024
                                  Path:C:\Users\user\Desktop\sdss.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\sdss.exe"
                                  Imagebase:0x400000
                                  File size:1'182'259 bytes
                                  MD5 hash:4459A7EB4A040E16E462AED9FACE5033
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1705625500.0000000001790000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:23:15:56
                                  Start date:03/10/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\sdss.exe"
                                  Imagebase:0x660000
                                  File size:45'984 bytes
                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4146826420.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4146826420.0000000002939000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4145670932.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4146826420.000000000290E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:false

                                  No disassembly