Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
enigma_loader.exe

Overview

General Information

Sample name:enigma_loader.exe
Analysis ID:1561481
MD5:262215bcd5fba074e3f2dd216663f727
SHA1:48803b38e74382826aa8b4ca9d3e2017601330eb
SHA256:a0b52d44e5ce4fd05068101a2a7fe64b533be9bacc774942234cbdd23b12d150
Tags:exeuser-4k95m
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • enigma_loader.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\enigma_loader.exe" MD5: 262215BCD5FBA074E3F2DD216663F727)
    • WerFault.exe (PID: 7500 cmdline: C:\Windows\system32\WerFault.exe -u -p 7268 -s 1880 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 7464 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 262215BCD5FBA074E3F2DD216663F727)
  • svchost.exe (PID: 7644 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 262215BCD5FBA074E3F2DD216663F727)
  • svchost.exe (PID: 792 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 344 cmdline: C:\Windows\system32\WerFault.exe -pss -s 440 -p 7268 -ip 7268 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"C2 url": ["127.0.0.1", "selection-wa.gl.at.ply.gg"], "Port": 64769, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
enigma_loader.exeJoeSecurity_XWormYara detected XWormJoe Security
    enigma_loader.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x75b7:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7654:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7769:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x7429:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\svchost.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\svchost.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x75b7:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x7654:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x7769:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x7429:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x73b7:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x7454:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x7569:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x7229:$cnc4: POST / HTTP/1.1
        00000000.00000002.3059612959.0000000003041000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          Process Memory Space: enigma_loader.exe PID: 7268JoeSecurity_XWormYara detected XWormJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.enigma_loader.exe.d50000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.enigma_loader.exe.d50000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0x75b7:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x7654:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x7769:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x7429:$cnc4: POST / HTTP/1.1

              System Summary

              barindex
              Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\enigma_loader.exe, ProcessId: 7268, TargetFilename: C:\Users\user\AppData\Roaming\svchost.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 7464, ProcessName: svchost.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\enigma_loader.exe, ProcessId: 7268, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\enigma_loader.exe, ProcessId: 7268, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
              Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 7464, ProcessName: svchost.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T14:31:26.215138+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:31:33.341346+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:31:47.555949+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:31:56.223589+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:01.774279+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:15.996776+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:22.799231+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:26.222991+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:32.774900+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:33.086808+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:37.215754+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:37.526454+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:43.305303+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:43.620016+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:44.653952+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:45.653721+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:48.821136+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:49.132021+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:49.454718+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:51.367562+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:51.678461+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:56.213226+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:59.674253+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:59.984447+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:05.228480+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:05.539012+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:06.159975+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:09.416188+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:15.759717+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:26.238242+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:27.354918+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:27.666554+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:28.969465+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:29.279560+010028528701Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T14:31:33.343099+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:31:47.557720+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:01.777125+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:16.000422+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:22.863645+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:32.777946+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:33.088656+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:33.391147+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:33.703067+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:37.221099+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:37.532883+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:43.306878+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:43.622906+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:44.656683+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:45.656449+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:48.824507+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:49.140499+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:49.456622+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:51.372590+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:51.680412+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:59.685580+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:32:59.986287+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:05.230932+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:05.557175+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:05.852647+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:06.161321+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:09.505789+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:16.039955+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:27.359678+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:27.671384+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:28.987717+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              2024-11-23T14:33:29.287722+010028529231Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T14:31:26.215138+010028528741Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:31:56.223589+010028528741Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:26.222991+010028528741Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:32:56.213226+010028528741Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              2024-11-23T14:33:26.238242+010028528741Malware Command and Control Activity Detected147.185.221.2364769192.168.2.449730TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T14:32:36.699680+010028531931Malware Command and Control Activity Detected192.168.2.449730147.185.221.2364769TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: enigma_loader.exeAvira: detected
              Source: selection-wa.gl.at.ply.ggAvira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Roaming\svchost.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
              Source: enigma_loader.exeMalware Configuration Extractor: Xworm {"C2 url": ["127.0.0.1", "selection-wa.gl.at.ply.gg"], "Port": 64769, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
              Source: C:\Users\user\AppData\Roaming\svchost.exeReversingLabs: Detection: 86%
              Source: enigma_loader.exeReversingLabs: Detection: 86%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\svchost.exeJoe Sandbox ML: detected
              Source: enigma_loader.exeJoe Sandbox ML: detected
              Source: enigma_loader.exeString decryptor: 127.0.0.1,selection-wa.gl.at.ply.gg
              Source: enigma_loader.exeString decryptor: 64769
              Source: enigma_loader.exeString decryptor: <123456789>
              Source: enigma_loader.exeString decryptor: <Xwormmm>
              Source: enigma_loader.exeString decryptor: XWorm V5.6
              Source: enigma_loader.exeString decryptor: USB.exe
              Source: enigma_loader.exeString decryptor: %AppData%
              Source: enigma_loader.exeString decryptor: svchost.exe
              Source: enigma_loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: enigma_loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Xml.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: .pdbq source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb? source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\Desktop\enigma_loader.PDB source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb5 source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbv source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: 0C:\Windows\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbO source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3058768185.00000000012D0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3058768185.00000000012D0000.00000004.00000020.00020000.00000000.sdmp, enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp, enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp, WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Windows.Forms.pdbp source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Management.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: mscorlib.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdbSystem.Xml.dll` source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.pdbenigma_loader.exe source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: indoC:\Windows\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 147.185.221.23:64769 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 147.185.221.23:64769 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49730 -> 147.185.221.23:64769
              Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49730 -> 147.185.221.23:64769
              Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49730 -> 147.185.221.23:64769
              Source: Malware configuration extractorURLs: 127.0.0.1
              Source: Malware configuration extractorURLs: selection-wa.gl.at.ply.gg
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.185.221.23:64769
              Source: Joe Sandbox ViewIP Address: 147.185.221.23 147.185.221.23
              Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: selection-wa.gl.at.ply.gg
              Source: enigma_loader.exe, 00000000.00000002.3059612959.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net

              Operating System Destruction

              barindex
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: 01 00 00 00 Jump to behavior

