Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:20.0.0
Analysis ID:394065
Start time:10:18:19
Joe Sandbox Product:Cloud
Start date:25.10.2017
Overall analysis duration:0h 9m 59s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:i0YxTJ2SO.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:28
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
Detection:MAL
Classification:mal84.evad.spre.expl.rans.winEXE@35/5@0/4
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 101
  • Number of non-executed functions: 75
EGA Information:
  • Successful, ratio: 100%
Cookbook Comments:
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Connection to analysis system has been lost
  • Exclude process from analysis (whitelisted): conhost.exe, dllhost.exe
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.


Detection

StrategyScoreRangeReportingDetection
Threshold840 - 100Report FP / FNmalicious


Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox



Signature Overview

Click to jump to signature section


Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic ProviderShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475507 CryptAcquireContextW,CryptAcquireContextW,GetLastError,CryptAcquireContextW,3_2_00475507
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475BC4 GetSystemInfo,__alldiv,MapViewOfFile,CryptDuplicateHash,CryptHashData,LocalAlloc,CryptGetHashParam,memcpy,FlushViewOfFile,LocalFree,CryptDestroyHash,UnmapViewOfFile,3_2_00475BC4
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004715A7 GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,HeapAlloc,CryptAcquireContextW,GetProcessHeap,HeapAlloc,CryptImportKey,CryptCreateHash,CryptSetHashParam,GetProcessHeap,HeapFree,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,3_2_004715A7
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475A73 GetSystemInfo,__alldiv,MapViewOfFile,CryptDuplicateHash,CryptHashData,LocalAlloc,CryptGetHashParam,LocalFree,CryptDestroyHash,UnmapViewOfFile,3_2_00475A73
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475613 CryptStringToBinaryW,CryptStringToBinaryW,LocalAlloc,LocalAlloc,CryptStringToBinaryW,CryptDecodeObjectEx,CryptDecodeObjectEx,LocalAlloc,CryptDecodeObjectEx,CryptImportPublicKeyInfo,LocalFree,LocalFree,3_2_00475613
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475D0A CryptDuplicateKey,CreateFileW,GetFileSizeEx,__alldiv,CreateFileMappingW,MapViewOfFile,CryptEncrypt,FlushViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,CryptDestroyKey,SetEvent,3_2_00475D0A
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0047554A CryptAcquireContextW,GetLastError,CryptGenRandom,CryptReleaseContext,3_2_0047554A
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476299 CreateEventW,CreateThread,WaitForSingleObject,CloseHandle,CryptDestroyHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,CloseHandle,LocalFree,3_2_00476299
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0047559B CryptSetKeyParam,CryptSetKeyParam,CryptSetKeyParam,CryptGetKeyParam,LocalAlloc,CryptSetKeyParam,LocalFree,3_2_0047559B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475780 CryptBinaryToStringW,CryptBinaryToStringW,LocalAlloc,CryptBinaryToStringW,LocalFree,3_2_00475780
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004756D8 CryptEncrypt,CryptEncrypt,LocalAlloc,memcpy,CryptEncrypt,LocalFree,3_2_004756D8
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476085 CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDestroyHash,3_2_00476085
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476246 CryptCreateHash,CryptHashData,CryptGetHashParam,3_2_00476246

Spam, unwanted Advertisements and Ransom Demands:

barindex
Contains functionality to import cryptographic keys (often used in ransomware)Show sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004715A7 GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,HeapAlloc,CryptAcquireContextW,GetProcessHeap,HeapAlloc,CryptImportKey,CryptCreateHash,CryptSetHashParam,GetProcessHeap,HeapFree,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,3_2_004715A7
Clears the journal logShow sources
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Clears the windows event logShow sources
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:

Exploits:

barindex
Connects to many different private IPs (likely to spread or exploit)Show sources
Source: global trafficTCP traffic: 192.168.1.1:445
Source: global trafficTCP traffic: 192.168.1.0:139
Source: global trafficTCP traffic: 192.168.1.2:80
Connects to many different private IPs via SMB (likely to spread or exploit)Show sources
Source: global trafficTCP traffic: 192.168.1.1:445
Source: global trafficTCP traffic: 192.168.1.0:139
Source: global trafficTCP traffic: 192.168.1.2:445

Networking:

barindex
Contains functionality to download additional files from the internetShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00471EB9 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,htons,send,recv,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00471EB9
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRi82PVYYKWGJWdgVNyePy5kYTdqQQUX5r1blzMzHSa1N197z%2Fb7EyALt0CEA7P9DjI%2Fr81bgTYapgbGlA%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ts-ocsp.ws.symantec.com
Source: global trafficHTTP traffic detected: GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQd11mpyHEqFCSocj4SCu93CBydHAQUr2PWyqNOhXLgp7xB8ymiOH%2BAdWICEFRY8qrXQdZEvISpe6CWUuY%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ts-ocsp.ws.symantec.com
Urls found in memory or binary dataShow sources
Source: rundll32.exeString found in binary or memory: http://192.168.1.2/
Source: rundll32.exeString found in binary or memory: http://192.168.1.2/g
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://crl.thawte.com/thawtetimestampingca.crl0
Source: rundll32.exe, cscc.dat.3.dr, dispci.exe.3.drString found in binary or memory: http://diskcryptor.net/
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ocsp.thawte.com0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://rb.symcb.com/rb.crl0w
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://rb.symcb.com/rb.crt0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://rb.symcd.com0&
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://s.symcd.com0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://s.symcd.com06
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://sf.symcb.com/sf.crl0w
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://sf.symcd.com0&
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: https://d.symcb.com/cps0%
Source: infpub.dat.1.drString found in binary or memory: https://d.symcb.com/rpa0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: https://d.symcb.com/rpa06

Boot Survival:

barindex
Contains functionality to start windows servicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\dispci.exe
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\cscc.dat
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\9706.tmp
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile created: C:\Windows\infpub.dat
Drops PE files to the windows directory (C:\Windows)Show sources
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\dispci.exe
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\cscc.dat
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\9706.tmp
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile created: C:\Windows\infpub.dat
Drops executables to the windows directory (C:\Windows) and starts themShow sources
Source: C:\Windows\System32\rundll32.exeExecutable created and started: C:\Windows\9706.tmp

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479016 VirtualProtect,LoadLibraryA,GetProcAddress,VirtualProtect,3_2_00479016
PE file contains an invalid checksumShow sources
Source: 9706.tmp.3.drStatic PE information: real checksum: 0x114bd should be: 0x1e635
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Windows\9706.tmpCode function: 10_2_013059E5 push ecx; ret 10_2_013059F8

Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475E9F PathCombineW,FindFirstFileW,WaitForMultipleObjects,PathCombineW,StrStrIW,PathFindExtensionW,FindNextFileW,FindClose,3_2_00475E9F
Creates COM task schedule object (often to register a task for autostart)Show sources
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Contains functionality to enumerate network shares of other devicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError, \\%s\admin$3_2_00479534
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479B63 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,GetCurrentThread,OpenThreadToken,DuplicateTokenEx,memset,GetSystemDirectoryW,CloseHandle,PathAppendW,PathFileExistsW,wsprintfW,CreateProcessAsUserW,CreateProcessW,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,PathFileExistsW,GetLastError,GetLastError,DeleteFileW,CloseHandle,CloseHandle,WNetCancelConnection2W,SetLastError, \\%s\admin$3_2_00479B63

System Summary:

