Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
V7eJzu7M0J

Overview

General Information

Sample Name:V7eJzu7M0J (renamed file extension from none to exe)
Analysis ID:658744
MD5:016a0f7c2fc3d1c2caceb0f59bb7acaa
SHA1:5297dcd443482af2a3b0d7d3821d86d1c49c524d
SHA256:360a373d4c76a817d6534a5cd373222f9aae78d06421b549ea01040edac9ff9f
Tags:32exetrojan
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Found evaded block containing many API calls
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • V7eJzu7M0J.exe (PID: 6368 cmdline: "C:\Users\user\Desktop\V7eJzu7M0J.exe" MD5: 016A0F7C2FC3D1C2CACEB0F59BB7ACAA)
    • V7eJzu7M0J.exe (PID: 6412 cmdline: "C:\Users\user\Desktop\V7eJzu7M0J.exe" MD5: 016A0F7C2FC3D1C2CACEB0F59BB7ACAA)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • btjshsr (PID: 3780 cmdline: C:\Users\user\AppData\Roaming\btjshsr MD5: 016A0F7C2FC3D1C2CACEB0F59BB7ACAA)
    • btjshsr (PID: 6836 cmdline: C:\Users\user\AppData\Roaming\btjshsr MD5: 016A0F7C2FC3D1C2CACEB0F59BB7ACAA)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000010.00000002.435806478.0000000000430000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000009.00000000.340657231.0000000004911000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.362274879.00000000005A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000001.00000002.362218998.0000000000460000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000010.00000002.436165018.0000000002431000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            16.2.btjshsr.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              14.2.btjshsr.7b15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                0.2.V7eJzu7M0J.exe.21515a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  1.2.V7eJzu7M0J.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: V7eJzu7M0J.exeVirustotal: Detection: 39%Perma Link
                    Source: http://host-host-file8.com/URL Reputation: Label: malware
                    Source: host-file-host6.comVirustotal: Detection: 21%Perma Link
                    Source: host-host-file8.comVirustotal: Detection: 15%Perma Link
                    Source: C:\Users\user\AppData\Roaming\btjshsrVirustotal: Detection: 39%Perma Link
                    Source: V7eJzu7M0J.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\btjshsrJoe Sandbox ML: detected
                    Source: 00000010.00000002.435806478.0000000000430000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                    Source: V7eJzu7M0J.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Binary string: C:\gorexatanoz ketekido.pdb source: V7eJzu7M0J.exe, btjshsr.9.dr
                    Source: Binary string: _@OC:\gorexatanoz ketekido.pdb source: V7eJzu7M0J.exe, btjshsr.9.dr
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_004112E0 VerifyVersionInfoW,GetComputerNameA,EnumSystemLocalesA,WriteConsoleOutputCharacterA,GlobalMemoryStatus,GetConsoleAliasExesA,GetDiskFreeSpaceA,EnumCalendarInfoExW,FindResourceExA,EnterCriticalSection,BuildCommDCBAndTimeoutsW,FindFirstFileExA,SetComputerNameExA,_free,_calloc,_fseek,_puts,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetThreadLocale,LocalAlloc,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,GetConsoleAliasesLengthW,GetCurrentDirectoryA,AreFileApisANSI,GlobalReAlloc,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,FindFirstChangeNotificationA,GetSystemWindowsDirectoryW,GetConsoleAliasesLengthA,GetUserDefaultLangID,LoadLibraryW,

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: Malware configuration extractorURLs: http://host-file-host6.com/
                    Source: Malware configuration extractorURLs: http://host-host-file8.com/
                    Source: Joe Sandbox ViewASN Name: TIMEWEB-ASRU TIMEWEB-ASRU
                    Source: Joe Sandbox ViewIP Address: 89.223.123.171 89.223.123.171
                    Source: Joe Sandbox ViewIP Address: 89.223.123.171 89.223.123.171
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oqcutgtplm.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: host-file-host6.com
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oqcutgtplm.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: host-file-host6.com
                    Source: unknownDNS traffic detected: queries for: host-file-host6.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 16.2.btjshsr.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.btjshsr.7b15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.V7eJzu7M0J.exe.21515a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.V7eJzu7M0J.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.435806478.0000000000430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.340657231.0000000004911000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.362274879.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.362218998.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.436165018.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: V7eJzu7M0J.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_0041BDEF
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_0041E28C
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_0041C340
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_0041CF6D