              System Summary

              barindex
              Source: enigma_loader.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.enigma_loader.exe.d50000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F6FE60_2_00007FFD9B7F6FE6
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F9E390_2_00007FFD9B7F9E39
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F0F6D0_2_00007FFD9B7F0F6D
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F7D920_2_00007FFD9B7F7D92
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F12890_2_00007FFD9B7F1289
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F0F700_2_00007FFD9B7F0F70
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 1_2_00007FFD9B8012891_2_00007FFD9B801289
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD9B8012893_2_00007FFD9B801289
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 440 -p 7268 -ip 7268
              Source: enigma_loader.exe, 00000000.00000000.1652799704.0000000000D5C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename' vs enigma_loader.exe
              Source: enigma_loader.exeBinary or memory string: OriginalFilename' vs enigma_loader.exe
              Source: enigma_loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: enigma_loader.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.enigma_loader.exe.d50000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: enigma_loader.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: enigma_loader.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: enigma_loader.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: enigma_loader.exe, Settings.csBase64 encoded string: 'ZyutD39pvQ6wkLqkHb6LZMoKuTIox94EhvCZsMR9u0YfgkrgjMK/Dknzqeaaz3fh'
              Source: svchost.exe.0.dr, Settings.csBase64 encoded string: 'ZyutD39pvQ6wkLqkHb6LZMoKuTIox94EhvCZsMR9u0YfgkrgjMK/Dknzqeaaz3fh'
              Source: enigma_loader.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: enigma_loader.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: svchost.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: svchost.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.evad.winEXE@8/10@1/1
              Source: C:\Users\user\Desktop\enigma_loader.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMutant created: NULL
              Source: C:\Users\user\Desktop\enigma_loader.exeMutant created: \Sessions\1\BaseNamedObjects\E59Ydw781RvghOaK
              Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:344:120:WilError_03
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7268
              Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\bc730eb6-9708-4f8d-af68-0c82d8009e43Jump to behavior
              Source: enigma_loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: enigma_loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\enigma_loader.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: enigma_loader.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\Desktop\enigma_loader.exeFile read: C:\Users\user\Desktop\enigma_loader.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\enigma_loader.exe "C:\Users\user\Desktop\enigma_loader.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 440 -p 7268 -ip 7268
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7268 -s 1880
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 440 -p 7268 -ip 7268Jump to behavior
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7268 -s 1880Jump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
              Source: svchost.lnk.0.drLNK file: ..\..\..\..\..\svchost.exe
              Source: C:\Users\user\Desktop\enigma_loader.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: enigma_loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: enigma_loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Xml.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: .pdbq source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb? source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\Desktop\enigma_loader.PDB source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb5 source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbv source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: 0C:\Windows\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbO source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3058768185.00000000012D0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3058768185.00000000012D0000.00000004.00000020.00020000.00000000.sdmp, enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp, enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp, WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Windows.Forms.pdbp source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Management.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: mscorlib.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdbSystem.Xml.dll` source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.pdbenigma_loader.exe source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: indoC:\Windows\mscorlib.pdb source: enigma_loader.exe, 00000000.00000002.3061899008.000000001C0F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WER4E45.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WER4E45.tmp.dmp.9.dr

              Data Obfuscation

              barindex
              Source: enigma_loader.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: enigma_loader.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: svchost.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: svchost.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: enigma_loader.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: enigma_loader.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: enigma_loader.exe, Messages.cs.Net Code: Memory
              Source: svchost.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: svchost.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: svchost.exe.0.dr, Messages.cs.Net Code: Memory
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F1E9D push ebx; iretd 0_2_00007FFD9B7F1EAA
              Source: C:\Users\user\Desktop\enigma_loader.exeCode function: 0_2_00007FFD9B7F00AD pushad ; iretd 0_2_00007FFD9B7F00C1
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 1_2_00007FFD9B8000AD pushad ; iretd 1_2_00007FFD9B8000C1
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD9B8000AD pushad ; iretd 3_2_00007FFD9B8000C1