barindex
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: i0YxTJ2SO.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbolsShow sources
Source: Binary string: dcrypt.pdbp source: rundll32.exe, cscc.dat.3.dr
Source: Binary string: wdigest.pdb source: 9706.tmp
Source: Binary string: dcrypt.pdb source: rundll32.exe, cscc.dat.3.dr
Source: Binary string: wdigest.pdbJ6 source: 9706.tmp
Binary contains device paths (device paths are often used for kernel mode <-> user mode communication)Show sources
Source: cscc.dat.3.drBinary string: configFlags\Device\dcrypt\DosDevices\dcryptdump_hiber_%s\$dcsys$$dcsys$\Device\CdRom%s\$DC_TRIM_%x$$dcsys$_fail_%xNTFSFATFAT32exFATH
Binary contains paths to development resourcesShow sources
Source: dispci.exe.3.drBinary or memory string: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5clDuVFr5sQxZ+feQlVvZcEK0k4uCSF5SkOkF9A3tR6O/xAt89/PVhowvu2TfBTRsnBs83hcFH8hjG2V5F5DxXFoSxpTqVsR4lOm5KB2S8ap4TinG/GN/SVNBFwllpRhV/vRWNmKgKIdROvkHxyALuJyUuCZlIoaJ5tB0YkATEHEyRsLcntZYsdwH1P+NmXiNg2MH5lZ9bEOk7YTMfwVKNqtHaX0LJOyAkx4NR0DPOFLDQONW9OOhZSkRx3V7PC3Q29HHhyiKVCPJsOW1l1mNtwL7KX+7kfNe0CefByEWfSBt1tbkvjdeP2xBnPjb3GE1GA/oGcGjrXc6wV8WKsfYQIDAQAB.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.pfx.php.pmf.png.ppt.pptx.ps1.pst.pvi.py.pyc.pyw.qcow.qcow2.rar.rb.rtf.scm.sln.sql.tar.tib.tif.tiff.vb.vbox.vbs.vcb.vdi.vfd.vhd.vhdx.vmc.vmdk.vmsd.vmtm.vmx.vsdx.vsv.work.xls.xlsx.xml.xvd.zip.\AppData\ProgramData\Program Files\Windows.encrypted%lS OK
Source: i0YxTJ2SO.exe, rundll32.exe, infpub.dat.1.drBinary or memory string: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5clDuVFr5sQxZ+feQlVvZcEK0k4uCSF5SkOkF9A3tR6O/xAt89/PVhowvu2TfBTRsnBs83hcFH8hjG2V5F5DxXFoSxpTqVsR4lOm5KB2S8ap4TinG/GN/SVNBFwllpRhV/vRWNmKgKIdROvkHxyALuJyUuCZlIoaJ5tB0YkATEHEyRsLcntZYsdwH1P+NmXiNg2MH5lZ9bEOk7YTMfwVKNqtHaX0LJOyAkx4NR0DPOFLDQONW9OOhZSkRx3V7PC3Q29HHhyiKVCPJsOW1l1mNtwL7KX+7kfNe0CefByEWfSBt1tbkvjdeP2xBnPjb3GE1GA/oGcGjrXc6wV8WKsfYQIDAQAB.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.pfx.php.pmf.png.ppt.pptx.ps1.pst.pvi.py.pyc.pyw.qcow.qcow2.rar.rb.rtf.scm.sln.sql.tar.tib.tif.tiff.vb.vbox.vbs.vcb.vdi.vfd.vhd.vhdx.vmc.vmdk.vmsd.vmtm.vmx.vsdx.vsv.work.xls.xlsx.xml.xvd.zip.\AppData\ProgramData\Program Files\Windows.encrypted*..Readme.txt%s-h-f%dkernel32.dllIsWow64Process\\.\pipe\%ws"%ws" %wsiphlpapi.dllGetExtendedTcpTable%u.%u.%u.%uTERM
Classification labelShow sources
Source: classification engineClassification label: mal84.evad.spre.expl.rans.winEXE@35/5@0/4
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00477CC5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,SetLastError,3_2_00477CC5
Contains functionality to create servicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00471368
Source: C:\Windows\System32\rundll32.exeCode function: wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Contains functionality to enum processes or threadsShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004784EE CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,3_2_004784EE
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00478313 FindResourceW,LoadResource,LockResource,SizeofResource,GetProcessHeap,GetProcessHeap,HeapAlloc,RtlAllocateHeap,memcpy,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00478313
Contains functionality to modify services (start/stop/modify)Show sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Found command line outputShow sources
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.....E.R.R.O.R.:. .............................}u..........#...}u.... .....i.,.#.G..v..#...........#.....
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.................=.................................W...#.....................g_v.`.#.....X...j..u..(.....
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.............0...L...........................`.....0...2...2..................................{{.....G..v
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.............0...n...........................`.....1...3.x.3.......$...............$.........3p....$.G..v
Source: C:\Windows\System32\shutdown.exeConsole Write: ..............".....A. .s.y.s.t.e.m. .s.h.u.t.d.o.w.n. .i.s. .i.n. .p.r.o.g.r.e.s.s...(.1.1.1.5.)...P.".P...@.".....6...
PE file has an executable .text section and no other executable sectionShow sources
Source: i0YxTJ2SO.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Reads ini filesShow sources
Source: C:\Windows\System32\LogonUI.exeFile read: C:\Windows\win.ini
Reads software policiesShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Runs a DLL by calling functionsShow sources
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\i0YxTJ2SO.exe 'C:\Users\user\Desktop\i0YxTJ2SO.exe'
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN rhaegal
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: unknownProcess created: C:\Windows\9706.tmp 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Setup
Source: unknownProcess created: C:\Windows\System32\shutdown.exe C:\Windows\system32\shutdown.exe /r /t 0 /f
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl System
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Security
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN drogon
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Application
Source: unknownProcess created: C:\Windows\System32\LogonUI.exe 'LogonUI.exe' /flags:0x0
Source: unknownProcess created: C:\Windows\System32\schtasks.exe unknown
Source: unknownProcess created: C:\Windows\System32\fsutil.exe unknown
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\9706.tmp 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN drogon
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Setup
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl System
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Security
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Application
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe unknown
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Windows\System32\schtasks.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011)Show sources
Source: infpub.dat.1.drStatic PE information: Section: .rsrc ZLIB complexity 0.995711959814
Contains functionality to call native functionsShow sources
Source: C:\Windows\9706.tmpCode function: 10_2_01301D4C GetCurrentProcess,NtQueryInformationProcess,RtlGetCurrentPeb,10_2_01301D4C
Source: C:\Windows\9706.tmpCode function: 10_2_0130184E NtQuerySystemInformation,GetModuleHandleW,GetProcAddress,LocalAlloc,NtQuerySystemInformation,LocalFree,10_2_0130184E
Contains functionality to delete servicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Contains functionality to launch a process as a different userShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479B63 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,GetCurrentThread,OpenThreadToken,DuplicateTokenEx,memset,GetSystemDirectoryW,CloseHandle,PathAppendW,PathFileExistsW,wsprintfW,CreateProcessAsUserW,CreateProcessW,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,PathFileExistsW,GetLastError,GetLastError,DeleteFileW,CloseHandle,CloseHandle,WNetCancelConnection2W,SetLastError,3_2_00479B63
Contains functionality to shutdown / reboot the systemShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00478A23 InitiateSystemShutdownExW,ExitWindowsEx,ExitProcess,3_2_00478A23
Creates files inside the system directoryShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile created: C:\Windows\infpub.dat
Creates mutexesShow sources
Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\85427E2A3AD6FDE5
Deletes Windows filesShow sources
Source: C:\Windows\System32\rundll32.exeFile deleted: C:\Windows\infpub.dat
Enables security privilegesShow sources
Source: C:\Windows\System32\wevtutil.exeProcess token adjusted: Security
PE file contains strange resourcesShow sources
Source: i0YxTJ2SO.exeStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Source: i0YxTJ2SO.exeStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
PE file has an invalid certificateShow sources
Source: i0YxTJ2SO.exeStatic PE information: invalid certificate
Reads the hosts fileShow sources
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Sample file is different than original file name gathered from version infoShow sources
Source: i0YxTJ2SO.exeBinary or memory string: OriginalFilenameFlashUtil.exev+ vs i0YxTJ2SO.exe
Source: i0YxTJ2SO.exeBinary or memory string: OriginalFilenameFlashUtil.exev+ vs i0YxTJ2SO.exe
Sample reads its own file contentShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile read: C:\Users\user\Desktop\i0YxTJ2SO.exe
Contains functionality to create processes via WMIShow sources
Source: i0YxTJ2SO.exeBinary or memory string: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5clDuVFr5sQxZ+feQlVvZcEK0k4uCSF5SkOkF9A3tR6O/xAt89/PVhowvu2TfBTRsnBs83hcFH8hjG2V5F5DxXFoSxpTqVsR4lOm5KB2S8ap4TinG/GN/SVNBFwllpRhV/vRWNmKgKIdROvkHxyALuJyUuCZlIoaJ5tB0YkATEHEyRsLcntZYsdwH1P+NmXiNg2MH5lZ9bEOk7YTMfwVKNqtHaX0LJOyAkx4NR0DPOFLDQONW9OOhZSkRx3V7PC3Q29HHhyiKVCPJsOW1l1mNtwL7KX+7kfNe0CefByEWfSBt1tbkvjdeP2xBnPjb3GE1GA/oGcGjrXc6wV8WKsfYQIDAQAB.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.pfx.php.pmf.png.ppt.pptx.ps1.pst.pvi.py.pyc.pyw.qcow.qcow2.rar.rb.rtf.scm.sln.sql.tar.tib.tif.tiff.vb.vbox.vbs.vcb.vdi.vfd.vhd.vhdx.vmc.vmdk.vmsd.vmtm.vmx.vsdx.vsv.work.xls.xlsx.xml.xvd.zip.\AppData\ProgramData\Program Files\Windows.encrypted*..Readme.txt%s-h-f%dkernel32.dllIsWow64Process\\.\pipe\%ws"%ws" %wsiphlpapi.dllGetExtendedTcpTable%u.%u.%u.%uTERM
Uses shutdown.exe to shutdown or reboot the systemShow sources
Source: unknownProcess created: C:\Windows\System32\shutdown.exe C:\Windows\system32\shutdown.exe /r /t 0 /f

HIPS / PFW / Operating System Protection Evasion:

barindex
Contains functionality to add an ACL to a security descriptorShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476FFE GetProcessHeap,GetProcessHeap,HeapAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,ConnectNamedPipe,PeekNamedPipe,Sleep,GetProcessHeap,HeapAlloc,ReadFile,StrChrW,GetProcessHeap,HeapFree,FlushFileBuffers,DisconnectNamedPipe,CloseHandle,3_2_00476FFE
Contains functionality to create a new security descriptorShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0047841D GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,DuplicateToken,AllocateAndInitializeSid,CheckTokenMembership,TerminateProcess,FreeSid,CloseHandle,CloseHandle,CloseHandle,3_2_0047841D
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\9706.tmp 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN drogon
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Setup
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl System
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Security
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Application
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe unknown

Anti Debugging:

barindex
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeCode function: 1_2_003E1499 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_003E1499
Source: C:\Windows\9706.tmpCode function: 10_2_01304D59 SetUnhandledExceptionFilter,10_2_01304D59
Source: C:\Windows\9706.tmpCode function: 10_2_01304B37 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_01304B37
Source: C:\Windows\9706.tmpCode function: 10_2_0130601E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0130601E
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Windows\System32\rundll32.exeSystem information queried: KernelDebuggerInformation
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Windows\9706.tmpCode function: 10_2_01304B37 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_01304B37
Contains functionality to dynamically determine API callsShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479016 VirtualProtect,LoadLibraryA,GetProcAddress,VirtualProtect,3_2_00479016
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeCode function: 1_2_003E1690 GetProcessHeap,1_2_003E1690
Enables debug privilegesShow sources
Source: C:\Windows\System32\rundll32.exeProcess token adjusted: Debug
Source: C:\Windows\9706.tmpProcess token adjusted: Debug

Malware Analysis System Evasion:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475E9F PathCombineW,FindFirstFileW,WaitForMultipleObjects,PathCombineW,StrStrIW,PathFindExtensionW,FindNextFileW,FindClose,3_2_00475E9F
Contains functionality to query system informationShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475BC4 GetSystemInfo,__alldiv,MapViewOfFile,CryptDuplicateHash,CryptHashData,LocalAlloc,CryptGetHashParam,memcpy,FlushViewOfFile,LocalFree,CryptDestroyHash,UnmapViewOfFile,3_2_00475BC4
Program exit pointsShow sources
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4855
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4748
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4766
Queries a list of all running processesShow sources
Source: C:\Windows\System32\rundll32.exeProcess information queried: ProcessInformation
Contains long sleeps (>= 3 min)Show sources
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 2000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 500
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 1000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 300000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 900000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 3000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 10000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 500
Found decision node followed by non-executed suspicious APIsShow sources
Source: C:\Windows\System32\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-5612
Found dropped PE file which has not been started or loadedShow sources
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Windows\dispci.exe
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Windows\cscc.dat
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Windows\9706.tmp
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Windows\System32\rundll32.exe TID: 3468Thread sleep time: -2000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3540Thread sleep time: -5000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3548Thread sleep time: -1000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3628Thread sleep time: -300000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3468Thread sleep time: -900000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3544Thread sleep time: -540000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3468Thread sleep time: -3000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3624Thread sleep time: -10000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3544Thread sleep time: -180000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3540Thread sleep time: -500s >= -60s
Source: C:\Windows\System32\LogonUI.exe TID: 3960Thread sleep time: -60000s >= -60s
Found evasive API chain (may stop execution after checking computer name)Show sources
Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_3-4844
Found evasive API chain (may stop execution after checking mutex)Show sources
Source: C:\Windows\System32\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_3-4847

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Windows\9706.tmpCode function: 10_2_013025AC GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_013025AC

Language, Device and Operating System Detection:

barindex
Contains functionality to create pipes for IPCShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476FFE GetProcessHeap,GetProcessHeap,HeapAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,ConnectNamedPipe,PeekNamedPipe,Sleep,GetProcessHeap,HeapAlloc,ReadFile,StrChrW,GetProcessHeap,HeapFree,FlushFileBuffers,DisconnectNamedPipe,CloseHandle,3_2_00476FFE
Contains functionality to query local / system timeShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00478192 GetLocalTime,GetSystemDirectoryW,PathAppendW,wsprintfW,3_2_00478192
Contains functionality to query time zone informationShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004757E5 LocalAlloc,GetSystemDefaultLCID,GetTimeZoneInformation,memcpy,NetWkstaGetInfo,memcpy,memcpy,NetApiBufferFree,LocalAlloc,memcpy,LocalFree,LocalFree,3_2_004757E5
Contains functionality to query windows versionShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00471531 GetVersion,3_2_00471531
Queries the cryptographic machine GUIDShow sources
Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Behavior Graph

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behavior_graph main Behavior Graph ID: 394065 Sample:  i0YxTJ2SO.exe Startdate:  25/10/2017 Architecture:  WINDOWS Score:  84 1 i0YxTJ2SO.exe 1 main->1      started     18 shutdown.exe main->18      started     25 LogonUI.exe main->25      started     9823reducedSig Signatures exceeded maximum capacity for this level. 5 signatures have been hidden. 9823sig Clears the journal log 9813sig Clears the windows event log 9883sig Connects to many different private IPs (likely to spread or exploit) d1e296092reduced Connected ips exeeded maximum capacity for this level. 1 connected ip has been hidden. d1e296092 192.168.1.1, unknown unknown d1e296093 192.168.1.0, unknown unknown d1e296094 192.168.1.2, 80 unknown unknown d1e14132 cscc.dat, PE32 d1e14159 dispci.exe, PE32 d1e14186 9706.tmp, PE32 3 rundll32.exe 1 3 1->3      started     3->9823reducedSig 3->9823sig 3->9813sig 3->9883sig 3->d1e296092reduced 3->d1e296092 3->d1e296093 3->d1e296094 3->d1e14132 dropped 3->d1e14159 dropped 3->d1e14186 dropped 4reduced Processes exeeded maximum capacity for this level. 1 process has been hidden. 3->4reduced      started     4 cmd.exe 3->4      started     7 cmd.exe 3->7      started     8 cmd.exe 3->8      started     15 cmd.exe 3->15      started     22 cmd.exe 3->22      started     6 schtasks.exe 4->6      started     11 schtasks.exe 7->11      started     14 schtasks.exe 8->14      started     17 wevtutil.exe 15->17      started     26 schtasks.exe 22->26      started     process1 process3 dnsIp3 fileCreated3 signatures3 process4 process6 fileCreated1

Simulations

Behavior and APIs

TimeTypeDescription
10:18:44API Interceptor1x Sleep call for process: rundll32.exe modified from: 900000ms to: 500ms
10:18:44API Interceptor1x Sleep call for process: rundll32.exe modified from: 300000ms to: 500ms
10:18:46Task SchedulerRun new task: drogon path: C:\Windows\system32\shutdown.exe s>/r /t 0 /f
10:36:00API Interceptor4x Sleep call for process: rundll32.exe modified from: 180000ms to: 500ms
10:36:03API Interceptor1x Sleep call for process: LogonUI.exe modified from: 60000ms to: 500ms