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_0041AF74
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_02150110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_0040180C Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_00401818 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_00401822 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_00401826 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_00401834 Sleep,NtTerminateProcess,
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: V7eJzu7M0J.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: btjshsr.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                    Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\explorer.exeSection loaded: webio.dll
                    Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                    Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                    Source: V7eJzu7M0J.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: btjshsr.9.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: V7eJzu7M0J.exeVirustotal: Detection: 39%
                    Source: V7eJzu7M0J.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\V7eJzu7M0J.exe "C:\Users\user\Desktop\V7eJzu7M0J.exe"
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeProcess created: C:\Users\user\Desktop\V7eJzu7M0J.exe "C:\Users\user\Desktop\V7eJzu7M0J.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\btjshsr C:\Users\user\AppData\Roaming\btjshsr
                    Source: C:\Users\user\AppData\Roaming\btjshsrProcess created: C:\Users\user\AppData\Roaming\btjshsr C:\Users\user\AppData\Roaming\btjshsr
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeProcess created: C:\Users\user\Desktop\V7eJzu7M0J.exe "C:\Users\user\Desktop\V7eJzu7M0J.exe"
                    Source: C:\Users\user\AppData\Roaming\btjshsrProcess created: C:\Users\user\AppData\Roaming\btjshsr C:\Users\user\AppData\Roaming\btjshsr
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\btjshsrJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_004112E0 VerifyVersionInfoW,GetComputerNameA,EnumSystemLocalesA,WriteConsoleOutputCharacterA,GlobalMemoryStatus,GetConsoleAliasExesA,GetDiskFreeSpaceA,EnumCalendarInfoExW,FindResourceExA,EnterCriticalSection,BuildCommDCBAndTimeoutsW,FindFirstFileExA,SetComputerNameExA,_free,_calloc,_fseek,_puts,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetThreadLocale,LocalAlloc,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,GetConsoleAliasesLengthW,GetCurrentDirectoryA,AreFileApisANSI,GlobalReAlloc,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,FindFirstChangeNotificationA,GetSystemWindowsDirectoryW,GetConsoleAliasesLengthA,GetUserDefaultLangID,LoadLibraryW,
                    Source: V7eJzu7M0J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\gorexatanoz ketekido.pdb source: V7eJzu7M0J.exe, btjshsr.9.dr
                    Source: Binary string: _@OC:\gorexatanoz ketekido.pdb source: V7eJzu7M0J.exe, btjshsr.9.dr
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00415F65 push ecx; ret
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_02151977 push ebx; iretd
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_02151970 push ebx; iretd
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_0215198B push ebx; iretd
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 1_2_004011EB push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_004011D0 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_004011D7 push ebx; iretd
                    Source: C:\Users\user\AppData\Roaming\btjshsrCode function: 16_2_004011EB push ebx; iretd
                    Source: V7eJzu7M0J.exeStatic PE information: section name: .kumeg
                    Source: V7eJzu7M0J.exeStatic PE information: section name: .kigirij
                    Source: V7eJzu7M0J.exeStatic PE information: section name: .cem
                    Source: btjshsr.9.drStatic PE information: section name: .kumeg
                    Source: btjshsr.9.drStatic PE information: section name: .kigirij
                    Source: btjshsr.9.drStatic PE information: section name: .cem
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00411260 LoadLibraryW,GetProcAddress,VirtualProtect,
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.404998791285498
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.404998791285498
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\btjshsrJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\btjshsrJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\v7ejzu7m0j.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\btjshsr:Zone.Identifier read attributes | delete

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\btjshsrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\btjshsrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\btjshsrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\btjshsrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\btjshsrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\btjshsrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Windows\explorer.exe TID: 5868Thread sleep count: 544 > 30
                    Source: C:\Windows\explorer.exe TID: 5620Thread sleep count: 266 > 30