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\enigma_loader.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
              Source: C:\Users\user\Desktop\enigma_loader.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
              Source: C:\Users\user\Desktop\enigma_loader.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\enigma_loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\enigma_loader.exeMemory allocated: 1590000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeMemory allocated: 1B040000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1AD20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 5A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1A4A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeWindow / User API: threadDelayed 2905Jump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeWindow / User API: threadDelayed 6935Jump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exe TID: 7376Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 7488Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 7664Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: Amcache.hve.9.drBinary or memory string: VMware
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
              Source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW %SystemRoot%\system32\mswsock.dlllture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
              Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.9.drBinary or memory string: vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.9.drBinary or memory string: VMware20,1
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 440 -p 7268 -ip 7268Jump to behavior
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7268 -s 1880Jump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeQueries volume information: C:\Users\user\Desktop\enigma_loader.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\enigma_loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: enigma_loader.exe, 00000000.00000002.3061511160.000000001BF74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\enigma_loader.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: enigma_loader.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.enigma_loader.exe.d50000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.3059612959.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: enigma_loader.exe PID: 7268, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: enigma_loader.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.enigma_loader.exe.d50000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.3059612959.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: enigma_loader.exe PID: 7268, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              21
              Registry Run Keys / Startup Folder
              11
              Process Injection
              11
              Masquerading
              OS Credential Dumping231
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              21
              Registry Run Keys / Startup Folder
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              141
              Virtualization/Sandbox Evasion
              Security Account Manager141
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture11
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              enigma_loader.exe87%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
              enigma_loader.exe100%AviraHEUR/AGEN.1305769
              enigma_loader.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\svchost.exe100%AviraHEUR/AGEN.1305769
              C:\Users\user\AppData\Roaming\svchost.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\svchost.exe87%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              selection-wa.gl.at.ply.gg100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              selection-wa.gl.at.ply.gg
              147.185.221.23
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                selection-wa.gl.at.ply.ggtrue
                • Avira URL Cloud: malware
                unknown
                127.0.0.1false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.9.drfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameenigma_loader.exe, 00000000.00000002.3059612959.0000000003041000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      147.185.221.23
                      selection-wa.gl.at.ply.ggUnited States
                      12087SALSGIVERUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1561481
                      Start date and time:2024-11-23 14:30:22 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 45s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:10
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Critical Process Termination
                      Sample name:enigma_loader.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@8/10@1/1
                      EGA Information:
                      • Successful, ratio: 33.3%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 21
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target svchost.exe, PID 7464 because it is empty
                      • Execution Graph export aborted for target svchost.exe, PID 7644 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      • VT rate limit hit for: enigma_loader.exe
                      TimeTypeDescription
                      08:31:16API Interceptor5497992x Sleep call for process: enigma_loader.exe modified
                      13:31:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\Users\user\AppData\Roaming\svchost.exe
                      13:31:25AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\Users\user\AppData\Roaming\svchost.exe
                      13:31:34AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      147.185.221.23exe006.exeGet hashmaliciousSheetRatBrowse
                        yF21ypxRB7.exeGet hashmaliciousXWormBrowse
                          9GlCWW6bXc.exeGet hashmaliciousXWormBrowse
                            fiPZoO6xvJ.exeGet hashmaliciousXWormBrowse
                              EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                eternal.exeGet hashmaliciousXWormBrowse
                                  svchost.exeGet hashmaliciousUnknownBrowse
                                    msedge_visual_render.exeGet hashmaliciousXWormBrowse
                                      exe030.exeGet hashmaliciousXWormBrowse
                                        pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          SALSGIVERUSexe006.exeGet hashmaliciousSheetRatBrowse
                                          • 147.185.221.23
                                          exe003.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.22
                                          yF21ypxRB7.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.23
                                          OXhiMvksgM.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.22
                                          9GlCWW6bXc.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.23
                                          fiPZoO6xvJ.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.23
                                          EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                          • 147.185.221.23
                                          eternal.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.23
                                          svchost.exeGet hashmaliciousUnknownBrowse
                                          • 147.185.221.23
                                          msedge_visual_render.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.23
                                          No context
                                          No context
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.3255494721995904
                                          Encrypted:false
                                          SSDEEP:192:w4t8w6Wuv3081iHxaWz8iyg5lA1t2zuiFKZ24lO8/4y:w69uvE81iRa48idAOzuiFKY4lO8/l
                                          MD5:4507FE0F54BC5AA52DF00D7EAF221CD0
                                          SHA1:5EE73D73B6F433C81EDA2ECC228D8F0682CB462B
                                          SHA-256:BA81004DD3E1F062046B9E493425A5D477C3C56FCB4608ECD1C2A5BE6F463CAF
                                          SHA-512:D347281726FD4591BFE678DF2A3263020A73B468D8300B2E4BB3DAA724406B678262E8845231729AED89C19D7E65102F8680D5259C6C21EC096A3179806E55B9
                                          Malicious:false
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.r.i.t.i.c.a.l.P.r.o.c.e.s.s.F.a.u.l.t.2.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.4.2.4.1.1.3.2.2.5.3.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.5.b.b.a.2.a.-.f.6.0.0.-.4.b.8.1.-.a.0.a.7.-.5.9.7.5.f.2.4.b.1.b.5.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.4.2.7.8.f.f.3.-.e.9.c.7.-.4.c.4.a.-.9.3.8.b.-.b.9.3.1.c.c.8.c.b.b.1.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.e.n.i.g.m.a._.l.o.a.d.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.'...".+. ..... .........".....,...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.6.4.-.0.0.0.1.-.0.0.1.4.-.4.7.e.5.-.6.1.f.6.a.b.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.9.8.a.b.c.c.e.1.9.c.f.c.5.2.4.c.5.5.c.1.1.9.a.6.0.c.e.2.8.4.c.0.0.0.0.0.0.0.0.!.0.0.0.0.4.8.8.0.3.b.3.8.e.7.4.3.8.2.8.2.6.a.a.8.b.4.c.a.9.d.3.e.2.0.1.7.6.0.1.3.3.0.e.b.!.e.n.i.g.m.a._.l.o.a.d.e.r...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Mini DuMP crash report, 16 streams, Sat Nov 23 13:33:31 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):523859
                                          Entropy (8bit):3.11843367176594
                                          Encrypted:false
                                          SSDEEP:3072:/6lZa9kB3+vu+drTxkbO2ruuy64ObRmFxXH+cS4ygPB1CCqBc2a:/6lGkB3Qu+dpAruuy6vFwmU5qBC
                                          MD5:5AD865A76F64FE66CACD07207B4AE9A7
                                          SHA1:80DD1A27EB54A2AE64859C891BDE3C41E0F7AF85
                                          SHA-256:72269A2A175167D28B7EE6C00E0AB917A3BA6341D5A5C3FA317ACACBAB43B719
                                          SHA-512:86E54966ED25EF6A29E0B1C0DFBE06163D06451975BF9F07077CABAC1F58732DBD94B9DE9DF31FCC27A5F970A734DF141FF8BE586B4EA5D92230783A7115D0F5
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... .........Ag.........................#..$.......$...,-......$...P-......d9..............l.......8...........T............I.............t;..........`=..............................................................................eJ.......=......Lw......................T.......d.....Ag....2........................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):9340
                                          Entropy (8bit):3.7013386466840617
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJ9i96Y9yVV0gmfk4jX4t8Iprr89bXvXwbvrfMW9m:R6lXJ496Y4VWgmfkS4tYXvX0vrf6
                                          MD5:E6AFB2A930B7B567A322D9E7A0048E5A
                                          SHA1:D26A2F9068C5C4857296B0DE9FAEE0910362A150
                                          SHA-256:CDD41B62F6FA41E1946ABCE4AE07978DBA5F2F9C0384761CDF6196EE1AF35220
                                          SHA-512:1A97BB70107704E09E3193EC75C589D1A05C7C1F57BBDAA60FAE6C213BBF45B8BF43028498435FAF3AF3B7461F6037822EADD618B6437F52FE67AE249830B91A
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.6.8.<./.P.i.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4963
                                          Entropy (8bit):4.494688239637227
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zs+Jg771I9/0WpW8VYQyYm8M4JwSFMy4yq8vR7/4UrSsyd:uIjf0I70t7VpJwNWlxOsyd
                                          MD5:27A79A8D8BDAC40E3EF324F4D5DADAAE
                                          SHA1:61513577FA63D2375EF30F7A0D8629DE75C8D7FC
                                          SHA-256:3D77062AED40F24447B3EACAA82AC73675D0207F1C3E6975B6731237DCF424B7
                                          SHA-512:829077D3F645B7DCB6A98A3A0764697F9D982F2044574DDBD79B3D07F056E09EB7EA218D8B2FCAB8170A7E97BD045896B7421B752227507478672136A07351F7
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="600756" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):80988
                                          Entropy (8bit):3.109606105736042
                                          Encrypted:false
                                          SSDEEP:1536:kPj35oN+1+sEzZCOmh+Fe8d55j/FG6XdW9:kPj35oN+1+sEzZCOmh+Fe8d55zFG6Xdy
                                          MD5:55493B2B910FCC22F826E106146A1186
                                          SHA1:189C651F06C89B2B38E4B37CBA59BF5320D18EC8
                                          SHA-256:295FD6E30B414D61CD6DF20489C0187B8C5917C5EF93CE99C35D317E96C0C400
                                          SHA-512:519F7AB6F24C6C7F15983DA28297943326C9427D834FC7019F9B53292F802950C08A6470EA1D08CCDC9E88FB04C37E3320152F884E4F5F0C34F0E197F59CA1D2
                                          Malicious:false
                                          Reputation:low