Antivirus Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Domains

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshot

windows-stand

Startup

  • System is w7_1
  • i0YxTJ2SO.exe (PID: 3432 cmdline: 'C:\Users\user\Desktop\i0YxTJ2SO.exe' MD5: FBBDC39AF1139AEBBA4DA004475E8839)
    • rundll32.exe (PID: 3464 cmdline: C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
      • cmd.exe (PID: 3476 cmdline: /c schtasks /Delete /F /TN rhaegal MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3496 cmdline: schtasks /Delete /F /TN rhaegal MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • cmd.exe (PID: 3512 cmdline: /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit' MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3568 cmdline: schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • cmd.exe (PID: 3524 cmdline: /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00 MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3608 cmdline: schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00 MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • 9706.tmp (PID: 3560 cmdline: 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE} MD5: 37945C44A897AA42A66ADCAB68F560E0)
      • cmd.exe (PID: 3656 cmdline: /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C: MD5: AD7B9C14083B52BC532FBA5948342B98)
        • wevtutil.exe (PID: 3688 cmdline: wevtutil cl Setup MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • wevtutil.exe (PID: 3748 cmdline: wevtutil cl System MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • wevtutil.exe (PID: 3820 cmdline: wevtutil cl Security MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • wevtutil.exe (PID: 3844 cmdline: wevtutil cl Application MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • fsutil.exe (PID: 3976 cmdline: unknown MD5: B4834F08230A2EB7F498DE4E5B6AB814)
      • cmd.exe (PID: 3836 cmdline: /c schtasks /Delete /F /TN drogon MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3928 cmdline: unknown MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
  • shutdown.exe (PID: 3708 cmdline: C:\Windows\system32\shutdown.exe /r /t 0 /f MD5: 61739432482891F2DC5745CCA0A67028)
  • LogonUI.exe (PID: 3900 cmdline: 'LogonUI.exe' /flags:0x0 MD5: 3EF0D8AB08385AAB5802E773511A2E6A)
  • cleanup

Created / dropped Files

C:\Windows\9706.tmp
File Type:PE32 executable for MS Windows (console) Intel 80386 32-bit
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:7F10CDA876977CE8C2AFFCFE349A65F6C64D0BDB
SHA-256:785634393BDB64352EB3705F2E9D3BCAEE754E6B0199C90B4A361A5600FEA3FC
SHA-512:757F2EC10A018B4019BF9CF5FC26724C168EC0D07AF1E02EE66A5AFBEA9AC6BF255948BEBEE5867E868B3872AA9D40A08644B22F30D3C646F7E1C9AAAEE4BBE6
Malicious:true
Reputation:low
C:\Windows\cscc.dat
File Type:PE32 executable for MS Windows (native) Intel 80386 32-bit
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:59CD4907A438B8300A467CEE1C6FC31135757039
SHA-256:682ADCB55FE4649F7B22505A54A9DBC454B4090FC2BB84AF7DB5B0908F3B7806
SHA-512:9A5FDD0512CAF7AC029C3877CC884286082E4E041F9DC38AB00735DE097D5AC93660671E772737DF3313317D80455048A6059C12ACB6F9AFC32E2E15CB2BBEDF
Malicious:false
Reputation:low
C:\Windows\dispci.exe
File Type:PE32 executable for MS Windows (console) Intel 80386 32-bit
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:AFEEE8B4ACFF87BC469A6F0364A81AE5D60A2ADD
SHA-256:8EBC97E05C8E1073BDA2EFB6F4D00AD7E789260AFA2C276F0C72740B838A0A93
SHA-512:F5DCBF3634AEDFE5B8D6255E20015555343ADD5B1BE3801E62A5987E86A3E52495B5CE3156E4F63CF095D0CEDFB63939EAF39BEA379CCAC82A10A4182B8DED22
Malicious:false
Reputation:low
C:\Windows\infpub.dat
File Type:data
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:E9EFC622924FB965D4A14BDB6223834D9A9007E7
SHA-256:14D82A676B63AB046AE94FA5E41F9F69A65DC7946826CB3D74CEA6C030C2F958
SHA-512:AFC2A8466F106E81D423065B07AED2529CBF690AB4C3E019334F1BEDFB42DC0E0957BE83D860A84B7285BD49285503BFE95A1CF571A678DBC9BDB07789DA928E
Malicious:false
Reputation:low

Contacted Domains/Contacted IPs

Contacted Domains

No contacted domains info

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPCountryFlagASNASN NameMalicious
192.168.1.1unknown
unknownunknownfalse
192.168.1.0unknown
unknownunknownfalse
192.168.1.2unknown
unknownunknownfalse
23.54.91.27United States
20940AKAMAI-ASN1USfalse

Static File Info

General

File type:PE32 executable for MS Windows (console) Intel 80386 32-bit
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:i0YxTJ2SO.exe
File size:441899
MD5:fbbdc39af1139aebba4da004475e8839
SHA1:de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256:630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA512:74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&\..G2..G2..G2..?...G2..?...G2......G2......G2..?...G2..G3..G2......G2......G2.Rich.G2.........................PE..L......Y...

File Icon

Static PE Info

General

Entrypoint:0x4012c0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x59EC0396 [Sun Oct 22 02:33:58 2017 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:e3bda9df66f1f9b2b9b7b068518f2af1

Authenticode Signature

Signature Valid:false
Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
Signature Validation Error:The digital signature of the object did not verify
Error Number:-2146869232
Not Before, Not After
  • 12/16/2016 1:00:00 AM 12/18/2017 12:59:59 AM
Subject Chain
  • CN=Symantec Corporation, OU=STAR Security Engines, O=Symantec Corporation, L=Mountain View, S=California, C=US
Version:3
Thumbprint:AD96BB64BA36379D2E354660780C2067B81DA2E0
Serial:0EBFEA68D677B3E26CAB41C33F3E69DE

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
mov eax, 000012ACh
call 1057CFD8h
mov eax, dword ptr [00408000h]
xor eax, ebp
mov dword ptr [ebp-04h], eax
push esi
mov esi, dword ptr [00404004h]
push edi
call esi
mov edi, eax
test edi, edi
je 1057CDE2h
lea eax, dword ptr [ebp-00001250h]
push eax
mov dword ptr [ebp-00001250h], 00000000h
call esi
push eax
call dword ptr [00404050h]
mov esi, eax
test esi, esi
je 1057CDBEh
cmp dword ptr [ebp-00001250h], 01h
jne 1057CC63h
xor eax, eax
lea ebx, dword ptr [ebx+00000000h]
movzx ecx, word ptr [eax+00406CF0h]
mov word ptr [ebp+eax-0000124Ch], cx
add eax, 02h
test cx, cx
jne 1057CC2Bh
jmp 1057CC98h
mov eax, dword ptr [esi]
push eax
push edi
call dword ptr [00404060h]
mov ecx, dword ptr [esi]
add esp, 08h
lea esi, dword ptr [ecx+02h]
jmp 1057CC45h
lea ecx, dword ptr [ecx+00h]
mov dx, word ptr [ecx]
add ecx, 02h
test dx, dx
jne 1057CC37h
sub ecx, esi
sar ecx, 1
cmp word ptr [eax+ecx*2], 0022h
lea eax, dword ptr [eax+ecx*2]
jne 1057CC45h
add eax, 02h
cmp word ptr [eax], 0020h
jne 1057CC45h
add eax, 02h
lea edx, dword ptr [ebp-0000124Ch]
sub edx, eax
lea ecx, dword ptr [ecx+00h]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x6d8c0x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x7088.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x689a30x3488
IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1a8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x40000x74.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2ed30x3000False0.610188802083ump; data6.58410377892IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x40000x302a0x3200False0.81ump; data7.17725886834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x80000x33c0x200False0.048828125ump; data0.183338791656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x90000x70880x7200False0.166152686404ump; data4.20408578098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x110000x24e0x400False0.41796875ump; data3.29313868559IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x92540xea8ump; dataEnglishUnited States
RT_ICON0xa0fc0x8a8ump; dataEnglishUnited States
RT_ICON0xa9a40x568ump; GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_ICON0xaf0c0x10a8ump; dataEnglishUnited States
RT_ICON0xbfb40x25a8ump; dataEnglishUnited States
RT_ICON0xe55c0x10a8ump; dataEnglishUnited States
RT_ICON0xf6040x468ump; GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_GROUP_ICON0xfa6c0x68ump; MS Windows icon resource - 7 icons, 48x48, 256-colorsEnglishUnited States
RT_VERSION0xfad40x450ump; dataEnglishUnited States
RT_MANIFEST0xff240x161ump; ASCII text, with CRLF line terminatorsEnglishUnited States

Imports

DLLImport
KERNEL32.dllExitProcess, GetCommandLineW, GetFileSize, CreateProcessW, HeapAlloc, HeapFree, GetModuleHandleW, GetProcessHeap, WriteFile, GetSystemDirectoryW, ReadFile, GetModuleFileNameW, CreateFileW, lstrcatW, CloseHandle, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, SetUnhandledExceptionFilter
USER32.dllwsprintfW
SHELL32.dllCommandLineToArgvW
msvcrt.dllwcsstr, memcpy, free, malloc

Version Infos

DescriptionData
LegalCopyrightCopyright 1996-2017 Adobe Systems Incorporated
InternalNameAdobe Flash Player Installer/Uninstaller 27.0
FileVersion27,0,0,170
CompanyNameAdobe Systems Incorporated
LegalTrademarksAdobe Flash Player
ProductNameAdobe Flash Player Installer/Uninstaller
ProductVersion27,0,0,170
FileDescriptionAdobe Flash Player Installer/Uninstaller 27.0 r0
OriginalFilenameFlashUtil.exe
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Okt 25, 2017 10:19:05.549350977 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:05.549423933 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:05.549571991 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:05.549827099 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:05.549864054 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:06.408255100 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:06.408282995 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:06.408633947 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:11.537026882 MESZ4917180192.168.1.16192.168.1.2
Okt 25, 2017 10:19:11.537050009 MESZ8049171192.168.1.2192.168.1.16
Okt 25, 2017 10:19:12.107522011 MESZ4917180192.168.1.16192.168.1.2
Okt 25, 2017 10:19:12.107568979 MESZ8049171192.168.1.2192.168.1.16
Okt 25, 2017 10:19:12.607408047 MESZ4917180192.168.1.16192.168.1.2
Okt 25, 2017 10:19:12.607438087 MESZ8049171192.168.1.2192.168.1.16
Okt 25, 2017 10:19:12.633356094 MESZ4917580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:12.633382082 MESZ8049175192.168.1.2192.168.1.16
Okt 25, 2017 10:19:13.217000961 MESZ4917580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:13.217032909 MESZ8049175192.168.1.2192.168.1.16
Okt 25, 2017 10:19:13.716617107 MESZ4917580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:13.716655016 MESZ8049175192.168.1.2192.168.1.16
Okt 25, 2017 10:19:13.901700020 MESZ4918280192.168.1.16192.168.1.2
Okt 25, 2017 10:19:13.901732922 MESZ8049182192.168.1.2192.168.1.16
Okt 25, 2017 10:19:14.102214098 MESZ804916423.54.91.27192.168.1.16
Okt 25, 2017 10:19:14.102286100 MESZ4916480192.168.1.1623.54.91.27
Okt 25, 2017 10:19:14.102366924 MESZ4916480192.168.1.1623.54.91.27
Okt 25, 2017 10:19:14.102390051 MESZ804916423.54.91.27192.168.1.16
Okt 25, 2017 10:19:14.232072115 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:14.232112885 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:14.435813904 MESZ4918280192.168.1.16192.168.1.2
Okt 25, 2017 10:19:14.435853958 MESZ8049182192.168.1.2192.168.1.16
Okt 25, 2017 10:19:14.935329914 MESZ4918280192.168.1.16192.168.1.2
Okt 25, 2017 10:19:14.935369968 MESZ8049182192.168.1.2192.168.1.16
Okt 25, 2017 10:19:15.028579950 MESZ4918580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:15.028613091 MESZ8049185192.168.1.2192.168.1.16
Okt 25, 2017 10:19:15.518414021 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:15.518435001 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:15.518537998 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:15.545139074 MESZ4918580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:15.545197010 MESZ8049185192.168.1.2192.168.1.16
Okt 25, 2017 10:19:16.044704914 MESZ4918580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:16.044728041 MESZ8049185192.168.1.2192.168.1.16
Okt 25, 2017 10:19:31.113209963 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:31.316478968 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:31.520481110 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:31.928483963 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:32.744473934 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:34.380484104 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:37.652494907 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:44.196482897 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:57.300494909 MESZ804916723.54.91.27192.168.1.16