                    Source: C:\Windows\explorer.exe TID: 3632Thread sleep count: 295 > 30
                    Source: C:\Windows\explorer.exe TID: 6664Thread sleep count: 424 > 30
                    Source: C:\Windows\explorer.exe TID: 6752Thread sleep count: 140 > 30
                    Source: C:\Windows\explorer.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 544
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 424
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeEvaded block: after key decision
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_004112E0 VerifyVersionInfoW,GetComputerNameA,EnumSystemLocalesA,WriteConsoleOutputCharacterA,GlobalMemoryStatus,GetConsoleAliasExesA,GetDiskFreeSpaceA,EnumCalendarInfoExW,FindResourceExA,EnterCriticalSection,BuildCommDCBAndTimeoutsW,FindFirstFileExA,SetComputerNameExA,_free,_calloc,_fseek,_puts,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetThreadLocale,LocalAlloc,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,GetConsoleAliasesLengthW,GetCurrentDirectoryA,AreFileApisANSI,GlobalReAlloc,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,FindFirstChangeNotificationA,GetSystemWindowsDirectoryW,GetConsoleAliasesLengthA,GetUserDefaultLangID,LoadLibraryW,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeSystem information queried: ModuleInformation
                    Source: explorer.exe, 00000009.00000000.315787902.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                    Source: explorer.exe, 00000009.00000000.354740247.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}*^d
                    Source: explorer.exe, 00000009.00000000.322934162.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
                    Source: explorer.exe, 00000009.00000000.332715121.0000000008438000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000009.00000000.355024977.0000000008323000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA
                    Source: explorer.exe, 00000009.00000000.309475351.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000009.00000000.354740247.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                    Source: explorer.exe, 00000009.00000000.354740247.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}t]
                    Source: explorer.exe, 00000009.00000000.328445059.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000009.00000000.354740247.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
                    Source: explorer.exe, 00000009.00000000.310947906.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
                    Source: explorer.exe, 00000009.00000000.332004426.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: explorer.exe, 00000009.00000000.315787902.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                    Source: explorer.exe, 00000009.00000000.354740247.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\AppData\Roaming\btjshsrSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00419884 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00411260 LoadLibraryW,GetProcAddress,VirtualProtect,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_02150042 push dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\btjshsrProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00419884 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00415D05 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00417507 SetUnhandledExceptionFilter,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: btjshsr.9.drJump to dropped file
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Roaming\btjshsrSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\AppData\Roaming\btjshsrSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeMemory written: C:\Users\user\Desktop\V7eJzu7M0J.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_02150110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeThread created: C:\Windows\explorer.exe EIP: 4911930
                    Source: C:\Users\user\AppData\Roaming\btjshsrThread created: unknown EIP: 4A01930
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeProcess created: C:\Users\user\Desktop\V7eJzu7M0J.exe "C:\Users\user\Desktop\V7eJzu7M0J.exe"
                    Source: C:\Users\user\AppData\Roaming\btjshsrProcess created: C:\Users\user\AppData\Roaming\btjshsr C:\Users\user\AppData\Roaming\btjshsr
                    Source: explorer.exe, 00000009.00000000.322954282.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.337871681.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.309453013.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
                    Source: explorer.exe, 00000009.00000000.349335861.0000000005920000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.331627036.00000000080ED000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.338297081.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000009.00000000.338297081.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.323421156.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.309642765.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000009.00000000.338297081.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.323421156.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.309642765.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000009.00000000.322972830.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.337888127.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.309475351.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