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.6870056256649826
                                          Encrypted:false
                                          SSDEEP:96:TiZYW8zW02YTYKkWBibHxYEZfJtNiEIFDjwJ26QaWOiM+Z4IvwZ3:2ZDpEtuX/EaWOiM+ZfvM3
                                          MD5:9368DDB17C320932628FD1F050542BE8
                                          SHA1:53D26C1FFBA39EE1571DBDF1E7D9F24433A79780
                                          SHA-256:D220D0533C7B5971453696BEB353A3F5CB354DB956066D91252ACA856A7BF582
                                          SHA-512:77DE3D55C47746B72FA655909B9BE2C935883C2259A0B37030BCAF6A667D5AD8759C3C8B6E420F7702ECC83E654F56BB42871DD0D6B91DC8C34E8FC156147019
                                          Malicious:false
                                          Reputation:low
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Users\user\AppData\Roaming\svchost.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):654
                                          Entropy (8bit):5.380476433908377
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                          MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                          SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                          SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                          SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                          Process:C:\Users\user\Desktop\enigma_loader.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 12:31:16 2024, mtime=Sat Nov 23 12:31:16 2024, atime=Sat Nov 23 12:31:16 2024, length=35840, window=hide
                                          Category:dropped
                                          Size (bytes):764
                                          Entropy (8bit):5.035439340804292
                                          Encrypted:false
                                          SSDEEP:12:83Uk/7k/n24h8WC0rgdY//UyL2XNvu4jAsjrHkBLBmV:83ChHc+MM2X0cAsjIBLBm
                                          MD5:EE1A7D3AFFAC12AE4D0001A1B8AF460D
                                          SHA1:7AEF855D9BE90AA4FEB66DDE991520FC627CD7E3
                                          SHA-256:A6AF25811C1C488EA6725213ECB7A7739C1F0E41195A9518526BAF9D4232FE16
                                          SHA-512:16BF0C59E3A10D18A85D4E599BE4994F7B190C29B8286EA51759B71CA4376828C1D849EF43D02C002F67C624CB80B9C2AD57872F7AF9E43F17F6FF6637DE0016
                                          Malicious:false
                                          Preview:L..................F.... ....~...=...~...=...~...=..........................v.:..DG..Yr?.D..U..k0.&...&......vk.v....y~i.=.......=......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^wY.k...........................%..A.p.p.D.a.t.a...B.V.1.....wY.k..Roaming.@......CW.^wY.k..........................._.R.o.a.m.i.n.g.....b.2.....wY.k .svchost.exe.H......wY.kwY.k..............................s.v.c.h.o.s.t...e.x.e.......Y...............-.......X..............~.....C:\Users\user\AppData\Roaming\svchost.exe........\.....\.....\.....\.....\.s.v.c.h.o.s.t...e.x.e.`.......X.......284992...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                          Process:C:\Users\user\Desktop\enigma_loader.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):35840
                                          Entropy (8bit):5.6012158815462545
                                          Encrypted:false
                                          SSDEEP:384:ySBqVEqKykkTwusE+E33Rz3UXmbXLZoWRy7vHsJQcXTSc58pkFyHBLTIZwgG+Vv8:VQDb3QIX/hGcVFy79e6GOjhvy4Bt
                                          MD5:262215BCD5FBA074E3F2DD216663F727
                                          SHA1:48803B38E74382826AA8B4CA9D3E2017601330EB
                                          SHA-256:A0B52D44E5CE4FD05068101A2A7FE64B533BE9BACC774942234CBDD23B12D150
                                          SHA-512:DABC803AB7BABE6B6FBAE7A9B6E9E192B27C7D9ACB5D55CB990509CA2ED5800821CEB221FFC1A26CE77F21C29B8D7766D19218FCEA4A1F4054397E628E1764E8
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 87%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k.@g................................. ........@.. ....................................@....................................K.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......0S...M............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.465702123831318
                                          Encrypted:false
                                          SSDEEP:6144:xIXfpi67eLPU9skLmb0b44WSPKaJG8nAgejZMMhA2gX4WABl0uN5dwBCswSbZ:SXD944WlLZMM6YFHb+Z
                                          MD5:81B88D88EB95B75691805BB843F0C468
                                          SHA1:5C51F988E438ED5A610B625F162E7C45639EC8FF
                                          SHA-256:2F65D37C3CF3895E291AB4A9486908E40191986EE65EC689331F197E6EF29487
                                          SHA-512:CA60328A8CB3CE3EEFBD1F4E149DC845C1B73B0EAE9EC174DA6689F7D8AB75AD1664D5E0C27B81C707657178BE354784D06BB5B98C82E508FB1E4933559E3BB6
                                          Malicious:false
                                          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..YI.=...............................................................................................................................................................................................................................................................................................................................................zN}........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):5.6012158815462545
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:enigma_loader.exe
                                          File size:35'840 bytes
                                          MD5:262215bcd5fba074e3f2dd216663f727
                                          SHA1:48803b38e74382826aa8b4ca9d3e2017601330eb
                                          SHA256:a0b52d44e5ce4fd05068101a2a7fe64b533be9bacc774942234cbdd23b12d150
                                          SHA512:dabc803ab7babe6b6fbae7a9b6e9e192b27c7d9acb5d55cb990509ca2ed5800821ceb221ffc1a26ce77f21c29b8d7766d19218fcea4a1f4054397e628e1764e8
                                          SSDEEP:384:ySBqVEqKykkTwusE+E33Rz3UXmbXLZoWRy7vHsJQcXTSc58pkFyHBLTIZwgG+Vv8:VQDb3QIX/hGcVFy79e6GOjhvy4Bt
                                          TLSH:80F24B08B3900756D6ED6FB56EB3A1420679FA078913EB5E0CD4849B7F337C18A123E6
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k.@g................................. ........@.. ....................................@................................
                                          Icon Hash:90cececece8e8eb0
                                          Entrypoint:0x40a12e
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6740E26B [Fri Nov 22 19:58:35 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa0e00x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x500.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x81340x82004d5d1fce4af35d602822054fcfb1ead7False0.4982872596153846data5.735314685854522IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xc0000x5000x600331abcd5e502089714ca8eff24912c6bFalse0.3893229166666667data3.932150987433378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xe0000xc0x2006ec9a61f3ba2211c329706c20b53f907False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0xc0a00x26cdata0.47580645161290325
                                          RT_MANIFEST0xc3100x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-11-23T14:31:26.215138+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:31:26.215138+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:31:32.708522+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:31:33.341346+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:31:33.343099+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:31:47.555949+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:31:47.557720+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:31:56.223589+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:31:56.223589+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:01.774279+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:01.777125+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:15.996776+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:16.000422+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:22.799231+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:22.863645+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:26.222991+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:26.222991+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:32.774900+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:32.777946+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:33.086808+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:33.088656+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:33.391147+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:33.703067+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:36.699680+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:37.215754+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:37.221099+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:37.526454+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:37.532883+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:43.305303+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:43.306878+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:43.620016+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:43.622906+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:44.653952+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:44.656683+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:45.653721+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:45.656449+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:48.821136+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:48.824507+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:49.132021+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:49.140499+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:49.454718+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:49.456622+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:51.367562+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:51.372590+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:51.678461+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:51.680412+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:56.213226+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:56.213226+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:59.674253+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:59.685580+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:32:59.984447+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:32:59.986287+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:05.228480+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:05.230932+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:05.539012+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:05.557175+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:05.852647+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:06.159975+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:06.161321+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:09.416188+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:09.505789+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:15.759717+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:16.039955+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:26.238242+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:26.238242+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:27.354918+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:27.359678+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:27.666554+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:27.671384+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:28.969465+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:28.987717+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          2024-11-23T14:33:29.279560+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2364769192.168.2.449730TCP