HTTP Request Dependency Graph

  • ts-ocsp.ws.symantec.com

HTTP Packets

TimestampSource PortDest PortSource IPDest IPHeaderTotal Bytes Transfered (KB)
Okt 25, 2017 10:19:05.549827099 MESZ4916780192.168.1.1623.54.91.27GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRi82PVYYKWGJWdgVNyePy5kYTdqQQUX5r1blzMzHSa1N197z%2Fb7EyALt0CEA7P9DjI%2Fr81bgTYapgbGlA%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ts-ocsp.ws.symantec.com
3
Okt 25, 2017 10:19:06.408255100 MESZ804916723.54.91.27192.168.1.16HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1469
content-transfer-encoding: binary
Cache-Control: max-age=419637, public, no-transform, must-revalidate
Last-Modified: Mon, 23 Oct 2017 04:49:19 GMT
Expires: Mon, 30 Oct 2017 04:49:19 GMT
Date: Wed, 25 Oct 2017 08:19:05 GMT
Connection: keep-alive
Data Raw: 30 82 05 b9 0a 01 00 a0 82 05 b2 30 82 05 ae 06 09 2b 06 01 05 05 07 30 01 01 04 82 05 9f 30 82 05 9b 30 81 9e a2 16 04 14 af f2 0c ff 31 a4 51 0e e1 aa 89 56 f6 a0 cf df 88 11 15 29 18 0f 32 30 31 37 31 30 32 33 30 34 34 39 31 39 5a 30 73 30 71 30 49 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 62 f3 63 d5 61 82 96 18 95 9d 81 53 72 78 fc b9 91 84 dd a9 04 14 5f 9a f5 6e 5c cc cc 74 9a d4 dd 7d ef 3f db ec 4c 80 2e dd 02 10 0e cf f4 38 c8 fe bf 35 6e 04 d8 6a 98 1b 1a 50 80 00 18 0f 32 30 31 37 31 30 32 33 30 34 34 39 31 39 5a a0 11 18 0f 32 30 31 37 31 30 33 30 30 34 34 39 31 39 5a 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 4f 17 f0 c8 73 f0 94 0b b9 22 58 62 c1 30 57 b3 28 4d 71 d5 ba 31 9a 12 d2 e6 e7 3c 82 35 b8 dc 42 2a f8 36 10 4c 8b 3c 87 1e 8f 27 33 23 68 b9 71 49 e1 68 91 24 63 4b 57 18 90 30 40 7b 5c 95 95 d9 01 19 b3 a0 7b 23 08 e8 6f 6c e1 f7 4b 6c 68 da e9 25 31 68 dc 1c cc 4f c0 99 f6 fb a3 f3 a5 93 10 d3 17 bb 27 b0 e7 2d 23 d9 6f 2f 6d 14 43 57 36 40 6d 09 ae 84 0e 41 69 00 77 44 ee ca d9 54 26 9c 87 67 e8 c1 f8 0d a1 b6 44 90 23 e9 20 22 5f f9 4b a3 df ed 1f 35 94 9e 09 5d 6a a7 0e 0e 88 a6 3b 3c b7 9b 5b 29 e5 82 2f 96 fe b8 ee 5c 25 0c 27 6c 3a a3 70 98 2f 24 c2 4e e3 76 47 de 53 cf 9f 17 0f 8c 47 fd 21 ee 32 83 13 81 b4 78 e2 42 c5 f8 ce f9 87 5d 3c 0b 53 e0 67 7d 8c e0 61 9c a8 f4 7d 2d b3 59 80 b6 ec db d4 59 ca 05 ef fa fb 1e 9d 70 25 46 bf 0a 3b 9c 24 f8 a0 82 03 e2 30 82 03 de 30 82 03 da 30 82 02 c2 a0 03 02 01 02 02 10 1b af 02 f5 b8 fc fa 01 4e 80 47 46 73 25 7f 23 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 5e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1d 30 1b 06 03 55 04 0a 13 14 53 79 6d 61 6e 74 65 63 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 30 30 2e 06 03 55 04 03 13 27 53 79 6d 61 6e 74 65 63 20 54 69 6d 65 20 53 74 61 6d 70 69 6e 67 20 53 65 72 76 69 63 65 73 20 43 41 20 2d 20 47 32 30 1e 17 0d 31 36 31 32 31 33 30 30 30 30 30 30 5a 17 0d 32 31 31 32 33 31 32 33 35 39 35 39 5a 30 46 31 44 30 42 06 03 55 04 03 13 3b 53 79 6d 61 6e 74 65 63 20 54 69 6d 65 20 53 74 61 6d 70 69 6e 67 20 53 65 72 76 69 63 65 73 20 43 41 20 2d 20 47 32 20 53 48 41 31 20 4f 43 53 50 20 52 65 73 70 6f 6e 64 65 72 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 86 45 f0 3c 53 d4 0c 3c 26 6d 2a a1 c3 a5 ed 80 18 55 80 ec 8c f0 54 5b db 9e d0 0e d5 96 c5 99 82 55 2a 7e 32 c0 15 ae 4c cd e3 c6 07 53 4f 71 be ab f5 58 99 39 8f f7 c7 d6 33 35 e4 0c 6d 18 80 7a d7 0a 55 7b fd 6a 8a 8d 9b 69 d3 a7 48 f2 c1 bd 90 6e 33 cc 02 ef 1f 0d 69 69 9f f3 36 2a 8f c6 e3 14 10 7c 53 b3 66 1f 6e ec 8e a8 cd 6b e1 c9 19 a1 9c 39 96 8a 6f 9c 2c 5f 84 d9 de 5f bb af 3c 1d 31 e2 7a db 68 96 0f 9e ab 9d 49 8f 9a 8d 2f c3 d6 b8 73 7a 04 24 80 34 fa 9f 74 bb a8 59 a3 a7 f9 39 c7 4e 10 1a a1 d8 52 4e 16 a1 4c 4c b4 43 fe 47 df e3 29 08 0e 53 6c df 40 5e cb f6 d3 59 09 63 cb 6f c5 f4 fa e1 71 14 35 88 00 82 41 2f f0 4a 20 81 6d 84 81 61 ed 5e 8e 74 b0 35 e0 cc 2f b1 c3 e8 9c e3 a0 61 a4 66 be 72 70 ff fb f1 4a 0a 42 e7 50 ca 73 a8 98 fc 13 9b 02 03 01 00 01 a3 81 ab 30 81 a8 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 09 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 07 80 30 0f 06 09 2b 06 01 05 05 07 30 01 05 04 02 05 00 30 22 06 03 55 1d 11 04 1b 30 19
Data Ascii: 00+0001QV)20171023044919Z0s0q0I0+bcaSrx_n\t}?L.85njP20171023044919Z20171030044919Z0*HOs"Xb0W(Mq1<5B*6L<'3#hqIh$cKW0@{\{#olKlh%1hO'-#o/mCW6@mAiwDT&gD# "_K5]j;<[)/\%'l:p/$NvGSG!2xB]<Sg}a}-YYp%F;$000NGFs%#0*H0^10UUS10USymantec Corporation100.U'Symantec Time Stamping Services CA - G20161213000000Z211231235959Z0F1D0BU;Symantec Time Stamping Services CA - G2 SHA1 OCSP Responder0"0*H0E<S<&m*UT[U*~2LSOqX935mzU{jiHn3ii6*|Sfnk9o,__<1zhI/sz$4tY9NRNLLCG)Sl@^Ycoq5A/J ma^t5/afrpJBPs00U00U%0+0U0+00"U0
4
Okt 25, 2017 10:19:06.408282995 MESZ804916723.54.91.27192.168.1.16Data Raw: a4 17 30 15 31 13 30 11 06 03 55 04 03 13 0a 54 47 56 2d 4f 46 46 2d 36 39 30 1d 06 03 55 1d 0e 04 16 04 14 af f2 0c ff 31 a4 51 0e e1 aa 89 56 f6 a0 cf df 88 11 15 29 30 1f 06 03 55 1d 23 04 18 30 16 80 14 5f 9a f5 6e 5c cc cc 74 9a d4 dd 7d ef
Data Ascii: 010UTGV-OFF-690U1QV)0U#0_n\t}?L.0*H(J.FR}7/ ~<qRb7Atze{<qOZ>'80eQzwSmQYvM\>brkF$|Z!%!S^XS:
5
Okt 25, 2017 10:19:14.232072115 MESZ4916780192.168.1.1623.54.91.27GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQd11mpyHEqFCSocj4SCu93CBydHAQUr2PWyqNOhXLgp7xB8ymiOH%2BAdWICEFRY8qrXQdZEvISpe6CWUuY%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ts-ocsp.ws.symantec.com
17
Okt 25, 2017 10:19:15.518414021 MESZ804916723.54.91.27192.168.1.16HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1589
content-transfer-encoding: binary
Cache-Control: max-age=539105, public, no-transform, must-revalidate
Last-Modified: Tue, 24 Oct 2017 14:02:01 GMT
Expires: Tue, 31 Oct 2017 14:02:01 GMT
Date: Wed, 25 Oct 2017 08:19:14 GMT
Connection: keep-alive
Data Raw: 30 82 06 31 0a 01 00 a0 82 06 2a 30 82 06 26 06 09 2b 06 01 05 05 07 30 01 01 04 82 06 17 30 82 06 13 30 81 9e a2 16 04 14 d7 13 bb f6 52 bf e9 00 ca 1f 87 36 96 e5 fa 2e 46 75 48 89 18 0f 32 30 31 37 31 30 32 34 31 34 30 32 30 31 5a 30 73 30 71 30 49 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 1d d7 59 a9 c8 71 2a 14 24 a8 72 3e 12 0a ef 77 08 1c 9d 1c 04 14 af 63 d6 ca a3 4e 85 72 e0 a7 bc 41 f3 29 a2 38 7f 80 75 62 02 10 54 58 f2 aa d7 41 d6 44 bc 84 a9 7b a0 96 52 e6 80 00 18 0f 32 30 31 37 31 30 32 34 31 34 30 32 30 31 5a a0 11 18 0f 32 30 31 37 31 30 33 31 31 34 30 32 30 31 5a 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 24 bb 19 33 14 54 7b 74 fd f0 45 4c 5d c1 ef ac d0 28 ad f4 11 b2 cf db 13 77 36 07 52 a7 72 31 be 76 55 e9 1d d0 fd 9f 41 7f ea 87 d8 0e 8b ca 24 91 f5 6e d2 58 e1 fe 48 97 6d 63 8f 24 56 8d 51 c2 f6 ee 77 6f df 4e 21 ca ef 3b 3e e1 c6 32 9f 7e 96 96 84 44 6b ed a3 87 c0 65 0d c2 12 f1 d9 f1 69 f2 ab 90 0f df 33 00 22 98 47 0e 5b 85 e2 f2 8b 79 27 1b 4c d1 d9 87 f0 42 62 7b 21 60 15 94 99 a1 d9 4a c6 1b 07 08 5c e0 bf 29 94 ab ae 42 60 b7 f4 74 78 23 01 33 88 80 cd 8a e6 0f 65 9f e3 ca 51 7b aa 6c 50 3b ae 23 d6 fa 68 df 52 75 27 d6 45 76 42 e7 63 09 c4 a4 ba bf cf 6d 42 79 f3 1b 5a 9b 61 dd dd 33 89 29 0b ef e5 28 5c ed 96 b8 7a d6 c3 8e 32 20 9a 02 9f 9f d3 e4 74 40 88 d3 eb f2 40 95 a8 4a 71 a8 07 41 7a ab 71 27 ed 0a 9b 5d b5 bf 14 c3 3a 09 95 7b b2 ea a0 82 04 5a 30 82 04 56 30 82 04 52 30 82 03 3a a0 03 02 01 02 02 10 61 6c b0 aa 9b 5e 44 cc a3 80 d8 ad fb c1 5c aa 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1d 30 1b 06 03 55 04 0a 13 14 53 79 6d 61 6e 74 65 63 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 1f 30 1d 06 03 55 04 0b 13 16 53 79 6d 61 6e 74 65 63 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 28 30 26 06 03 55 04 03 13 1f 53 79 6d 61 6e 74 65 63 20 53 48 41 32 35 36 20 54 69 6d 65 53 74 61 6d 70 69 6e 67 20 43 41 30 1e 17 0d 31 37 30 39 31 30 30 30 30 30 30 30 5a 17 0d 31 37 31 32 30 39 32 33 35 39 35 39 5a 30 39 31 37 30 35 06 03 55 04 03 13 2e 53 79 6d 61 6e 74 65 63 20 53 48 41 32 35 36 20 54 69 6d 65 53 74 61 6d 70 69 6e 67 20 43 41 20 4f 43 53 50 20 52 65 73 70 6f 6e 64 65 72 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c5 23 81 9b c8 ca 89 c2 fb 16 3a 43 1b 8a 8d 85 40 9a 3a c7 d1 b3 f3 90 80 ef 3f 1a 35 02 51 1f 01 83 b0 71 cb 52 a6 1f b9 e4 1e 62 1f ea 84 e8 fd dd 7a f6 3b 43 fd 90 6a 3d 81 f0 08 c1 c9 94 88 24 d3 e8 71 6f 7c 5c aa 1c 58 f6 68 c0 d3 86 3b 85 8d 28 b9 00 e2 e2 bb 57 be 3a 55 ec 4b f9 54 e9 57 bd 4a 85 57 f2 8c 2c 7c e6 cb 2b c7 47 cb a8 80 9f 8a 6a f1 d7 5f eb df 46 aa fe ce 72 e8 27 27 87 f0 b3 f8 38 4a de d4 8d 48 18 61 18 19 15 f1 f6 2c 53 55 9f 6d 65 17 4d 7c d0 17 09 38 69 d6 52 f1 f2 18 24 83 23 a6 9e f3 4c 3f d9 f9 a4 f2 3f 82 55 89 c4 e3 25 09 e4 8e 2a 90 11 8d 36 dd 7f 97 ba 79 c1 2a c1 ca 15 ce 36 f5 3c 6a d4 34 7e 17 aa ac 87 ca d7 b4 51 89 5f 0c 18 16 34 4e 8b 0c 0b d8 f4 3d 48 f2 b7 56 00 a9 aa 89 4e 4c 6b 5c 85 84 55 32 40 ea 29 a9 a2 2b ab 02 03 01 00 01 a3 82 01 16 30 82 01 12 30 0f 06 09 2b 06 01 05 05 07 30 01 05 04 02 05 00 30 22 06 03 55 1d 11 04 1b 30 19 a4 17 30 15 31 13 30 11 06 03 55 04 03 13 0a 54 47 56 2d 45 2d 32 39 31 37 30 1f 06 03 55 1d 23 04 18 30 16 80
Data Ascii: 01*0&+000R6.FuH20171024140201Z0s0q0I0+Yq*$r>wcNrA)8ubTXAD{R20171024140201Z20171031140201Z0*H$3T{tEL](w6Rr1vUA$nXHmc$VQwoN!;>2~Dkei3"G[y'LBb{!`J\)B`tx#3eQ{lP;#hRu'EvBcmByZa3)(\z2 t@@JqAzq']:{Z0V0R0:al^D\0*H0w10UUS10USymantec Corporation10USymantec Trust Network1(0&USymantec SHA256 TimeStamping CA0170910000000Z171209235959Z091705U.Symantec SHA256 TimeStamping CA OCSP Responder0"0*H0#:C@:?5QqRbz;Cj=$qo|\Xh;(W:UKTWJW,|+Gj_Fr''8JHa,SUmeM|8iR$#L??U%*6y*6<j4~Q_4N=HVNLk\U2@)+00+00"U0010UTGV-E-29170U#0
25
Okt 25, 2017 10:19:15.518435001 MESZ804916723.54.91.27192.168.1.16Data Raw: 14 af 63 d6 ca a3 4e 85 72 e0 a7 bc 41 f3 29 a2 38 7f 80 75 62 30 1d 06 03 55 1d 0e 04 16 04 14 d7 13 bb f6 52 bf e9 00 ca 1f 87 36 96 e5 fa 2e 46 75 48 89 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01
Data Ascii: cNrA)8ub0UR6.FuH0U00U%0+0U0hU a0_0]`HE0N0#+https://d.symcb.com/cps0'+0 https://d.symcb.com/rpa0*HQA{l;x
25