                    Source: explorer.exe, 00000009.00000000.338297081.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.323421156.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.309642765.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: VerifyVersionInfoW,GetComputerNameA,EnumSystemLocalesA,WriteConsoleOutputCharacterA,GlobalMemoryStatus,GetConsoleAliasExesA,GetDiskFreeSpaceA,EnumCalendarInfoExW,FindResourceExA,EnterCriticalSection,BuildCommDCBAndTimeoutsW,FindFirstFileExA,SetComputerNameExA,_free,_calloc,_fseek,_puts,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetLastError,GetCurrentProcessId,GetSystemDefaultLCID,GetThreadLocale,LocalAlloc,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,GetLongPathNameW,GetProcessWorkingSetSize,GetCurrentProcess,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,VerSetConditionMask,SetConsoleTitleW,SetFileAttributesA,GetAtomNameA,GetConsoleAliasesLengthW,GetCurrentDirectoryA,AreFileApisANSI,GlobalReAlloc,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,LocalReAlloc,EnumResourceNamesA,WritePrivateProfileStringA,EndUpdateResourceW,FindFirstChangeNotificationA,GetSystemWindowsDirectoryW,GetConsoleAliasesLengthA,GetUserDefaultLangID,LoadLibraryW,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: WriteConsoleW,GetConsoleAliasesLengthA,ReadConsoleOutputCharacterA,CopyFileA,LoadLibraryA,EnumTimeFormatsW,WriteConsoleW,GetConsoleAliasExesLengthA,BeginUpdateResourceW,GetModuleFileNameW,GetFirmwareEnvironmentVariableW,DeleteTimerQueue,FindResourceExA,LoadLibraryA,UnregisterWait,ResetEvent,EnumDateFormatsW,PeekConsoleInputW,WaitNamedPipeW,VerifyVersionInfoA,WriteConsoleW,CreateEventW,GetSystemDirectoryA,GetCommTimeouts,_lwrite,InterlockedIncrement,GetLocaleInfoA,InterlockedDecrement,
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: WriteConsoleW,GetConsoleAliasesLengthA,ReadConsoleOutputCharacterA,CopyFileA,LoadLibraryA,EnumTimeFormatsW,WriteConsoleW,GetConsoleAliasExesLengthA,BeginUpdateResourceW,GetModuleFileNameW,GetFirmwareEnvironmentVariableW,DeleteTimerQueue,FindResourceExA,LoadLibraryA,UnregisterWait,ResetEvent,EnumDateFormatsW,PeekConsoleInputW,HeapLock,AddConsoleAliasW,BuildCommDCBW,WaitNamedPipeW,VerifyVersionInfoA,WriteConsoleW,CreateEventW,GetSystemDirectoryA,GetCommTimeouts,_lwrite,InterlockedIncrement,GetLocaleInfoA,InterlockedDecrement,
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\V7eJzu7M0J.exeCode function: 0_2_00418396 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 16.2.btjshsr.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.btjshsr.7b15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.V7eJzu7M0J.exe.21515a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.V7eJzu7M0J.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.435806478.0000000000430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.340657231.0000000004911000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.362274879.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.362218998.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.436165018.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 16.2.btjshsr.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.btjshsr.7b15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.V7eJzu7M0J.exe.21515a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.V7eJzu7M0J.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.435806478.0000000000430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.340657231.0000000004911000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.362274879.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.362218998.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.436165018.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts3
                    Native API
                    1
                    DLL Side-Loading
                    512
                    Process Injection
                    11
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Exploitation for Client Execution
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Virtualization/Sandbox Evasion
                    LSASS Memory321
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                    Non-Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                    Process Injection
                    Security Account Manager12
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                    Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Hidden Files and Directories
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Software Packing
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSync15
