Id: 377188 Sample Name: Upx0V9Wce6 Cookbook: Default - Jbs Time: 09:09:49 Date: 29/03/2021 Version: 31.0.0 Emerald
Id: 377188 Sample Name: Upx0V9Wce6 Cookbook: Default - Jbs Time: 09:09:49 Date: 29/03/2021 Version: 31.0.0 Emerald
Id: 377188 Sample Name: Upx0V9Wce6 Cookbook: Default - Jbs Time: 09:09:49 Date: 29/03/2021 Version: 31.0.0 Emerald
Table of Contents 2
Analysis Report UPX0v9WcE6 5
Overview 5
General Information 5
Detection 5
Signatures 5
Classification 5
Startup 5
Malware Configuration 5
Yara Overview 6
Sigma Overview 6
Signature Overview 6
AV Detection: 6
Compliance: 6
System Summary: 6
Data Obfuscation: 6
Hooking and other Techniques for Hiding and Protection: 6
Malware Analysis System Evasion: 6
HIPS / PFW / Operating System Protection Evasion: 7
Mitre Att&ck Matrix 7
Behavior Graph 7
Screenshots 8
Thumbnails 8
Antivirus, Machine Learning and Genetic Malware Detection 9
Initial Sample 9
Dropped Files 9
Unpacked PE Files 9
Domains 10
URLs 10
Domains and IPs 11
Contacted Domains 11
URLs from Memory and Binaries 11
Contacted IPs 13
Public 13
Private 13
General Information 14
Simulations 15
Behavior and APIs 15
Joe Sandbox View / Context 15
IPs 15
Domains 15
ASN 16
JA3 Fingerprints 16
Dropped Files 16
Created / dropped Files 16
Static File Info 18
General 18
File Icon 18
Static PE Info 18
General 18
Authenticode Signature 18
Entrypoint Preview 19
Data Directories 19
Sections 20
Resources 20
Imports 21
Version Infos 22
Copyright Joe Security LLC 2021 Page 2 of 36
Possible Origin 22
Network Behavior 22
Snort IDS Alerts 22
Network Port Distribution 23
TCP Packets 23
UDP Packets 24
DNS Queries 25
DNS Answers 25
Code Manipulations 26
Statistics 26
Behavior 26
System Behavior 26
Analysis Process: UPX0v9WcE6.exe PID: 5920 Parent PID: 5972 26
General 26
File Activities 26
File Read 26
Analysis Process: UPX0v9WcE6.exe PID: 956 Parent PID: 5920 27
General 27
File Activities 27
Registry Activities 27
Key Created 27
Key Value Created 27
Analysis Process: conhost.exe PID: 1908 Parent PID: 956 27
General 27
Analysis Process: UPX0v9WcE6.exe PID: 4824 Parent PID: 560 28
General 28
File Activities 28
File Read 28
Analysis Process: explorer.exe PID: 3440 Parent PID: 5920 28
General 28
File Activities 28
Registry Activities 28
Analysis Process: UPX0v9WcE6.exe PID: 6364 Parent PID: 4824 28
General 28
File Activities 29
File Written 29
Registry Activities 29
Analysis Process: conhost.exe PID: 6448 Parent PID: 6364 29
General 29
Analysis Process: UPX0v9WcE6.exe PID: 6520 Parent PID: 3440 29
General 29
File Activities 30
File Read 30
Analysis Process: UPX0v9WcE6.exe PID: 6800 Parent PID: 560 30
General 30
File Activities 30
File Read 30
Analysis Process: UPX0v9WcE6.exe PID: 6856 Parent PID: 6520 30
General 30
File Activities 30
Analysis Process: conhost.exe PID: 6992 Parent PID: 6856 31
General 31
Analysis Process: UPX0v9WcE6.exe PID: 7092 Parent PID: 3440 31
General 31
File Activities 31
File Read 31
Analysis Process: UPX0v9WcE6.exe PID: 7104 Parent PID: 6800 31
General 31
File Activities 32
File Written 32
Analysis Process: conhost.exe PID: 4700 Parent PID: 7104 32
General 32
Analysis Process: UPX0v9WcE6.exe PID: 3904 Parent PID: 7092 32
General 32
File Activities 32
Analysis Process: svchost.exe PID: 3688 Parent PID: 560 32
General 32
File Activities 33
Registry Activities 33
malicious
Evader Phishing
Infos:
suspicious
suspicious
suspicious
Creates
Hijacks a thread
Hijacks the
the inflow
control
control another
flow in existing
in another
another pr
pr…
pr…
suspicious
clean
clean
clean
clean
Injects acode
PE into
Injects code file
intointo
the a
the foreign proce
Windows
Windows Explo
Explo…
Explo…
Spyware Trojan / Bot
Injects
Overwrites into with
codecode
Overwrites code the
withWindows Explojj…
unconditional
unconditional j…
Score: 100 Adware
Writes to foreign
Abnormal
Abnormal high memory
high CPU
CPU Usage
Usageregions