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:10:18:40
Start date:25/10/2017
Path:C:\Users\user\Desktop\i0YxTJ2SO.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\i0YxTJ2SO.exe'
Imagebase:0x75440000
File size:441899 bytes
MD5 hash:FBBDC39AF1139AEBBA4DA004475E8839
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:40
Start date:25/10/2017
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Imagebase:0x71880000
File size:44544 bytes
MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:40
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Delete /F /TN rhaegal
Imagebase:0x75440000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:41
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):false
Commandline:schtasks /Delete /F /TN rhaegal
Imagebase:0x75170000
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Imagebase:0x77390000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Imagebase:0x75440000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\9706.tmp
Wow64 process (32bit):false
Commandline:'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Imagebase:0x77390000
File size:53624 bytes
MD5 hash:37945C44A897AA42A66ADCAB68F560E0
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):false
Commandline:schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Imagebase:0x73d30000
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):false
Commandline:schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Imagebase:0x73d30000
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:45
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Imagebase:0x75790000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:00
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl Setup
Imagebase:0x76eb0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:00
Start date:25/10/2017
Path:C:\Windows\System32\shutdown.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\shutdown.exe /r /t 0 /f
Imagebase:0x77390000
File size:30720 bytes
MD5 hash:61739432482891F2DC5745CCA0A67028
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:01
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl System
Imagebase:0x74ec0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:01
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl Security
Imagebase:0x76eb0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:02
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Delete /F /TN drogon
Imagebase:0x77390000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:02
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl Application
Imagebase:0x76eb0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:02
Start date:25/10/2017
Path:C:\Windows\System32\LogonUI.exe
Wow64 process (32bit):false
Commandline:'LogonUI.exe' /flags:0x0
Imagebase:0x74a40000
File size:10752 bytes
MD5 hash:3EF0D8AB08385AAB5802E773511A2E6A
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:04
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):
Commandline:unknown
Imagebase:
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:04
Start date:25/10/2017
Path:C:\Windows\System32\fsutil.exe
Wow64 process (32bit):
Commandline:unknown
Imagebase:
File size:74240 bytes
MD5 hash:B4834F08230A2EB7F498DE4E5B6AB814
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:4.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7%
    Total number of Nodes:86
    Total number of Limit Nodes:13

    Graph

    %3 2358 3e28d5 2360 3e28df 2358->2360 2359 3e2dcb 3 API calls 2361 3e1dd2 2359->2361 2360->2359 2360->2361 2378 3e33a6 free 2262 3e12c0 2282 3e1660 2262->2282 2265 3e12eb GetCommandLineW CommandLineToArgvW 2266 3e1487 2265->2266 2268 3e130f 2265->2268 2310 3e1499 2266->2310 2270 3e1339 wcsstr 2268->2270 2274 3e1318 2268->2274 2269 3e1495 2270->2274 2271 3e138f GetSystemDirectoryW 2271->2266 2272 3e13a9 lstrcatW 2271->2272 2272->2266 2273 3e13c3 2272->2273 2284 3e10c0 GetModuleHandleW GetModuleFileNameW 2273->2284 2274->2271 2274->2274 2276 3e13d5 2276->2266 2305 3e1260 CreateFileW 2276->2305 2279 3e13f9 wsprintfW 2280 3e1430 2279->2280 2280->2280 2281 3e1449 CreateProcessW ExitProcess 2280->2281 2283 3e12cd GetCommandLineW 2282->2283 2283->2265 2283->2266 2285 3e123e 2284->2285 2286 3e110d 2284->2286 2287 3e1499 4 API calls 2285->2287 2314 3e1000 CreateFileW 2286->2314 2289 3e124b 2287->2289 2289->2276 2290 3e1126 2290->2285 2292 3e112e GetProcessHeap RtlAllocateHeap 2290->2292 2293 3e1225 2292->2293 2294 3e1189 memcpy 2292->2294 2297 3e1499 4 API calls 2293->2297 2295 3e11aa GetProcessHeap RtlAllocateHeap 2294->2295 2296 3e119e 2294->2296 2298 3e11d0 2295->2298 2299 3e11e5 GetProcessHeap HeapFree 2295->2299 2296->2295 2300 3e1238 2297->2300 2323 3e1690 2298->2323 2303 3e1499 4 API calls 2299->2303 2300->2276 2304 3e121f 2303->2304 2304->2276 2306 3e1284 WriteFile 2305->2306 2307 3e12aa 2305->2307 2308 3e12a3 CloseHandle 2306->2308 2309 3e1299 2306->2309 2307->2266 2307->2279 2308->2307 2309->2308 2311 3e14a1 2310->2311 2312 3e14a4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2310->2312 2311->2269 2312->2269 2315 3e102b GetFileSize 2314->2315 2316 3e10b5 2314->2316 2317 3e1039 GetProcessHeap RtlAllocateHeap 2315->2317 2318 3e10a3 CloseHandle 2315->2318 2316->2290 2319 3e1091 2317->2319 2320 3e1050 ReadFile 2317->2320 2318->2290 2319->2318 2320->2319 2321 3e106a 2320->2321 2321->2319 2322 3e106f GetProcessHeap HeapFree CloseHandle 2321->2322 2322->2290 2328 3e2ca1 2323->2328 2327 3e16d9 2327->2299 2337 3e2c14 2328->2337 2330 3e16c9 2330->2327 2331 3e173c 2330->2331 2333 3e1750 2331->2333 2336 3e1dd0 2331->2336 2332 3e2a4f 2332->2336 2342 3e2dcb 2332->2342 2333->2332 2334 3e1b8f memcpy 2333->2334 2333->2336 2334->2333 2336->2327 2338 3e2c21 2337->2338 2339 3e2c33 2337->2339 2338->2339 2341 3e3393 malloc 2338->2341 2339->2330 2341->2339 2345 3e2de1 2342->2345 2343 3e2e21 memcpy 2346 3e2dfa 2343->2346 2344 3e2e39 memcpy 2344->2346 2347 3e2e58 memcpy 2344->2347 2345->2343 2345->2344 2345->2346 2346->2336 2347->2346 2385 3e1be4 2388 3e17be 2385->2388 2386 3e2dcb 3 API calls 2389 3e1dd0 2386->2389 2387 3e2a4f 2387->2386 2387->2389 2388->2387 2388->2389 2390 3e1b8f memcpy 2388->2390 2390->2388 2379 3e1f3b 2380 3e1f4f 2379->2380 2381 3e2012 2380->2381 2382 3e1fe4 memcpy 2380->2382 2383 3e2dcb 3 API calls 2381->2383 2384 3e1dd2 2381->2384 2382->2381 2383->2384