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 658744 Sample: V7eJzu7M0J Startdate: 07/07/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 3 other signatures 2->36 7 V7eJzu7M0J.exe 2->7         started        10 btjshsr 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 V7eJzu7M0J.exe 7->12         started        50 Multi AV Scanner detection for dropped file 10->50 52 Machine Learning detection for dropped file 10->52 15 btjshsr 10->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 89.223.123.171, 49757, 80 TIMEWEB-ASRU Russian Federation 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\btjshsr, PE32 17->22 dropped 24 C:\Users\user\...\btjshsr:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    V7eJzu7M0J.exe39%VirustotalBrowse
                    V7eJzu7M0J.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\btjshsr100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\btjshsr39%VirustotalBrowse
                    SourceDetectionScannerLabelLinkDownload
                    14.2.btjshsr.7b15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.V7eJzu7M0J.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.V7eJzu7M0J.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    16.2.btjshsr.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    16.0.btjshsr.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    16.0.btjshsr.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.2.V7eJzu7M0J.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.V7eJzu7M0J.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    16.0.btjshsr.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.V7eJzu7M0J.exe.21515a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    host-file-host6.com22%VirustotalBrowse
                    host-host-file8.com16%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://host-file-host6.com/0%URL Reputationsafe
                    http://host-host-file8.com/100%URL Reputationmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    host-file-host6.com
                    89.223.123.171
                    truetrueunknown
                    host-host-file8.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    89.223.123.171
                    host-file-host6.comRussian Federation
                    9123TIMEWEB-ASRUtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:658744
                    Start date and time: 07/07/202210:37:462022-07-07 10:37:46 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 8m 12s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:V7eJzu7M0J (renamed file extension from none to exe)
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:24
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@4/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 86.1% (good quality ratio 77.5%)
                    • Quality average: 68.8%
                    • Quality standard deviation: 33.6%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 40.125.122.176, 20.223.24.244
                    • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    10:39:58Task SchedulerRun new task: Firefox Default Browser Agent 2C537C56BA56BA15 path: C:\Users\user\AppData\Roaming\btjshsr
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):231424
                    Entropy (8bit):6.858771038555411
                    Encrypted:false
                    SSDEEP:3072:IFhJzOhFHLUTsSN8cpBrP9QCvg79fyRWIjewnsxkgaBChcpZa9uD6Vdyhk:qqhFHLad2yFqCvipyR7jPsigafwVf
                    MD5:016A0F7C2FC3D1C2CACEB0F59BB7ACAA
                    SHA1:5297DCD443482AF2A3B0D7D3821D86D1C49C524D
                    SHA-256:360A373D4C76A817D6534A5CD373222F9AAE78D06421B549EA01040EDAC9FF9F
                    SHA-512:894A26F98B02CA8C83E680F989EE0DA72287BC351A59B936898702CEBDAE5F567A16484E80BB1CBA0BC7ED0B255EBA55E88B4D407FEAE6BA52C5E9C8744BDCD5
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Virustotal, Detection: 39%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8.*.Y.y.Y.y.Y.y./.y.Y.y./;y.Y.y.!.y.Y.y.Y.y1Y.y./:y.Y.y./.y.Y.y./.y.Y.yRich.Y.y................PE..L...[.ba.....................0!.....x@............@..........................@#.................................................<.....!.8e..........................0................................5..@............................................text...X........................... ..`.data...t........&..................@....kumeg........!.....................@..@.kigirij......!.....................@..@.cem....p.....!.....................@..@.rsrc...8e....!..f..."..............@..@................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.858771038555411
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:V7eJzu7M0J.exe
                    File size:231424
                    MD5:016a0f7c2fc3d1c2caceb0f59bb7acaa
                    SHA1:5297dcd443482af2a3b0d7d3821d86d1c49c524d
                    SHA256:360a373d4c76a817d6534a5cd373222f9aae78d06421b549ea01040edac9ff9f
                    SHA512:894a26f98b02ca8c83e680f989ee0da72287bc351a59b936898702cebdae5f567a16484e80bb1cba0bc7ed0b255eba55e88b4d407feae6ba52c5e9c8744bdcd5
                    SSDEEP:3072:IFhJzOhFHLUTsSN8cpBrP9QCvg79fyRWIjewnsxkgaBChcpZa9uD6Vdyhk:qqhFHLad2yFqCvipyR7jPsigafwVf
                    TLSH:A134BE11B6F0D871D0155D304824D7A12AFBFD619530694BF7A0BB6F2EB33D02ABA35A
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8.*.Y.y.Y.y.Y.y./.y.Y.y./;y.Y.y.!.y.Y.y.Y.y1Y.y./:y.Y.y./.y.Y.y./.y.Y.yRich.Y.y................PE..L...[.ba...................