Adds
Abnormal high CPU
Adds // modifies
modifies Usage
Windows
Windows certificates
certificates
Antivirus
Adds
Antivirus
/ modifies
or Windows
or Machine
Machine certificates
Learning
Learning detec
detec…
detec…
Contains or
Antivirus Machine Learning
functionality for detec…
for execution
Startup Contains functionality execution
Contains
Contains functionality
Contains for
functionality to execution
to read
read the
the PEB
PEB
System is w10x64 Contains
Creates aafunctionality
Creates DirectInput to read(often
DirectInput object
object the PEB
(often fo
fo…
fo…
UPX0v9WcE6.exe (PID: 5920 cmdline: 'C:\Users\user\Desktop\UPX0v9WcE6.exe' MD5: B4C18286275126D4682C7E336566CB66)
Creates
Creates DirectInput
aa process
process in object (often
in suspended
suspended mofo…
mo…
mo
UPX0v9WcE6.exe (PID: 956 cmdline: 'C:\Users\user\Desktop\UPX0v9WcE6.exe' MD5: B4C18286275126D4682C7E336566CB66)
conhost.exe (PID: 1908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5:
Creates
Creates filesEA777DEEA782E8B4D7C7C33BBF8A4496)
afiles
process
insidein
inside thesuspended
the system mo…
system direc
direc
direc…
explorer.exe (PID: 3440 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
Creates files
Creates or inside the
or modifies
modifies system
windows
windows direc
services
services
UPX0v9WcE6.exe (PID: 6520 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66)
UPX0v9WcE6.exe (PID: 6856 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66)
Creates or modifies windows services
connection… …
Internet
Internet Provider
Provider seen
seen in
in connection
connection
conhost.exe (PID: 6992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
Internet
May
May sleep Provider
sleep seen
(evasive
(evasive
UPX0v9WcE6.exe (PID: 7092 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66) in connection
loops)
loops) to
to hinder
hinder …
UPX0v9WcE6.exe (PID: 3904 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66)
May sleep (evasive loops) to hinder
Monitors
Monitors certain
certain registry
registry keys
keys valu…
valu…
// valu
conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
Monitors
PE OLEcertain
PE // OLE file hasregistry
file has
UPX0v9WcE6.exe (PID: 6356 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66)an keys
an invalid
invalid / valu
certificate
certificate
UPX0v9WcE6.exe (PID: 3916 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66)
PE /file
OLE file has an invalid resource
certificate…
PE file
PE contains
contains executable
executable resource…
resource
conhost.exe (PID: 2988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
PE
PE file
file contains executable
contains sections
sections with
UPX0v9WcE6.exe (PID: 1144 cmdline: C:\Windows\Explorer.EXE MD5: B4C18286275126D4682C7E336566CB66) withresource
non-s
non-s…
non-s…
UPX0v9WcE6.exe (PID: 4824 cmdline: C:\Users\user\Desktop\UPX0v9WcE6.exe MD5: B4C18286275126D4682C7E336566CB66)
PE
PE file
file contains sections
contains strange with non-s
strange resources
resources
UPX0v9WcE6.exe (PID: 6364 cmdline: C:\Users\user\Desktop\UPX0v9WcE6.exe MD5: B4C18286275126D4682C7E336566CB66)
PE
conhost.exe (PID: 6448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1file
Queries
Queries contains
MD5:disk
disk strange resourcesused…
used…
EA777DEEA782E8B4D7C7C33BBF8A4496)
information
information (often
(often used
UPX0v9WcE6.exe (PID: 6800 cmdline: C:\Users\user\Desktop\UPX0v9WcE6.exe MD5: B4C18286275126D4682C7E336566CB66)
Queries disk
Queries the information
the volume
volume (often used
information
information (nam
(nam…
(nam…
UPX0v9WcE6.exe (PID: 7104 cmdline: C:\Users\user\Desktop\UPX0v9WcE6.exe MD5: B4C18286275126D4682C7E336566CB66)
Sample
Queries
conhost.exe (PID: 4700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5:
Sample execution
theEA777DEEA782E8B4D7C7C33BBF8A4496)
volume
execution stops
information
stops while
while proce
(nam
proce…