    Executed Functions

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • GetCommandLineW.KERNEL32 ref: 003E12DF
    • GetCommandLineW.KERNEL32 ref: 003E12FC
    • CommandLineToArgvW.SHELL32(00000000), ref: 003E12FF
    • wcsstr.MSVCRT ref: 003E133D
    • GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 003E139B
    • lstrcatW.KERNEL32(?,\rundll32.exe), ref: 003E13B5
      • Part of subcall function 003E10C0: GetModuleHandleW.KERNEL32(00000000,?,0000030C,?), ref: 003E10F8
      • Part of subcall function 003E10C0: GetModuleFileNameW.KERNEL32(00000000), ref: 003E10FF
      • Part of subcall function 003E10C0: GetProcessHeap.KERNEL32(00000000,?,?,00000000,?,?), ref: 003E1172
      • Part of subcall function 003E10C0: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,?), ref: 003E1179
      • Part of subcall function 003E10C0: memcpy.MSVCRT ref: 003E1192
      • Part of subcall function 003E10C0: GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?), ref: 003E11BB
      • Part of subcall function 003E10C0: RtlAllocateHeap.NTDLL(00000000), ref: 003E11BE
      • Part of subcall function 003E10C0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 003E1207
      • Part of subcall function 003E10C0: HeapFree.KERNEL32(00000000), ref: 003E120A
      • Part of subcall function 003E1260: CreateFileW.KERNEL32(C:\Windows\infpub.dat,40000000,00000000,00000000,00000002,00000000,00000000), ref: 003E1277
      • Part of subcall function 003E1260: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 003E128F
      • Part of subcall function 003E1260: CloseHandle.KERNEL32(00000000), ref: 003E12A4
    • wsprintfW.USER32 ref: 003E1418
    • CreateProcessW.KERNEL32 ref: 003E1479
    • ExitProcess.KERNEL32 ref: 003E1481
      • Part of subcall function 003E1499: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E1566
      • Part of subcall function 003E1499: UnhandledExceptionFilter.KERNEL32(003E4080), ref: 003E1571
      • Part of subcall function 003E1499: GetCurrentProcess.KERNEL32(C0000409), ref: 003E157C
      • Part of subcall function 003E1499: TerminateProcess.KERNEL32(00000000), ref: 003E1583
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,0000030C,?), ref: 003E10F8
    • GetModuleFileNameW.KERNEL32(00000000), ref: 003E10FF
    • GetProcessHeap.KERNEL32(00000000,?,?,00000000,?,?), ref: 003E1172
    • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,?), ref: 003E1179
    • memcpy.MSVCRT ref: 003E1192
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?), ref: 003E11BB
    • RtlAllocateHeap.NTDLL(00000000), ref: 003E11BE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003E1207
    • HeapFree.KERNEL32(00000000), ref: 003E120A
      • Part of subcall function 003E1499: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E1566
      • Part of subcall function 003E1499: UnhandledExceptionFilter.KERNEL32(003E4080), ref: 003E1571
      • Part of subcall function 003E1499: GetCurrentProcess.KERNEL32(C0000409), ref: 003E157C
      • Part of subcall function 003E1499: TerminateProcess.KERNEL32(00000000), ref: 003E1583
      • Part of subcall function 003E1000: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 003E101A
      • Part of subcall function 003E1000: GetFileSize.KERNEL32(00000000,00000000,?,?,?), ref: 003E102D
      • Part of subcall function 003E1000: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 003E103D
      • Part of subcall function 003E1000: RtlAllocateHeap.NTDLL(00000000,?,?,?), ref: 003E1044
      • Part of subcall function 003E1000: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003E1060
      • Part of subcall function 003E1000: GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 003E1071
      • Part of subcall function 003E1000: HeapFree.KERNEL32(00000000,?,?), ref: 003E1078
      • Part of subcall function 003E1000: CloseHandle.KERNEL32(00000000), ref: 003E1080
      • Part of subcall function 003E1000: CloseHandle.KERNEL32(00000000), ref: 003E10A4
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 003E101A
    • GetFileSize.KERNEL32(00000000,00000000,?,?,?), ref: 003E102D
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 003E103D
    • RtlAllocateHeap.NTDLL(00000000,?,?,?), ref: 003E1044
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003E1060
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 003E1071
    • HeapFree.KERNEL32(00000000,?,?), ref: 003E1078
    • CloseHandle.KERNEL32(00000000), ref: 003E1080
    • CloseHandle.KERNEL32(00000000), ref: 003E10A4
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • CreateFileW.KERNEL32(C:\Windows\infpub.dat,40000000,00000000,00000000,00000002,00000000,00000000), ref: 003E1277
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 003E128F
    • CloseHandle.KERNEL32(00000000), ref: 003E12A4
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd

    Non-executed Functions

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E1566
    • UnhandledExceptionFilter.KERNEL32(003E4080), ref: 003E1571
    • GetCurrentProcess.KERNEL32(C0000409), ref: 003E157C
    • TerminateProcess.KERNEL32(00000000), ref: 003E1583
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd

    Execution Graph

    Execution Coverage:22.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:23.9%
    Total number of Nodes:1420
    Total number of Limit Nodes:13