                    Icon Hash:8286decea68c9ca4
                    Entrypoint:0x414078
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6162875B [Sun Oct 10 06:25:31 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:e9990c928299c05cb1687adf53603d1f
                    Instruction
                    call 00007FC484BED0EEh
                    jmp 00007FC484BE8C5Eh
                    push 0000000Ah
                    call dword ptr [00401124h]
                    mov dword ptr [00619068h], eax
                    xor eax, eax
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    mov ebp, esp
                    sub esp, 08h
                    and esp, FFFFFFF0h
                    fstp qword ptr [esp]
                    movq xmm0, qword ptr [esp]
                    call 00007FC484BE8DDDh
                    leave
                    ret
                    movlpd xmm0, qword ptr [esp+04h]
                    pextrw eax, xmm0, 03h
                    and ax, 00007FFFh
                    sub ax, 00003030h
                    cmp ax, 000010C5h
                    ja 00007FC484BE8F18h
                    movlpd xmm1, qword ptr [00401BC0h]
                    mulsd xmm1, xmm0
                    movlpd xmm2, qword ptr [00401BC8h]
                    cvtsd2si edx, xmm1
                    addsd xmm1, xmm2
                    movlpd xmm3, qword ptr [00401BE0h]
                    subsd xmm1, xmm2
                    movapd xmm2, dqword ptr [00401BD0h]
                    mulsd xmm3, xmm1
                    unpcklpd xmm1, xmm1
                    add edx, 001C7600h
                    movsd xmm4, xmm0
                    and edx, 3Fh
                    movapd xmm5, dqword ptr [00401BB0h]
                    lea eax, dword ptr [00401380h]
                    shl edx, 05h
                    add eax, edx
                    mulpd xmm2, xmm1
                    subsd xmm0, xmm3
                    mulsd xmm1, qword ptr [00401BE8h]
                    subsd xmm0, qword ptr [eax]
                    Programming Language:
                    • [ASM] VS2010 build 30319
                    • [ C ] VS2010 build 30319
                    • [IMP] VS2008 SP1 build 30729
                    • [C++] VS2010 build 30319
                    • [RES] VS2010 build 30319
                    • [LNK] VS2010 build 30319
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1e8dc0x3c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x21d0000x16538.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x12300x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x35900x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1e8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x1e4580x1e600False0.7499437371399177PGP symmetric key encrypted data - Plaintext or unencrypted data7.404998791285498IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x200000x1f90740x2600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .kumeg0x21a0000x10x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .kigirij0x21b0000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .cem0x21c0000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x21d0000x165380x16600False0.6368169518156425data6.397251360165234IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    WOCIYIYAJETAFO0x2308100x7d1ASCII text, with very long lines, with no line terminatorsFrenchSwitzerland
                    RT_CURSOR0x2310080x330dBase III DBT, version number 0, next free block index 40, 1st item "\377\377\377\377\377\377"FrenchSwitzerland
                    RT_CURSOR0x2313380x130dataFrenchSwitzerland
                    RT_CURSOR0x2314900xea8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"FrenchSwitzerland
                    RT_CURSOR0x2323380x8a8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"FrenchSwitzerland
                    RT_CURSOR0x232c080x130dataFrenchSwitzerland
                    RT_CURSOR0x232d380xb0GLS_BINARY_LSB_FIRSTFrenchSwitzerland
                    RT_ICON0x21d9000xea8dataKannadaKanada
                    RT_ICON0x21e7a80x8a8dataKannadaKanada
                    RT_ICON0x21f0500x6c8dataKannadaKanada
                    RT_ICON0x21f7180x568GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x21fc800x25a8dataKannadaKanada
                    RT_ICON0x2222280x10a8dataKannadaKanada
                    RT_ICON0x2232d00x468GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x2237a00xea8dataKannadaKanada
                    RT_ICON0x2246480x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 13619670, next used block 10789292KannadaKanada
                    RT_ICON0x224ef00x6c8dataKannadaKanada
                    RT_ICON0x2255b80x568GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x225b200x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0KannadaKanada