                                          2024-11-23T14:33:29.287722+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449730147.185.221.2364769TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 23, 2024 14:31:18.185638905 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:18.306057930 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:18.306184053 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:18.488655090 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:18.609757900 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:26.215137959 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:26.266459942 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:32.708522081 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:32.828713894 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:33.341346025 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:33.343099117 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:33.464010954 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:46.923078060 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:47.043400049 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:47.555948973 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:47.557719946 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:31:47.677710056 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:56.223588943 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:31:56.266558886 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:01.141849041 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:01.261753082 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:01.774279118 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:01.777124882 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:01.896859884 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:15.360831022 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:15.482292891 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:15.996776104 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:16.000422001 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:16.120162010 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:22.063967943 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:22.183727026 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:22.799231052 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:22.844762087 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:22.863645077 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:22.983331919 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:26.222990990 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:26.285902977 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:32.142007113 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:32.261955976 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:32.262013912 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:32.381638050 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:32.381696939 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:32.501449108 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:32.501524925 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:32.621653080 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:32.774899960 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:32.777945995 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:32.897542953 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.086807966 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.088655949 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:33.208250999 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.389233112 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.391146898 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:33.511450052 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.513679028 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:33.634553909 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.699222088 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.703067064 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:33.823930025 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:33.824172974 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:33.943820000 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:36.579807043 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:36.699611902 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:36.699680090 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:36.824090958 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:37.215754032 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:37.221098900 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:37.340938091 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:37.526453972 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:37.532882929 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:37.652522087 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:42.673289061 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:42.792861938 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:42.792918921 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:42.912476063 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:43.305303097 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:43.306878090 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:43.426636934 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:43.620016098 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:43.622905970 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:43.742767096 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:43.742882013 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:43.867902994 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:44.653951883 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:44.656682968 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:44.776853085 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:44.860802889 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:44.980566025 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:45.653721094 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:45.656449080 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:45.779002905 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:48.188816071 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:48.308489084 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:48.308553934 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:48.430927038 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:48.821135998 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:48.824506998 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:48.944279909 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:49.132020950 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:49.140499115 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:49.260293007 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:49.454718113 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:49.456621885 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:49.576380014 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:50.735707045 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:50.855493069 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:50.923141003 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:51.045681953 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:51.367562056 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:51.372590065 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:51.492613077 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:51.678461075 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:51.680412054 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:51.800117970 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:56.213226080 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:56.312988997 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:59.032571077 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:59.152441025 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:59.152539968 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:59.272972107 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:59.674252987 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:59.685580015 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:32:59.807502985 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:59.984447002 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:32:59.986287117 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:00.105969906 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:04.548702002 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:04.669701099 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:04.669764042 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:04.790132046 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:04.790199041 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:04.909859896 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:04.911715031 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:05.031779051 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.228480101 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.230931997 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:05.351522923 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.539011955 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.557174921 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:05.678400040 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.850704908 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.852647066 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:05.972240925 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:05.972296953 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:06.092312098 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:06.159975052 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:06.161320925 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:06.283874035 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:08.782706976 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:08.903393984 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:09.416188002 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:09.505789042 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:09.625682116 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:15.127681971 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:15.247559071 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:15.759716988 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:15.846812010 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:16.039954901 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:16.159852028 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:26.238241911 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:26.360532999 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:26.720244884 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:26.841856003 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:26.841912985 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:26.962660074 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:27.354918003 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:27.359678030 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:27.479146004 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:27.666553974 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:27.671384096 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:27.790929079 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:28.329900026 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:28.450639963 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:28.450700998 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:28.570354939 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:28.969465017 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:28.987716913 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:29.107867956 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:29.279560089 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:29.287722111 CET4973064769192.168.2.4147.185.221.23
                                          Nov 23, 2024 14:33:29.408399105 CET6476949730147.185.221.23192.168.2.4
                                          Nov 23, 2024 14:33:33.844039917 CET4973064769192.168.2.4147.185.221.23
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 23, 2024 14:31:17.763812065 CET5833053192.168.2.41.1.1.1
                                          Nov 23, 2024 14:31:17.999507904 CET53583301.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Nov 23, 2024 14:31:17.763812065 CET192.168.2.41.1.1.10x332fStandard query (0)selection-wa.gl.at.ply.ggA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Nov 23, 2024 14:31:17.999507904 CET1.1.1.1192.168.2.40x332fNo error (0)selection-wa.gl.at.ply.gg147.185.221.23A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:08:31:11
                                          Start date:23/11/2024
                                          Path:C:\Users\user\Desktop\enigma_loader.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\enigma_loader.exe"
                                          Imagebase:0xd50000
                                          File size:35'840 bytes
                                          MD5 hash:262215BCD5FBA074E3F2DD216663F727
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1652786241.0000000000D52000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3059612959.0000000003041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:08:31:25
                                          Start date:23/11/2024
                                          Path:C:\Users\user\AppData\Roaming\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                          Imagebase:0x960000
                                          File size:35'840 bytes
                                          MD5 hash:262215BCD5FBA074E3F2DD216663F727
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 87%, ReversingLabs
                                          Reputation:low
                                          Has exited:true