    Graph

    %3 6361 47682f 6362 47683a 6361->6362 6363 476865 6361->6363 6364 47684e GetProcessHeap HeapFree 6362->6364 6365 476856 6362->6365 6364->6365 6365->6363 6366 47685d GetProcessHeap HeapFree 6365->6366 6366->6363 6367 47ace4 6371 47a8be 6367->6371 6368 47bb4f 6369 47becb 3 API calls 6368->6369 6370 47aed0 6368->6370 6369->6370 6371->6368 6371->6370 6372 47ac8f memcpy 6371->6372 6372->6371 6373 477bf7 GetSystemDirectoryW 6374 477c1c lstrcatW 6373->6374 6375 477cc0 6373->6375 6374->6375 6376 477c36 GetModuleFileNameW 6374->6376 6376->6375 6377 477c4d PathFindFileNameW wsprintfW 6376->6377 6378 477c7c 6377->6378 6378->6378 6379 477c90 CreateProcessW ExitProcess 6378->6379 6403 477938 6404 477941 DisableThreadLibraryCalls 6403->6404 6405 477950 6403->6405 6404->6405 6406 47b03b 6407 47b04f 6406->6407 6408 47b0e4 memcpy 6407->6408 6409 47b112 6407->6409 6408->6409 6410 47becb 3 API calls 6409->6410 6411 47aed2 6409->6411 6410->6411 6412 476aa8 6413 476ab1 6412->6413 6414 476aca 6412->6414 6413->6414 6415 476ab7 StrCmpIW 6413->6415 6415->6414 6380 47b9d5 6381 47b9df 6380->6381 6382 47becb 3 API calls 6381->6382 6383 47aed2 6381->6383 6382->6383 4738 479154 FreeLibrary 4739 479176 CreateFileW 4738->4739 4740 47923a 4738->4740 4741 4791a1 GetFileSize CloseHandle CreateFileW 4739->4741 4742 47920d DeleteFileW 4739->4742 4741->4742 4744 4791ca GetProcessHeap RtlAllocateHeap 4741->4744 4750 479016 4742->4750 4745 479204 CloseHandle 4744->4745 4746 4791e5 WriteFile GetProcessHeap HeapFree 4744->4746 4745->4742 4746->4745 4748 479233 ExitProcess 4751 47903a VirtualProtect 4750->4751 4752 479146 4750->4752 4751->4752 4757 47909e 4751->4757 4752->4748 4759 4779d7 4752->4759 4754 479129 VirtualProtect 4754->4752 4755 479123 4755->4752 4755->4754 4756 4790b0 LoadLibraryA 4756->4757 4757->4754 4757->4755 4757->4756 4758 4790fa GetProcAddress 4757->4758 4758->4757 4817 477897 4759->4817 4761 4779fc 4844 477f04 GetComputerNameW 4761->4844 4766 477a05 ExitProcess 4767 477a1b 4862 4784ee CreateToolhelp32Snapshot 4767->4862 4768 477a0d 4768->4767 4850 477e8e 4768->4850 4776 476c5f 13 API calls 4777 477a70 InitializeCriticalSection 4776->4777 4892 47652f 4777->4892 4784 477ad5 CreateThread 4786 477af8 4784->4786 4788 477aea 4784->4788 6119 4777d1 4784->6119 4785 477b99 4787 477bde Sleep 4785->4787 4955 47554a CryptAcquireContextW 4785->4955 4948 476cc8 4786->4948 4965 478a23 4787->4965 4788->4786 4922 477146 4788->4922 4793 477b03 4796 477b0c 4793->4796 4797 477b63 4793->4797 4800 476c5f 13 API calls 4796->4800 4799 476cc8 3 API calls 4797->4799 4803 477b6e CreateThread 4799->4803 4805 477b1e 4800->4805 4951 47a420 GetProcessHeap HeapAlloc 4803->4951 6135 47a1a9 4803->6135 4973 4785fb 4805->4973 4814 477b2f 4814->4797 4992 47a3b1 CreateThread 4814->4992 5000 47796e CreateThread 4814->5000 5007 476e66 4814->5007 4818 477936 4817->4818 4819 4778a8 GetTickCount srand GetTickCount 4817->4819 4818->4761 4832 47923f 4818->4832 5022 477cc5 GetCurrentProcess OpenProcessToken 4819->5022 4821 4778cc 4822 477cc5 6 API calls 4821->4822 4823 4778db 4822->4823 4824 477cc5 6 API calls 4823->4824 4825 4778ec 4824->4825 5027 47855f CreateToolhelp32Snapshot 4825->5027 4828 47554a 4 API calls 4829 47790e GetModuleFileNameW 4828->4829 4829->4818 4830 477931 4829->4830 5033 478832 CreateFileW 4830->5033 4833 479252 4832->4833 4834 47932c 4832->4834 4833->4834 4835 47925e VirtualAlloc 4833->4835 4834->4761 4836 47928b memcpy 4835->4836 4837 479329 4835->4837 4838 4792f8 VirtualProtect 4836->4838 4841 4792a9 4836->4841 4837->4834 4838->4837 4839 47930d VirtualFree 4838->4839 4839->4837 4841->4838 5042 478f35 VirtualProtect 4841->5042 4845 477f45 4844->4845 4846 477a01 4844->4846 4847 477f74 wsprintfW CreateMutexW 4845->4847 4846->4766 4846->4768 4848 477fab GetLastError 4847->4848 4849 477f99 GetLastError 4847->4849 4848->4846 4849->4846 5046 477e69 PathCombineW 4850->5046 4853 477eaa PathFileExistsW 4854 477ebb GetCurrentProcess 4853->4854 4855 477efc ExitProcess 4853->4855 5048 476f7c GetModuleHandleW GetProcAddress 4854->5048 4861 477ef4 4861->4767 4863 478509 Process32FirstW 4862->4863 4864 477a20 4862->4864 4865 478523 4863->4865 4871 4710a7 4864->4871 4866 478548 4865->4866 4868 47854a 4865->4868 4869 478536 Process32NextW 4865->4869 4867 478555 CloseHandle 4866->4867 4867->4864 5096 47841d 4868->5096 4869->4865 4872 4710c3 4871->4872 4873 4711e9 WSAStartup 4871->4873 4874 4710cc ExpandEnvironmentStringsW 4872->4874 4875 4710ec 4872->4875 4887 476c5f GetProcessHeap HeapAlloc 4873->4887 4874->4875 4876 478313 18 API calls 4875->4876 4877 471176 4876->4877 4877->4873 4878 471193 PathAppendW 4877->4878 4879 4711d7 GetProcessHeap HeapFree 4878->4879 4880 4711a9 4878->4880 4879->4873 4881 4787e7 3 API calls 4880->4881 4882 4711bb 4881->4882 4882->4879 5110 471000 4882->5110 4888 476cbd 4887->4888 4889 476c80 InitializeCriticalSection GetProcessHeap RtlAllocateHeap 4887->4889 4888->4776 4889->4888 4890 476cb8 4889->4890 5170 476bd1 4890->5170 4893 476540 4892->4893 4896 47660d 4892->4896 4894 47655b CommandLineToArgvW 4893->4894 4893->4896 4895 476576 4894->4895 4894->4896 4897 476606 LocalFree 4895->4897 4898 47657f StrToIntW 4895->4898 4907 477dd0 4896->4907 4897->4896 4899 476591 4898->4899 4899->4897 4900 4765a2 StrStrW 4899->4900 4905 476605 4899->4905 5177 4764a6 4899->5177 4900->4899 4901 4765c2 StrStrW 4900->4901 4901->4899 4903 4765dc StrChrW 4901->4903 4903->4899 4904 4765e9 4903->4904 5185 4769ae 4904->5185 4905->4897 5205 476477 GetTickCount 4907->5205 4909 477ddc NetServerGetInfo 4910 477e03 4909->4910 4911 477e0e NetApiBufferFree 4910->4911 4912 477aa3 4910->4912 4911->4912 4913 478192 4912->4913 4914 4781ab GetLocalTime 4913->4914 4915 477aa8 CreateEventW CreateThread 4913->4915 5206 476477 GetTickCount 4914->5206 4915->4784 4915->4785 6152 478a6f GetSystemMetrics 4915->6152 4917 4781ba GetSystemDirectoryW 4917->4915 4919 478200 PathAppendW 4917->4919 4919->4915 4920 4782b9 wsprintfW 4919->4920 4921 477fb7 6 API calls 4920->4921 4921->4915 5207 47a760 4922->5207 4925 476f7c 3 API calls 4926 477170 4925->4926 4927 478313 18 API calls 4926->4927 4929 47717f 4927->4929 4928 477339 4928->4786 4929->4928 4929->4929 4930 4771a0 GetTempFileNameW 4929->4930 4931 4771b8 CoCreateGuid 4930->4931 4934 477317 4930->4934 4932 4771d6 StringFromCLSID 4931->4932 4931->4934 4932->4934 4935 4771ef 4932->4935 4933 477328 GetProcessHeap HeapFree 4933->4928 4934->4933 4934->4934 5209 476faf CreateFileW 4935->5209 4938 477209 wsprintfW CreateThread 4940 4772dc 4938->4940 4941 477247 memset wsprintfW CreateProcessW 4938->4941 5214 476ffe GetProcessHeap HeapAlloc 4938->5214 4939 47730c CoTaskMemFree 4939->4934 4945 476faf 3 API calls 4940->4945 4942 4772b0 WaitForSingleObject 4941->4942 4943 4772d3 CloseHandle 4941->4943 4944 476cc8 3 API calls 4942->4944 4943->4940 4946 4772c9 TerminateThread 4944->4946 4947 4772ff DeleteFileW 4945->4947 4946->4943 4947->4939 4949 476cea 4948->4949 4950 476ccc EnterCriticalSection InterlockedExchange LeaveCriticalSection 4948->4950 4949->4793 4950->4793 4952 477b89 Sleep 4951->4952 4953 47a445 CreateThread 4951->4953 4952->4785 4953->4952 4954 47a461 GetProcessHeap HeapFree 4953->4954 5231 47a333 Sleep 4953->5231 4954->4952 4956 47556b GetLastError 4955->4956 4957 475578 CryptGenRandom CryptReleaseContext 4955->4957 4956->4957 4958 475594 4956->4958 4957->4958 4958->4787 4959 47636b GetLogicalDrives 4958->4959 4960 47638a 4959->4960 4961 476397 GetDriveTypeW 4960->4961 4962 476413 4960->4962 4961->4960 4963 4763c3 LocalAlloc 4961->4963 4962->4787 4963->4960 4964 4763d3 CreateThread 4963->4964 4964->4960 5814 476299 CreateEventW 4964->5814 5990 47808e wsprintfW wsprintfW wsprintfW wsprintfW 4965->5990 4968 478a3f 4970 478a67 ExitProcess 4968->4970 4971 478a48 InitiateSystemShutdownExW 4968->4971 4969 477fb7 6 API calls 4969->4968 4971->4970 4972 478a5e ExitWindowsEx 4971->4972 4972->4970 4974 47a760 4973->4974 4975 47860b memset 4974->4975 5995 478147 memset GetVersionExW 4975->5995 4978 478658 Process32FirstW 4980 4787ca GetLastError 4978->4980 4981 478674 4978->4981 4979 4787da 4979->4814 4982 4787d0 CloseHandle 4980->4982 4981->4982 4983 478689 OpenProcess 4981->4983 4985 4787b1 Process32NextW 4981->4985 4987 478798 CloseHandle CloseHandle 4981->4987 4989 4786f9 DuplicateTokenEx 4981->4989 4991 47875a SetTokenInformation 4981->4991 4982->4979 4983->4981 4984 4786b2 OpenProcessToken 4983->4984 4986 4786c7 GetTokenInformation 4984->4986 4984->4987 4985->4983 4988 4787c8 4985->4988 4986->4981 4986->4987 4987->4981 4988->4982 4989->4987 4990 478716 memset GetTokenInformation 4989->4990 4990->4981 4990->4987 4991->4981 4991->4987 4993 47a40d 4992->4993 4994 47a3d6 SetThreadToken 4992->4994 5997 47a016 GetCurrentThread OpenThreadToken 4992->5997 4995 47a410 SetLastError 4993->4995 4996 47a3f7 GetLastError 4994->4996 4997 47a3e7 ResumeThread 4994->4997 4995->4814 4998 47a3ff CloseHandle 4996->4998 4997->4995 4999 47a3f5 4997->4999 4998->4995 4999->4998 5001 4779d0 5000->5001 5002 477995 SetThreadToken 5000->5002 6100 477957 5000->6100 5001->4814 5003 4779a6 ResumeThread 5002->5003 5004 4779c7 CloseHandle 5002->5004 5005 4779b4 WaitForSingleObject 5003->5005 5006 4779c1 GetLastError 5003->5006 5004->5001 5005->5004 5006->5004 5008 476f73 5007->5008 5009 476e7c 5007->5009 5008->4814 5009->5008 5010 476e85 EnterCriticalSection 5009->5010 5011 476da4 2 API calls 5010->5011 5012 476e98 5011->5012 5013 476f6b LeaveCriticalSection 5012->5013 5014 476f31 GetProcessHeap HeapReAlloc 5012->5014 5015 476eae GetProcessHeap HeapAlloc 5012->5015 5013->5008 5014->5013 5016 476f52 5014->5016 5015->5013 5017 476ed4 GetProcessHeap HeapAlloc 5015->5017 5018 476e66 2 API calls 5016->5018 5019 476f21 GetProcessHeap HeapFree 5017->5019 5020 476ef3 memcpy 5017->5020 5021 476f68 5018->5021 5019->5013 5020->5013 5021->5013 5023 477cfa LookupPrivilegeValueW 5022->5023 5024 477d3c SetLastError 5022->5024 5023->5024 5025 477d0c AdjustTokenPrivileges GetLastError 5023->5025 5024->4821 5025->5024 5026 477d3a 5025->5026 5026->5024 5028 4778fe 5027->5028 5029 47857d Process32FirstW 5027->5029 5028->4828 5032 478597 5029->5032 5030 4785ee CloseHandle 5030->5028 5031 4785dc Process32NextW 5031->5032 5032->5030 5032->5031 5034 4788cd 5033->5034 5035 47885d GetFileSize 5033->5035 5034->4818 5036 47886c GetProcessHeap HeapAlloc 5035->5036 5037 4788c3 CloseHandle 5035->5037 5038 478882 ReadFile 5036->5038 5039 4788af 5036->5039 5037->5034 5038->5039 5040 478899 5038->5040 5039->5037 5040->5039 5041 47889e GetProcessHeap HeapFree 5040->5041 5041->5039 5043 478fc8 5042->5043 5045 478f58 5042->5045 5043->4838 5044 478fa1 VirtualProtect 5044->5045 5045->5043 5045->5044 5047 477e86 5046->5047 5047->4853 5047->4861 5049 476fa8 5048->5049 5050 476f9f IsWow64Process 5048->5050 5051 478313 FindResourceW 5049->5051 5050->5049 5052 47833a LoadResource 5051->5052 5053 477edd 5051->5053 5052->5053 5054 47834f LockResource 5052->5054 5053->4861 5066 4787e7 CreateFileW 5053->5066 5054->5053 5055 478361 SizeofResource 5054->5055 5055->5053 5056 478379 GetProcessHeap RtlAllocateHeap 5055->5056 5056->5053 5057 478395 memcpy 5056->5057 5058 4783b5 GetProcessHeap RtlAllocateHeap 5057->5058 5061 4783ab 5057->5061 5059 478407 GetProcessHeap HeapFree 5058->5059 5060 4783c7 5058->5060 5059->5053 5071 47a790 5060->5071 5061->5058 5061->5061 5063 4783e1 5064 4783fa GetProcessHeap HeapFree 5063->5064 5065 4783e5 5063->5065 5064->5059 5065->5059 5067 478809 WriteFile 5066->5067 5068 47882a 5066->5068 5069 478823 CloseHandle 5067->5069 5070 47881d 5067->5070 5068->4861 5069->5068 5070->5069 5076 47bda1 5071->5076 5075 47a7d9 5075->5063 5085 47bd14 