                    RT_ICON0x2280c80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 769106117, next used block 836211653KannadaKanada
                    RT_ICON0x2291700x988dataKannadaKanada
                    RT_ICON0x229af80x468GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x229fd80xea8dataKannadaKanada
                    RT_ICON0x22ae800x8a8dataKannadaKanada
                    RT_ICON0x22b7280x6c8dataKannadaKanada
                    RT_ICON0x22bdf00x568GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x22c3580x25a8dataKannadaKanada
                    RT_ICON0x22e9000x10a8dataKannadaKanada
                    RT_ICON0x22f9a80x988dataKannadaKanada
                    RT_ICON0x2303300x468GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_DIALOG0x232fa80x78dataFrenchSwitzerland
                    RT_STRING0x2330200x30cdataFrenchSwitzerland
                    RT_STRING0x2333300x206dataFrenchSwitzerland
                    RT_GROUP_CURSOR0x2314680x22dataFrenchSwitzerland
                    RT_GROUP_CURSOR0x232be00x22dataFrenchSwitzerland
                    RT_GROUP_CURSOR0x232de80x22dataFrenchSwitzerland
                    RT_GROUP_ICON0x2237380x68dataKannadaKanada
                    RT_GROUP_ICON0x2307980x76dataKannadaKanada
                    RT_GROUP_ICON0x229f600x76dataKannadaKanada
                    RT_VERSION0x232e100x198dataFrenchSwitzerland
                    None0x230fe80xadataFrenchSwitzerland
                    None0x230ff80xadataFrenchSwitzerland
                    DLLImport
                    KERNEL32.dllInterlockedDecrement, GetLocaleInfoA, InterlockedIncrement, _lwrite, GetCommTimeouts, GetSystemDirectoryA, CreateEventW, WriteConsoleW, VerifyVersionInfoA, BuildCommDCBW, AddConsoleAliasW, HeapLock, PeekConsoleInputW, EnumDateFormatsW, ResetEvent, UnregisterWait, LoadLibraryA, WaitNamedPipeW, FindResourceExA, DeleteTimerQueue, GetFirmwareEnvironmentVariableW, GetModuleFileNameW, BeginUpdateResourceW, GetConsoleAliasExesLengthA, EnumTimeFormatsW, CopyFileA, UnhandledExceptionFilter, GetConsoleAliasesLengthA, LocalAlloc, GetProcAddress, GetUserDefaultLangID, GetSystemWindowsDirectoryW, FindFirstChangeNotificationA, EndUpdateResourceW, WritePrivateProfileStringA, EnumResourceNamesA, LocalReAlloc, GlobalReAlloc, AreFileApisANSI, GetCurrentDirectoryA, GetConsoleAliasesLengthW, GetAtomNameA, SetFileAttributesA, SetConsoleTitleW, VerSetConditionMask, GetCurrentProcess, GetProcessWorkingSetSize, GetLongPathNameW, GetThreadLocale, GetSystemDefaultLCID, GetCurrentProcessId, GetLastError, SetComputerNameExA, FindFirstFileExA, BuildCommDCBAndTimeoutsW, EnterCriticalSection, EnumCalendarInfoExW, GetDiskFreeSpaceA, GetConsoleAliasExesA, GlobalMemoryStatus, WriteConsoleOutputCharacterA, EnumSystemLocalesA, GetComputerNameA, VerifyVersionInfoW, ReadConsoleOutputCharacterA, LoadLibraryW, HeapReAlloc, HeapFree, GetCommandLineW, HeapSetInformation, GetStartupInfoW, IsProcessorFeaturePresent, EncodePointer, LeaveCriticalSection, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, SetUnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, TerminateProcess, SetFilePointer, HeapAlloc, HeapCreate, ReadFile, WriteFile, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, CloseHandle, GetModuleHandleW, ExitProcess, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, Sleep, RtlUnwind, SetStdHandle, FlushFileBuffers, MultiByteToWideChar, RaiseException, LCMapStringW, GetStringTypeW, CreateFileW, HeapSize
                    GDI32.dllGetTextExtentExPointW
                    Language of compilation systemCountry where language is spokenMap
                    FrenchSwitzerland
                    KannadaKanada
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 7, 2022 10:39:58.507067919 CEST4975780192.168.2.389.223.123.171
                    Jul 7, 2022 10:39:58.555996895 CEST804975789.223.123.171192.168.2.3
                    Jul 7, 2022 10:39:58.556094885 CEST4975780192.168.2.389.223.123.171
                    Jul 7, 2022 10:39:58.556232929 CEST4975780192.168.2.389.223.123.171
                    Jul 7, 2022 10:39:58.556255102 CEST4975780192.168.2.389.223.123.171
                    Jul 7, 2022 10:39:58.605118036 CEST804975789.223.123.171192.168.2.3
                    Jul 7, 2022 10:39:58.631740093 CEST804975789.223.123.171192.168.2.3
                    Jul 7, 2022 10:39:58.631836891 CEST4975780192.168.2.389.223.123.171
                    Jul 7, 2022 10:39:58.649099112 CEST4975780192.168.2.389.223.123.171
                    Jul 7, 2022 10:39:58.698549032 CEST804975789.223.123.171192.168.2.3
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 7, 2022 10:39:58.185434103 CEST6535853192.168.2.38.8.8.8