                                          Target ID:3
                                          Start time:08:31:34
                                          Start date:23/11/2024
                                          Path:C:\Users\user\AppData\Roaming\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                          Imagebase:0x80000
                                          File size:35'840 bytes
                                          MD5 hash:262215BCD5FBA074E3F2DD216663F727
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:7
                                          Start time:08:33:30
                                          Start date:23/11/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:8
                                          Start time:08:33:31
                                          Start date:23/11/2024
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -pss -s 440 -p 7268 -ip 7268
                                          Imagebase:0x7ff75c3d0000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:08:33:31
                                          Start date:23/11/2024
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 7268 -s 1880
                                          Imagebase:0x7ff75c3d0000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:19.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:3
                                            Total number of Limit Nodes:0
                                            execution_graph 4295 7ffd9b7f23bd 4296 7ffd9b7f2420 RtlSetProcessIsCritical 4295->4296 4298 7ffd9b7f24a2 4296->4298

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ffd9b7f9e39-7ffd9b7f9e73 1 7ffd9b7f9e75-7ffd9b7f9e80 call 7ffd9b7f05d0 0->1 2 7ffd9b7f9ebd-7ffd9b7f9ec5 0->2 6 7ffd9b7f9e85-7ffd9b7f9ebc 1->6 3 7ffd9b7f9f3b 2->3 4 7ffd9b7f9ec7-7ffd9b7f9ee4 2->4 7 7ffd9b7f9f40-7ffd9b7f9f55 3->7 4->7 9 7ffd9b7f9ee6-7ffd9b7f9f36 call 7ffd9b7f9360 4->9 6->2 12 7ffd9b7f9f57-7ffd9b7f9f6e call 7ffd9b7f0800 call 7ffd9b7f05e0 7->12 13 7ffd9b7f9f73-7ffd9b7f9f88 7->13 36 7ffd9b7fab04-7ffd9b7fab12 9->36 12->36 22 7ffd9b7f9f8a-7ffd9b7f9fbb call 7ffd9b7f0800 13->22 23 7ffd9b7f9fc0-7ffd9b7f9fd5 13->23 22->36 31 7ffd9b7f9fe8-7ffd9b7f9ffd 23->31 32 7ffd9b7f9fd7-7ffd9b7f9fe3 call 7ffd9b7f5d18 23->32 40 7ffd9b7fa043-7ffd9b7fa058 31->40 41 7ffd9b7f9fff-7ffd9b7fa002 31->41 32->36 47 7ffd9b7fa05a-7ffd9b7fa05d 40->47 48 7ffd9b7fa099-7ffd9b7fa0ae 40->48 41->3 43 7ffd9b7fa008-7ffd9b7fa013 41->43 43->3 44 7ffd9b7fa019-7ffd9b7fa03e call 7ffd9b7f05b8 call 7ffd9b7f5d18 43->44 44->36 47->3 50 7ffd9b7fa063-7ffd9b7fa06e 47->50 55 7ffd9b7fa0db-7ffd9b7fa0f0 48->55 56 7ffd9b7fa0b0-7ffd9b7fa0b3 48->56 50->3 53 7ffd9b7fa074-7ffd9b7fa094 call 7ffd9b7f05b8 call 7ffd9b7f0fb8 50->53 53->36 64 7ffd9b7fa1dc-7ffd9b7fa1f1 55->64 65 7ffd9b7fa0f6-7ffd9b7fa13c 55->65 56->3 59 7ffd9b7fa0b9-7ffd9b7fa0d6 call 7ffd9b7f05b8 call 7ffd9b7f0fc0 56->59 59->36 73 7ffd9b7fa1f3-7ffd9b7fa1f6 64->73 74 7ffd9b7fa210-7ffd9b7fa225 64->74 99 7ffd9b7fa13d-7ffd9b7fa156 call 7ffd9b7f0540 65->99 73->3 78 7ffd9b7fa1fc-7ffd9b7fa20b call 7ffd9b7f0f98 73->78 81 7ffd9b7fa247-7ffd9b7fa25c 74->81 82 7ffd9b7fa227-7ffd9b7fa22a 74->82 78->36 90 7ffd9b7fa27c-7ffd9b7fa291 81->90 91 7ffd9b7fa25e-7ffd9b7fa277 81->91 82->3 85 7ffd9b7fa230-7ffd9b7fa242 call 7ffd9b7f0f98 82->85 85->36 96 7ffd9b7fa293-7ffd9b7fa2ac 90->96 97 7ffd9b7fa2b1-7ffd9b7fa2c6 90->97 91->36 96->36 103 7ffd9b7fa2c8-7ffd9b7fa2e1 97->103 104 7ffd9b7fa2e6-7ffd9b7fa2fb 97->104 99->3 106 7ffd9b7fa15c-7ffd9b7fa194 call 7ffd9b7f5d28 99->106 103->36 109 7ffd9b7fa324-7ffd9b7fa339 104->109 110 7ffd9b7fa2fd-7ffd9b7fa300 104->110 106->3 126 7ffd9b7fa19a-7ffd9b7fa1b8 call 7ffd9b7f5d38 106->126 114 7ffd9b7fa3d9-7ffd9b7fa3ee 109->114 115 7ffd9b7fa33f-7ffd9b7fa3b7 109->115 110->3 112 7ffd9b7fa306-7ffd9b7fa31f 110->112 112->36 122 7ffd9b7fa406-7ffd9b7fa41b 114->122 123 7ffd9b7fa3f0-7ffd9b7fa401 114->123 115->3 152 7ffd9b7fa3bd-7ffd9b7fa3d4 115->152 132 7ffd9b7fa4bb-7ffd9b7fa4d0 122->132 133 7ffd9b7fa421-7ffd9b7fa499 122->133 123->36 126->99 137 7ffd9b7fa1ba-7ffd9b7fa1d7 126->137 141 7ffd9b7fa4e8-7ffd9b7fa4fd 132->141 142 7ffd9b7fa4d2-7ffd9b7fa4e3 132->142 133->3 167 7ffd9b7fa49f-7ffd9b7fa4b6 133->167 137->36 149 7ffd9b7fa52f-7ffd9b7fa544 141->149 150 7ffd9b7fa4ff-7ffd9b7fa52a call 7ffd9b7f0ab0 call 7ffd9b7f9360 141->150 142->36 160 7ffd9b7fa54a-7ffd9b7fa61c call 7ffd9b7f0ab0 call 7ffd9b7f9360 149->160 161 7ffd9b7fa621-7ffd9b7fa636 149->161 150->36 152->36 160->36 169 7ffd9b7fa63c-7ffd9b7fa63f 161->169 170 7ffd9b7fa6fd-7ffd9b7fa712 161->170 167->36 171 7ffd9b7fa645-7ffd9b7fa650 169->171 172 7ffd9b7fa6f2-7ffd9b7fa6f7 169->172 179 7ffd9b7fa726-7ffd9b7fa73b 170->179 180 7ffd9b7fa714-7ffd9b7fa721 call 7ffd9b7f9360 170->180 171->172 176 7ffd9b7fa656-7ffd9b7fa6f0 call 7ffd9b7f0ab0 call 7ffd9b7f9360 171->176 182 7ffd9b7fa6f8 172->182 176->182 188 7ffd9b7fa7b2-7ffd9b7fa7c7 179->188 189 7ffd9b7fa73d-7ffd9b7fa74e 179->189 180->36 182->36 197 7ffd9b7fa7c9-7ffd9b7fa7cc 188->197 198 7ffd9b7fa807-7ffd9b7fa81c 188->198 189->3 195 7ffd9b7fa754-7ffd9b7fa764 call 7ffd9b7f05b0 189->195 208 7ffd9b7fa766-7ffd9b7fa78b call 7ffd9b7f9360 195->208 209 7ffd9b7fa790-7ffd9b7fa7ad call 7ffd9b7f05b0 call 7ffd9b7f05b8 call 7ffd9b7f0f70 195->209 197->3 201 7ffd9b7fa7d2-7ffd9b7fa802 call 7ffd9b7f05a8 call 7ffd9b7f05b8 call 7ffd9b7f0f70 197->201 206 7ffd9b7fa862-7ffd9b7fa877 198->206 207 7ffd9b7fa81e-7ffd9b7fa85d call 7ffd9b7f2030 call 7ffd9b7f2fa0 call 7ffd9b7f0f78 198->207 201->36 226 7ffd9b7fa88b-7ffd9b7fa8a0 206->226 227 7ffd9b7fa879-7ffd9b7fa886 call 7ffd9b7f0f80 206->227 207->36 208->36 209->36 226->36 242 7ffd9b7fa8a6-7ffd9b7fa8ad 226->242 227->36 246 7ffd9b7fa8c0-7ffd9b7fa9da call 7ffd9b7f5d58 call 7ffd9b7f5d68 call 7ffd9b7f5d78 call 7ffd9b7f5d88 call 7ffd9b7f2ca0 call 7ffd9b7f5d98 call 7ffd9b7f5d68 call 7ffd9b7f5d78 242->246 247 7ffd9b7fa8af-7ffd9b7fa8b9 call 7ffd9b7f5d48 242->247 284 7ffd9b7fa9dc-7ffd9b7fa9e0 246->284 285 7ffd9b7faa4b-7ffd9b7faa5a 246->285 247->246 286 7ffd9b7fa9e2-7ffd9b7faa41 call 7ffd9b7f5da8 call 7ffd9b7f5db8 284->286 287 7ffd9b7faa61-7ffd9b7fab03 call 7ffd9b7f0ab0 call 7ffd9b7f05c0 call 7ffd9b7f9360 284->287 285->287 286->285 287->36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID: 0-3916222277
                                            • Opcode ID: e76ed3b862653a2d30eb568a3156166e26658ad150b20618e5fc50d1fdfeff79
                                            • Instruction ID: 3dc83253123bff008b694d451a8623f1881d39c7b780983cae0786ea902605e1
                                            • Opcode Fuzzy Hash: e76ed3b862653a2d30eb568a3156166e26658ad150b20618e5fc50d1fdfeff79
                                            • Instruction Fuzzy Hash: CB828730F1D60E4BEB64FB688465A7977E2EF98304F514679D01DC32E6DE2CE9028785