5076->5085 5078 47a7c9 5078->5075 5079 47a83c 5078->5079 5083 47aed0 5079->5083 5084 47a850 5079->5084 5080 47bb4f 5080->5083 5090 47becb 5080->5090 5081 47ac8f memcpy 5081->5084 5083->5075 5084->5080 5084->5081 5084->5083 5086 47bd21 5085->5086 5087 47bd33 5085->5087 5086->5087 5089 47c493 malloc 5086->5089 5087->5078 5089->5087 5091 47bee1 5090->5091 5092 47bf39 memcpy 5091->5092 5093 47bf21 memcpy 5091->5093 5094 47befa 5091->5094 5092->5094 5095 47bf58 memcpy 5092->5095 5093->5094 5094->5083 5095->5094 5097 478430 GetCurrentProcessId 5096->5097 5098 4784e8 5096->5098 5097->5098 5099 47843f OpenProcess 5097->5099 5098->4867 5099->5098 5100 47845c OpenProcessToken 5099->5100 5101 4784e4 CloseHandle 5100->5101 5102 478474 DuplicateToken 5100->5102 5101->5098 5103 478487 AllocateAndInitializeSid 5102->5103 5104 4784df CloseHandle 5102->5104 5105 4784ad CheckTokenMembership 5103->5105 5106 4784da CloseHandle 5103->5106 5104->5101 5107 4784c4 5105->5107 5108 4784d1 FreeSid 5105->5108 5106->5104 5107->5108 5109 4784c9 TerminateProcess 5107->5109 5108->5106 5109->5108 5134 477fb7 wsprintfW GetEnvironmentVariableW 5110->5134 5113 47101c Sleep 5114 471027 GetEnvironmentVariableW 5113->5114 5115 47106b wsprintfW 5114->5115 5116 471043 GetSystemDirectoryW 5114->5116 5119 477fb7 6 API calls 5115->5119 5117 471055 lstrcatW 5116->5117 5118 47109d 5116->5118 5117->5115 5117->5118 5120 471531 5118->5120 5119->5118 5121 471533 5120->5121 5121->5121 5141 471368 OpenSCManagerW 5121->5141 5126 47155a 5133 4711d0 5126->5133 5149 4711ef RegOpenKeyW 5126->5149 5128 4711ef 7 API calls 5129 471582 5128->5129 5130 471588 GetVersion 5129->5130 5129->5133 5131 471592 5130->5131 5130->5133 5132 4711ef 7 API calls 5131->5132 5132->5133 5133->4879 5135 478004 GetSystemDirectoryW 5134->5135 5138 47802c 5134->5138 5136 478016 lstrcatW 5135->5136 5137 471018 5135->5137 5136->5137 5136->5138 5137->5113 5137->5114 5138->5138 5139 478046 CreateProcessW 5138->5139 5139->5137 5140 478075 Sleep 5139->5140 5140->5137 5142 471383 GetLastError 5141->5142 5143 47138e CreateServiceW 5141->5143 5146 4713e1 5142->5146 5144 4713c2 5143->5144 5145 4713c7 GetLastError 5143->5145 5147 4713da CloseServiceHandle 5144->5147 5148 4713dd CloseServiceHandle 5144->5148 5145->5144 5146->5126 5158 4713e8 wsprintfW RegOpenKeyExW 5146->5158 5147->5148 5148->5146 5150 471212 RegQueryValueExW 5149->5150 5151 471364 5149->5151 5157 47125c 5150->5157 5151->5128 5151->5133 5153 471356 RegCloseKey 5153->5151 5154 47134f 5154->5153 5155 4712f0 memmove memcpy RegSetValueExW 5155->5153 5156 471341 RegFlushKey 5155->5156 5156->5153 5157->5153 5157->5154 5157->5155 5159 471435 RegQueryValueExW 5158->5159 5160 47152b 5158->5160 5161 471520 RegCloseKey 5159->5161 5162 471461 5159->5162 5160->5126 5161->5160 5162->5161 5163 47146a RegSetValueExW 5162->5163 5163->5161 5164 471488 RegSetValueExW 5163->5164 5164->5161 5165 47149f RegSetValueExW 5164->5165 5165->5161 5166 4714b9 RegSetValueExW 5165->5166 5166->5161 5167 4714d1 RegSetValueExW 5166->5167 5167->5161 5168 4714ef RegSetValueExW 5167->5168 5168->5161 5169 471507 5168->5169 5169->5161 5171 476c5d 5170->5171 5176 476bdd 5170->5176 5171->4888 5172 476c53 GetProcessHeap HeapFree 5172->5171 5173 476c49 GetProcessHeap HeapFree 5173->5172 5174 476c2e GetProcessHeap HeapFree 5174->5176 5175 476c1c GetProcessHeap HeapFree 5175->5174 5176->5172 5176->5173 5176->5174 5176->5175 5178 4764d4 CommandLineToArgvW 5177->5178 5180 4764c0 5177->5180 5179 476528 5178->5179 5182 4764e8 5178->5182 5179->4899 5180->5178 5181 476521 LocalFree 5181->5179 5182->5181 5184 476520 5182->5184 5199 476b95 5182->5199 5184->5181 5186 4769c7 5185->5186 5186->5186 5187 4769d2 GetProcessHeap HeapAlloc 5186->5187 5188 4769f9 memcpy 5187->5188 5189 476a9e 5187->5189 5191 476a27 5188->5191 5189->4899 5191->5191 5192 476a32 GetProcessHeap HeapAlloc 5191->5192 5193 476a4f memcpy 5192->5193 5194 476a94 GetProcessHeap HeapFree 5192->5194 5196 476e66 13 API calls 5193->5196 5194->5189 5197 476a84 5196->5197 5197->5189 5198 476a8b GetProcessHeap HeapFree 5197->5198 5198->5194 5200 476b9f 5199->5200 5201 476bcb 5199->5201 5200->5201 5202 476bbc 5200->5202 5201->5182 5203 476e66 13 API calls 5202->5203 5204 476bc9 5203->5204 5204->5201 5205->4909 5206->4917 5208 477153 GetCurrentProcess 5207->5208 5208->4925 5210 476ff6 5209->5210 5211 476fd2 WriteFile 5209->5211 5210->4938 5210->4939 5212 476fef CloseHandle 5211->5212 5213 476fe9 5211->5213 5212->5210 5213->5212 5215 47713d 5214->5215 5216 477039 InitializeSecurityDescriptor 5214->5216 5216->5215 5217 47704a SetSecurityDescriptorDacl 5216->5217 5217->5215 5218 47705f CreateNamedPipeW 5217->5218 5218->5218 5219 47707d ConnectNamedPipe 5218->5219 5220 47712f CloseHandle 5219->5220 5224 47708d 5219->5224 5220->5218 5221 477090 PeekNamedPipe 5221->5224 5222 4770ae Sleep 5222->5224 5223 4770bf GetProcessHeap HeapAlloc 5225 47711d FlushFileBuffers DisconnectNamedPipe 5223->5225 5226 4770d3 ReadFile 5223->5226 5224->5221 5224->5222 5224->5223 5224->5225 5225->5220 5227 477112 GetProcessHeap HeapFree 5226->5227 5228 4770ec 5226->5228 5227->5225 5228->5227 5229 4770f4 StrChrW 5228->5229 5230 4769ae 23 API calls 5228->5230 5229->5227 5229->5228 5230->5227 5240 476b0e 5231->5240 5233 47a396 GetProcessHeap HeapFree 5235 47a35c 5235->5233 5238 47a390 5235->5238 5243 479f27 5235->5243 5249 476b5f 5235->5249 5253 476ad0 5235->5253 5256 476b46 GetProcessHeap HeapFree 5238->5256 5257 476ced GetProcessHeap HeapAlloc 5240->5257 5244 479f34 5243->5244 5269 476735 5244->5269 5246 479f51 5248 479f6d 5246->5248 5281 479376 PathFindFileNameW 5246->5281 5248->5235 5250 476b71 5249->5250 5250->5250 5802 476e1b 5250->5802 5254 476d35 3 API calls 5253->5254 5255 476ae1 5254->5255 5255->5235 5256->5233 5258 476b24 5257->5258 5259 476d0b 5257->5259 5258->5235 5263 476d35 5259->5263 5262 476d20 GetProcessHeap HeapFree 5262->5258 5264 476d3e 5263->5264 5267 476d1c 5263->5267 5265 476d43 EnterCriticalSection 5264->5265 5266 476d7e LeaveCriticalSection 5264->5266 5264->5267 5268 476d92 Sleep 5264->5268 5265->5264 5266->5264 5266->5267 5267->5258 5267->5262 5268->5265 5289 476477 GetTickCount 5269->5289 5272 476743 wsprintfW 5273 47676a 5272->5273 5273->5273 5274 476775 EnterCriticalSection 5273->5274 5275 476792 5274->5275 5276 476797 5274->5276 5290 476628 5275->5290 5278 4767bb StrCatW StrCatW 5276->5278 5279 4767dd SetLastError 5276->5279 5280 4767e5 LeaveCriticalSection 5278->5280 5279->5280 5280->5246 5282 4793aa WideCharToMultiByte WideCharToMultiByte inet_addr 5281->5282 5283 47943a 5281->5283 5284 4793f3 5282->5284 5285 479403 WideCharToMultiByte 5282->5285 5283->5248 5335 479332 gethostbyname 5284->5335 5306 475337 GetProcessHeap HeapAlloc 5285->5306 5289->5272 5299 47686c 5290->5299 5292 476722 5292->5276 5293 476661 wsprintfW 5294 476651 5293->5294 5294->5292 5294->5293 5295 4766ec StrCatW 5294->5295 5296 47671a 5294->5296 5302 476893 5295->5302 5305 476b46 GetProcessHeap HeapFree 5296->5305 5300 476ced 7 API calls 5299->5300 5301 476880 5300->5301 5301->5294 5303 476d35 3 API calls 5302->5303 5304 4768a4 5303->5304 5304->5294 5305->5292 5307 4754fd 5306->5307 5308 475365 rand 5306->5308 5307->5283 5309 475391 5308->5309 5310 475398 rand socket 5308->5310 5309->5310 5311 4753c5 htons inet_addr connect 5310->5311 5312 4754ed GetProcessHeap HeapFree 5310->5312 5313 475406 5311->5313 5317 4754d7 closesocket 5311->5317 5312->5307 5338 471ca3 GetProcessHeap RtlAllocateHeap 5313->5338 5317->5312 5321 4754c6 5403 471dd1 GetProcessHeap HeapAlloc 5321->5403 5332 4754ac 5443 47516b 5332->5443 5336 479345 wsprintfA 5335->5336 5337 47936f 5335->5337 5336->5337 5337->5283 5337->5285 5339 471dc7 5338->5339 5340 471cd3 GetProcessHeap HeapAlloc 5338->5340 5339->5317 5349 472191 5339->5349 5341 471ce6 htons send 5340->5341 5342 471db5 GetProcessHeap HeapFree 5340->5342 5343 471d30 recv 5341->5343 5344 471da5 GetProcessHeap HeapFree 5341->5344 5342->5339 5343->5344 5345 471d47 5343->5345 5344->5342 5345->5344 5468 471c3a 5345->5468 5347 471d5b 5347->5344 5476 471747 5347->5476 5350 471eb9 11 API calls 5349->5350 5352 4721a8 5350->5352 5351 472054 11 API calls 5351->5352 5352->5351 5353 4721d0 5352->5353 5353->5321 5354 4746c7 GetProcessHeap HeapAlloc 5353->5354 5355 474aa4 5354->5355 5356 4746fa 5354->5356 5390 4721dc GetProcessHeap HeapAlloc 5355->5390 5543 472497 GetProcessHeap HeapAlloc 5356->5543 5358 4747b1 GetProcessHeap HeapFree 5358->5355 5359 47471c 5359->5358 5360 474741 5359->5360 5361 474745 5360->5361 5364 47475a 5360->5364 5561 472e12 GetProcessHeap HeapAlloc 5361->5561 5365 474754 5364->5365 5366 4721dc 19 API calls 5364->5366 5369 47478a Sleep 5364->5369 5370 4747ae 5364->5370 5571 4729a2 GetProcessHeap HeapAlloc 5364->5571 5365->5358 5596 47317c GetProcessHeap HeapAlloc 5365->5596 5366->5364 5372 472191 22 API calls 5369->5372 5370->5358 5371 4747e9 GetProcessHeap HeapAlloc 5371->5358 5373 474802 5371->5373 5372->5364 5374 47480c GetProcessHeap HeapAlloc 5373->5374 5380 47486a 5373->5380 5375 47481d 5374->5375 5374->5380 5604 473209 GetProcessHeap HeapAlloc 5375->5604 5376 4749a6 GetProcessHeap HeapAlloc 5376->5380 5377 474a91 GetProcessHeap HeapFree 5377->5358 5378 474888 Sleep GetProcessHeap HeapAlloc 5378->5377 5378->5380 5380->5376 5380->5377 5380->5378 5383 474872 GetProcessHeap HeapFree 5380->5383 5385 474a42 5380->5385 5609 4732af GetProcessHeap HeapAlloc 5380->5609 5617 4733a4 GetProcessHeap HeapAlloc 5380->5617 5383->5380 5622 473680 GetProcessHeap HeapAlloc 5385->5622 5388 474a86 5388->5377 5391 47220b GetProcessHeap HeapAlloc 5390->5391 5392 47233b 5390->5392 5393 47232c GetProcessHeap HeapFree 5391->5393 5394 472222 htons send 5391->5394 5392->5321 5412 471eb9 GetProcessHeap HeapAlloc 5392->5412 5393->5392 5395 472263 recv 5394->5395 5396 472320 GetProcessHeap HeapFree 5394->5396 5395->5396 5397 47227f 5395->5397 5396->5393 5397->5396 5398 47228c memset GetProcessHeap HeapAlloc 5397->5398 5398->5396 5399 4722b3 htons send 5398->5399 5400 4722e4 recv 5399->5400 5401 472311 GetProcessHeap HeapFree 5399->5401 5400->5401 5402 4722fc 5400->5402 5401->5396 5402->5401 5404 471dff GetProcessHeap HeapAlloc 5403->5404 5405 471eb0 5403->5405 5406 471e9d GetProcessHeap HeapFree 5404->5406 5407 471e13 htons send 5404->5407 5405->5317 5406->5405 5408 471e8d GetProcessHeap HeapFree 5407->5408 5409 471e54 recv 5407->5409 5408->5406 5409->5408 5410 471e6d 5409->5410 5410->5408 5411 471e73 memset 5410->5411 5411->5408 5413 47204b 5412->5413 5414 471ee8 GetProcessHeap HeapAlloc 5412->5414 5413->5321 5423 472054 GetProcessHeap HeapAlloc 5413->5423 5416 472038 GetProcessHeap HeapFree 5414->5416 5417 471f2e htons 5414->5417 5416->5413 5418 471f79 5417->5418 5418->5418 5419 471fd7 send 5418->5419 5420 471ffb recv 5419->5420 5421 472028 GetProcessHeap HeapFree 5419->5421 5420->5421 5422 472012 5420->5422 5421->5416 5422->5421 5424 472083 GetProcessHeap HeapAlloc 5423->5424 5425 472188 5423->5425 5427 4720ab htons 5424->5427 5428 472175 GetProcessHeap HeapFree 5424->5428 5425->5321 5434 474ab5 5425->5434 5429 4720d6 5427->5429 5428->5425 5429->5429 5430 472127 send 5429->5430 5431 47213b recv 5430->5431 5432 472165 GetProcessHeap HeapFree 5430->5432 5431->5432 5433 472152 5431->5433 5432->5428 5433->5432 5435 472054 11 API calls 5434->5435 5436 474ad3 5435->5436 5437 474b10 5436->5437 5438 472f5a 12 API calls 5436->5438 5441 474b45 5436->5441 5439 472f5a 12 API calls 5437->5439 5438->5436 5440 474b34 5439->5440 5440->5441 5442 4721dc 19 API calls 5440->5442 5441->5321 5441->5332 5442->5441 5444 471eb9 11 API calls 5443->5444 5445 47518b 5444->5445 5446 47532d 5445->5446 5447 472054 11 API calls 5445->5447 5446->5321 5