                    Jul 7, 2022 10:39:58.502679110 CEST53653588.8.8.8192.168.2.3
                    Jul 7, 2022 10:39:58.667005062 CEST4987353192.168.2.38.8.8.8
                    Jul 7, 2022 10:39:59.693581104 CEST4987353192.168.2.38.8.8.8
                    Jul 7, 2022 10:40:00.707616091 CEST4987353192.168.2.38.8.8.8
                    Jul 7, 2022 10:40:02.712452888 CEST53498738.8.8.8192.168.2.3
                    Jul 7, 2022 10:40:03.745534897 CEST53498738.8.8.8192.168.2.3
                    Jul 7, 2022 10:40:04.752989054 CEST53498738.8.8.8192.168.2.3
                    TimestampSource IPDest IPChecksumCodeType
                    Jul 7, 2022 10:40:03.745680094 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                    Jul 7, 2022 10:40:04.753142118 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Jul 7, 2022 10:39:58.185434103 CEST192.168.2.38.8.8.80x9921Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Jul 7, 2022 10:39:58.667005062 CEST192.168.2.38.8.8.80xd2c1Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jul 7, 2022 10:39:59.693581104 CEST192.168.2.38.8.8.80xd2c1Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jul 7, 2022 10:40:00.707616091 CEST192.168.2.38.8.8.80xd2c1Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Jul 7, 2022 10:39:58.502679110 CEST8.8.8.8192.168.2.30x9921No error (0)host-file-host6.com89.223.123.171A (IP address)IN (0x0001)
                    Jul 7, 2022 10:40:02.712452888 CEST8.8.8.8192.168.2.30xd2c1Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jul 7, 2022 10:40:03.745534897 CEST8.8.8.8192.168.2.30xd2c1Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jul 7, 2022 10:40:04.752989054 CEST8.8.8.8192.168.2.30xd2c1Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • oqcutgtplm.net
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.34975789.223.123.17180C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Jul 7, 2022 10:39:58.556232929 CEST1307OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://oqcutgtplm.net/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 260
                    Host: host-file-host6.com
                    Jul 7, 2022 10:39:58.631740093 CEST1307INHTTP/1.1 200 OK
                    Server: nginx/1.20.1
                    Date: Thu, 07 Jul 2022 08:39:58 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: fYour IP blocked0


                    Click to jump to process

                    Target ID:0
                    Start time:10:39:00
                    Start date:07/07/2022
                    Path:C:\Users\user\Desktop\V7eJzu7M0J.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\V7eJzu7M0J.exe"
                    Imagebase:0x400000
                    File size:231424 bytes
                    MD5 hash:016A0F7C2FC3D1C2CACEB0F59BB7ACAA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:10:39:09
                    Start date:07/07/2022
                    Path:C:\Users\user\Desktop\V7eJzu7M0J.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\V7eJzu7M0J.exe"
                    Imagebase:0x400000
                    File size:231424 bytes
                    MD5 hash:016A0F7C2FC3D1C2CACEB0F59BB7ACAA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.362274879.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.362218998.0000000000460000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:9
                    Start time:10:39:18
                    Start date:07/07/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff6b8cf0000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000000.340657231.0000000004911000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:14
                    Start time:10:39:58
                    Start date:07/07/2022
                    Path:C:\Users\user\AppData\Roaming\btjshsr
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\btjshsr
                    Imagebase:0x400000
                    File size:231424 bytes
                    MD5 hash:016A0F7C2FC3D1C2CACEB0F59BB7ACAA
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 39%, Virustotal, Browse
                    Reputation:low

                    Target ID:16
                    Start time:10:40:08
                    Start date:07/07/2022
                    Path:C:\Users\user\AppData\Roaming\btjshsr
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\btjshsr
                    Imagebase:0x400000
                    File size:231424 bytes
                    MD5 hash:016A0F7C2FC3D1C2CACEB0F59BB7ACAA
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000010.00000002.435806478.0000000000430000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000010.00000002.436165018.0000000002431000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    No disassembly