                                            Control-flow Graph

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: SAM_^
                                            • API String ID: 0-3658645246
                                            • Opcode ID: a15127fdbc1dad667ff57303ed09189db06be69d8cb6e087bdd86f4c477287b3
                                            • Instruction ID: c012502356d2cc0b058439d3c22f1909369a5d1e198dc088e1677c3ef01fea1f
                                            • Opcode Fuzzy Hash: a15127fdbc1dad667ff57303ed09189db06be69d8cb6e087bdd86f4c477287b3
                                            • Instruction Fuzzy Hash: B2028630B19B4D4FE7A8FB7888696B977D1FF98304F4145B9E04DC32E6DE28A9418781

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 558 7ffd9b7f6fe6-7ffd9b7f6ff3 559 7ffd9b7f6ff5-7ffd9b7f6ffd 558->559 560 7ffd9b7f6ffe-7ffd9b7f70c7 558->560 559->560 563 7ffd9b7f70c9-7ffd9b7f70d2 560->563 564 7ffd9b7f7133 560->564 563->564 565 7ffd9b7f70d4-7ffd9b7f70e0 563->565 566 7ffd9b7f7135-7ffd9b7f715a 564->566 567 7ffd9b7f7119-7ffd9b7f7131 565->567 568 7ffd9b7f70e2-7ffd9b7f70f4 565->568 572 7ffd9b7f715c-7ffd9b7f7165 566->572 573 7ffd9b7f71c6 566->573 567->566 569 7ffd9b7f70f8-7ffd9b7f710b 568->569 570 7ffd9b7f70f6 568->570 569->569 574 7ffd9b7f710d-7ffd9b7f7115 569->574 570->569 572->573 575 7ffd9b7f7167-7ffd9b7f7173 572->575 576 7ffd9b7f71c8-7ffd9b7f7270 573->576 574->567 577 7ffd9b7f71ac-7ffd9b7f71c4 575->577 578 7ffd9b7f7175-7ffd9b7f7187 575->578 587 7ffd9b7f7272-7ffd9b7f727c 576->587 588 7ffd9b7f72de 576->588 577->576 579 7ffd9b7f718b-7ffd9b7f719e 578->579 580 7ffd9b7f7189 578->580 579->579 582 7ffd9b7f71a0-7ffd9b7f71a8 579->582 580->579 582->577 587->588 589 7ffd9b7f727e-7ffd9b7f728b 587->589 590 7ffd9b7f72e0-7ffd9b7f7309 588->590 591 7ffd9b7f72c4-7ffd9b7f72dc 589->591 592 7ffd9b7f728d-7ffd9b7f729f 589->592 597 7ffd9b7f730b-7ffd9b7f7316 590->597 598 7ffd9b7f7373 590->598 591->590 593 7ffd9b7f72a3-7ffd9b7f72b6 592->593 594 7ffd9b7f72a1 592->594 593->593 596 7ffd9b7f72b8-7ffd9b7f72c0 593->596 594->593 596->591 597->598 600 7ffd9b7f7318-7ffd9b7f7326 597->600 599 7ffd9b7f7375-7ffd9b7f7406 598->599 608 7ffd9b7f740c-7ffd9b7f741b 599->608 601 7ffd9b7f7328-7ffd9b7f733a 600->601 602 7ffd9b7f735f-7ffd9b7f7371 600->602 604 7ffd9b7f733c 601->604 605 7ffd9b7f733e-7ffd9b7f7351 601->605 602->599 604->605 605->605 606 7ffd9b7f7353-7ffd9b7f735b 605->606 606->602 609 7ffd9b7f7423-7ffd9b7f7488 call 7ffd9b7f74a4 608->609 610 7ffd9b7f741d 608->610 617 7ffd9b7f748a 609->617 618 7ffd9b7f748f-7ffd9b7f74a3 609->618 610->609 617->618
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3e4a080af4faa479805546441bd5b7be91f480cecbb116464f06d004d282b09
                                            • Instruction ID: d3ac46830bb520d50090d9fd9d3e64e0dd29ce037e4621d7de0fabf49064ed24
                                            • Opcode Fuzzy Hash: b3e4a080af4faa479805546441bd5b7be91f480cecbb116464f06d004d282b09
                                            • Instruction Fuzzy Hash: 3CF19730A09A8D4FEBA8DF28C855BE93BE1FF54310F14426EE85DC72A5CB3499458B81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 619 7ffd9b7f7d92-7ffd9b7f7d9f 620 7ffd9b7f7daa-7ffd9b7f7e77 619->620 621 7ffd9b7f7da1-7ffd9b7f7da9 619->621 624 7ffd9b7f7e79-7ffd9b7f7e82 620->624 625 7ffd9b7f7ee3 620->625 621->620 624->625 627 7ffd9b7f7e84-7ffd9b7f7e90 624->627 626 7ffd9b7f7ee5-7ffd9b7f7f0a 625->626 633 7ffd9b7f7f0c-7ffd9b7f7f15 626->633 634 7ffd9b7f7f76 626->634 628 7ffd9b7f7ec9-7ffd9b7f7ee1 627->628 629 7ffd9b7f7e92-7ffd9b7f7ea4 627->629 628->626 631 7ffd9b7f7ea8-7ffd9b7f7ebb 629->631 632 7ffd9b7f7ea6 629->632 631->631 635 7ffd9b7f7ebd-7ffd9b7f7ec5 631->635 632->631 633->634 636 7ffd9b7f7f17-7ffd9b7f7f23 633->636 637 7ffd9b7f7f78-7ffd9b7f7f9d 634->637 635->628 638 7ffd9b7f7f5c-7ffd9b7f7f74 636->638 639 7ffd9b7f7f25-7ffd9b7f7f37 636->639 643 7ffd9b7f800b 637->643 644 7ffd9b7f7f9f-7ffd9b7f7fa9 637->644 638->637 640 7ffd9b7f7f3b-7ffd9b7f7f4e 639->640 641 7ffd9b7f7f39 639->641 640->640 645 7ffd9b7f7f50-7ffd9b7f7f58 640->645 641->640 647 7ffd9b7f800d-7ffd9b7f803b 643->647 644->643 646 7ffd9b7f7fab-7ffd9b7f7fb8 644->646 645->638 648 7ffd9b7f7fba-7ffd9b7f7fcc 646->648 649 7ffd9b7f7ff1-7ffd9b7f8009 646->649 654 7ffd9b7f80ab 647->654 655 7ffd9b7f803d-7ffd9b7f8048 647->655 650 7ffd9b7f7fd0-7ffd9b7f7fe3 648->650 651 7ffd9b7f7fce 648->651 649->647 650->650 653 7ffd9b7f7fe5-7ffd9b7f7fed 650->653 651->650 653->649 656 7ffd9b7f80ad-7ffd9b7f8185 654->656 655->654 657 7ffd9b7f804a-7ffd9b7f8058 655->657 667 7ffd9b7f818b-7ffd9b7f819a 656->667 658 7ffd9b7f805a-7ffd9b7f806c 657->658 659 7ffd9b7f8091-7ffd9b7f80a9 657->659 661 7ffd9b7f8070-7ffd9b7f8083 658->661 662 7ffd9b7f806e 658->662 659->656 661->661 663 7ffd9b7f8085-7ffd9b7f808d 661->663 662->661 663->659 668 7ffd9b7f819c 667->668 669 7ffd9b7f81a2-7ffd9b7f8204 call 7ffd9b7f8220 667->669 668->669 676 7ffd9b7f820b-7ffd9b7f821f 669->676 677 7ffd9b7f8206 669->677 677->676
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f947691fbc91ea551251192c7da527fa7225d27285b2d0a149eccacacaff212f
                                            • Instruction ID: 4476ff4493a61bf660cae43928dae69bde4f2d29a07fe377ba5553ce4f56d294
                                            • Opcode Fuzzy Hash: f947691fbc91ea551251192c7da527fa7225d27285b2d0a149eccacacaff212f
                                            • Instruction Fuzzy Hash: 30E1A330A09A4D8FEBA8DF28C8657E97BD1EF54310F14436ED84DC72A5CE74A94187C2

                                            Control-flow Graph

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 60f8443612696ab750d8456f794e2db566f532b5274e4562577ecaf43158bedc
                                            • Instruction ID: 672562672269fb3087d35478ab9643e48d4fe761eed4ffb8aef15e735896f18f
                                            • Opcode Fuzzy Hash: 60f8443612696ab750d8456f794e2db566f532b5274e4562577ecaf43158bedc
                                            • Instruction Fuzzy Hash: 2791F963F0E6DE4EEB159BA898764E93F70EF91254F0702B7C0949B1B3DD1839068794

                                            Control-flow Graph

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aedf4e0fd85958f9d0f1e41ca0c5067f21e8c12b349cdbacc6ed2c33b9fe1e51
                                            • Instruction ID: 13cbdc21216b61cd68a92356cfe6482e0dc1c63ba460c0f61af21dcf41df4f1e
                                            • Opcode Fuzzy Hash: aedf4e0fd85958f9d0f1e41ca0c5067f21e8c12b349cdbacc6ed2c33b9fe1e51
                                            • Instruction Fuzzy Hash: 9A81D863F0F6DE4EEB159B6898724E93F70EF51654F0602B7C0949B1B3ED1839068794

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 445 7ffd9b7f23bd-7ffd9b7f24a0 RtlSetProcessIsCritical 448 7ffd9b7f24a8-7ffd9b7f24dd 445->448 449 7ffd9b7f24a2 445->449 449->448
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3062675273.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd9b7f0000_enigma_loader.jbxd
                                            Similarity
                                            • API ID: CriticalProcess
                                            • String ID:
                                            • API String ID: 2695349919-0
                                            • Opcode ID: 9d9e3cc38652b67ebdb85cabd10c7767f7b30d1053bbd18f062038d4bee5a391
                                            • Instruction ID: bf07f04cab9ce0a130f5cad12fe217791eb0b70e740625ace94ed369ec129c31
                                            • Opcode Fuzzy Hash: 9d9e3cc38652b67ebdb85cabd10c7767f7b30d1053bbd18f062038d4bee5a391
                                            • Instruction Fuzzy Hash: 0C41143190C6588FC719DF98C855BE9BBF0FF96311F04416EE09AC3592CB74A842CB91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b21129af9f07e6ab21a8e6d315b4f94dad455bf8ca76cf49ec5f81967df832f8
                                            • Instruction ID: 20ae90dcff501a3a0d25c3dd3d9a1713d58d4f9274b89027eea2ce2a440ca0b4
                                            • Opcode Fuzzy Hash: b21129af9f07e6ab21a8e6d315b4f94dad455bf8ca76cf49ec5f81967df832f8
                                            • Instruction Fuzzy Hash: 2102B570B29A4D4BE798FF788469AB977D2FF9D344F410579E04EC32D6DE28A8018741
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 31b21dc17c7bdb3e2a2abea133de522bb17673306fc7f76ae42cd038d4cacc73
                                            • Instruction ID: 546d5fa907a1d30244e6db7579be47ce04801029dc2022c3880a13fe57c7dba4
                                            • Opcode Fuzzy Hash: 31b21dc17c7bdb3e2a2abea133de522bb17673306fc7f76ae42cd038d4cacc73
                                            • Instruction Fuzzy Hash: 2A815522F1DA8E0FE755EB7C98665F97BA1EF8A214B4501FBD489C72E7CD1868028341
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 61c7c609389d94de05e1e3e0c14d1e551b4f975fd1a989032e4bb4b200f97d66
                                            • Instruction ID: ca094791ad631ee77847461f8caf4b39d0dd5bc5f0aa665d3291af2895845ab5
                                            • Opcode Fuzzy Hash: 61c7c609389d94de05e1e3e0c14d1e551b4f975fd1a989032e4bb4b200f97d66
                                            • Instruction Fuzzy Hash: 15510E10B1E6C90FD79AAB7848746B5ABD1DF9B269B0804FAE0CDC72E7DD185802C342
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d25d3ec01bd97dff28ad16a7fa078bb567f53c799e8f916d8ebc001552a8803b
                                            • Instruction ID: b8d651068a5a90400e41e29216ca93cc9923257defbf6a4d065216991948495d
                                            • Opcode Fuzzy Hash: d25d3ec01bd97dff28ad16a7fa078bb567f53c799e8f916d8ebc001552a8803b
                                            • Instruction Fuzzy Hash: 3A31C221B1C9490FEB98AF2C98696B9A6C2EF9D355F0505BAF04EC32E7DD64AC418341
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 56ada99f06703a802e8df6663f33d7fa3fc00dfb018aea1a193e995d16299dbd
                                            • Instruction ID: 247b75ade20bb6cc45217749634801edda30a79ea58681063a58bc0821bacc2b
                                            • Opcode Fuzzy Hash: 56ada99f06703a802e8df6663f33d7fa3fc00dfb018aea1a193e995d16299dbd
                                            • Instruction Fuzzy Hash: 0531C521F2894D0FE788BBAC58696BD77D2EF98745F4542B6E05CC32D7DE2869018382
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ddb55b72a23da4f5161e2a5ada381c921067d7fb98bfc7ac5d723703059bbc0
                                            • Instruction ID: 28bdbd1ab895c9de06742aaeb9aea4f17e2abddb23fb81d708c437d38fbc1b64
                                            • Opcode Fuzzy Hash: 0ddb55b72a23da4f5161e2a5ada381c921067d7fb98bfc7ac5d723703059bbc0
                                            • Instruction Fuzzy Hash: A141B134B19A4E8FDB48EBA8C465AED7BB1EF98304F9105B9D019D33D6CE386901C751
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1825141965.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 98229c5e8553b2e2acb3b480396abaa200a55bfcd87bfca3b5e91586de4ff3a7
                                            • Instruction ID: 18f1022e043b4ee8f5e8e9672970da663e24671a55d88d46384f9c065bd983bb
                                            • Opcode Fuzzy Hash: 98229c5e8553b2e2acb3b480396abaa200a55bfcd87bfca3b5e91586de4ff3a7
                                            • Instruction Fuzzy Hash: 6B017611A0D6890FE755A73C68758B17FE08F9A6A4B4905FAF8C8C72E7E9085A40C392
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a49bface19ce87dd1668ef966119b0a448a0ba3156572ed4c09fab006ca01455
                                            • Instruction ID: 29d028878e7db6b9e5e3bac1abd39decce850582f1b83d347972cc7018869b50
                                            • Opcode Fuzzy Hash: a49bface19ce87dd1668ef966119b0a448a0ba3156572ed4c09fab006ca01455
                                            • Instruction Fuzzy Hash: DD02B670B29A4D4FE7A8FB7884696B976D2FF9D340F410579E04EC32D6DE28A8018781
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a9ade6cb5ba0d2043ae6ff264c2d3913c2c9d342d77044bc0bdaff5848a4729
                                            • Instruction ID: 95eb488482991a0e8e58b99cbfbd931a5fb4b6c8884bb2a842e84e8daedce144
                                            • Opcode Fuzzy Hash: 0a9ade6cb5ba0d2043ae6ff264c2d3913c2c9d342d77044bc0bdaff5848a4729
                                            • Instruction Fuzzy Hash: 96815622F1DA8E0FE755EB7C98665F97BA1EF8A210B4501FBD489C71E7DD1868028381
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4161f0b6ccfe428f592d5f45e3ddbf64b27e68d052640ae8c22f4e1eef7c0f8c
                                            • Instruction ID: 1a28a2c4bb7daf1e85b3514591a5b4b25abdc2f5373449a11c11f913bc53e5ab
                                            • Opcode Fuzzy Hash: 4161f0b6ccfe428f592d5f45e3ddbf64b27e68d052640ae8c22f4e1eef7c0f8c
                                            • Instruction Fuzzy Hash: 22510E10B1E6C90FD79AAB7848746B5AFD1DF9B269B0804FAE0CDC72E7DD185802C342
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 69562dcf153528bc281f3c311a64593b8f662ff6e61c4123c52983403f5713af
                                            • Instruction ID: c63b3caca63cf968d759fb04bd7318266bae7ce242b45b5635c7beee2c28bf88
                                            • Opcode Fuzzy Hash: 69562dcf153528bc281f3c311a64593b8f662ff6e61c4123c52983403f5713af
                                            • Instruction Fuzzy Hash: 7531C221B1C9490FE798AF2C98696B9A6C2EF9D355F0505BAF04EC32E7DD64AC418341
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 56ada99f06703a802e8df6663f33d7fa3fc00dfb018aea1a193e995d16299dbd
                                            • Instruction ID: 247b75ade20bb6cc45217749634801edda30a79ea58681063a58bc0821bacc2b
                                            • Opcode Fuzzy Hash: 56ada99f06703a802e8df6663f33d7fa3fc00dfb018aea1a193e995d16299dbd
                                            • Instruction Fuzzy Hash: 0531C521F2894D0FE788BBAC58696BD77D2EF98745F4542B6E05CC32D7DE2869018382
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5ec7a2d6b14be6441b0afc57dc30d4cc0002c1dbbe332f59c4684f6adca3d4ba
                                            • Instruction ID: d5b9e0eec795109edfd2d4c4fcf825504454a6fedac7aeaa4e06c95a7c58c96b
                                            • Opcode Fuzzy Hash: 5ec7a2d6b14be6441b0afc57dc30d4cc0002c1dbbe332f59c4684f6adca3d4ba
                                            • Instruction Fuzzy Hash: 8E41C334F19A4E4FDB48EBA89465AED7BB1FF98301F5405B9D019D32D6CE38A901C741
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1908006807.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7ffd9b800000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1a45eb9cac55f5767d10ec511a2bec3e3f7431a31a7afe46da23febbdc37fc5
                                            • Instruction ID: d7f2d36480c767dcc3175d8cd9dd470b79703e68b5cfd4b55341a95a093d86af
                                            • Opcode Fuzzy Hash: a1a45eb9cac55f5767d10ec511a2bec3e3f7431a31a7afe46da23febbdc37fc5
                                            • Instruction Fuzzy Hash: F4019911A0E6890FE755A73C28758B17FE08FDA6A1B0905FBF8C8C71E7ED085A40C392