proce …
svchost.exe (PID: 3688 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
Sample
Sample execution
Sample file
file is stops
is different
different while
than
than proce…
original
original
UPX0v9WcE6.exe (PID: 6304 cmdline: C:\Users\user\Desktop\UPX0v9WcE6.exe MD5: B4C18286275126D4682C7E336566CB66)
Sample
UPX0v9WcE6.exe (PID: 5668 cmdline: C:\Users\user\Desktop\UPX0v9WcE6.exe MD5:
Uses
Uses filePE
is different than original
B4C18286275126D4682C7E336566CB66)
32bit
32bit PE files
files
conhost.exe (PID: 6068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
Uses 32bit
Uses code PE files
code obfuscation
obfuscation techniques
techniques ((…
(…
cleanup
Uses code obfuscation techniques (
Malware Configuration
No yara matches
Sigma Overview
Signature Overview
• AV Detection
• Compliance
• Networking
• Key, Mouse, Clipboard, Microphone and Screen Capturing
• System Summary
• Data Obfuscation
• Boot Survival
• Hooking and other Techniques for Hiding and Protection
• Malware Analysis System Evasion
• Anti Debugging
• HIPS / PFW / Operating System Protection Evasion
• Language, Device and Operating System Detection
• Lowering of HIPS / PFW / Operating System Security Settings
AV Detection:
Compliance:
System Summary:
Data Obfuscation:
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Replication Launchd Rc.common Rc.common Software Cached System Information VNC GUI Input Exfiltration Multiband Jamming or
Through Packing 2 1 Domain Discovery 1 2 3 Capture Over C2 Communication Denial of
Removable Credentials Channel Service
Media
Behavior Graph
Legend:
Process
Behavior Graph
Signature
ID: 377188
Sample:
Startdate:
UPX0v9WcE6
29/03/2021
Created File
Architecture: WINDOWS
Score: 100
DNS/IP Info
Multi AV Scanner detection
for domain / URL
Multi AV Scanner detection
for submitted file
PE file has nameless
sections
started started started
Is Dropped
Is Windows Process
UPX0v9WcE6.exe UPX0v9WcE6.exe UPX0v9WcE6.exe
m1.uptime66.com
Is malicious
started started started started started 195.181.164.212, 443, 49709, 49724 started started started
CDN77GB Internet
United Kingdom
1 1
Screenshots
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
No bigger version
Initial Sample
Dropped Files
No Antivirus matches
Unpacked PE Files
Domains
URLs
Contacted Domains
Contacted IPs
Public
Private
Copyright Joe Security LLC 2021 Page 13 of 36
IP
127.0.0.1
General Information
Simulations
IPs
No context
Domains
ASN
Match Associated Sample Name / URL SHA 256 Detection Link Context
CDN77GB tGN2wiPl8p.exe Get hash malicious Browse 195.181.169.92
kWobwGNLtC.exe Get hash malicious Browse 195.181.169.92
zPdANLbcCg.exe Get hash malicious Browse 195.181.169.92
7KMJcMzppg.exe Get hash malicious Browse 195.181.169.92
y6NjIs8UiA.exe Get hash malicious Browse 195.181.169.92
P4fr8v14dH.exe Get hash malicious Browse 195.181.169.92
P4fr8v14dH.exe Get hash malicious Browse 195.181.169.92
Q lifesettlements INVOICE.htm Get hash malicious Browse 89.187.165.193
fd5aDwmrwz.exe Get hash malicious Browse 195.181.169.92
IQZ1hKe5o0.exe Get hash malicious Browse 195.181.169.92
PGUmVNEaTC.exe Get hash malicious Browse 84.17.52.78
PERuTR7vGb.dll Get hash malicious Browse 89.187.165.7
JA3 Fingerprints
No context
Dropped Files
No context
C:\ProgramData\Microsoft\Network\Downloader\edb.log
Process: C:\Windows\System32\svchost.exe
File Type: data
Category: dropped
Size (bytes): 4096
Entropy (8bit): 0.5935016132784936
Encrypted: false
SSDEEP: 6:0FmiEk1GaD0JOCEfMuaaD0JOCEfMKQmDTpJtAl/gz2cE0fMbhEZolrRSQ2hyYIIT:0xrGaD0JcaaD0JwQQjtAg/0bjSQJ
MD5: D868741BA12034317B75D0EDB2296F87
SHA1: 049231B9FB0F719DC80E5B580A085D28EA049BC6
SHA-256: 8191C0B8FC6B153994C307575C3BB1B1B618766820F07404A8723B8F372CAE24
SHA-512: 7252F736E3BA36B107EF1493D6DE0343346C0D8E2D7C0196889328260145798C8C9A0B1E006FCA7A80E1F6A62801FCF636E1235DF6B9B7CD06729CFB55099471
Malicious: false
Preview:
......:{..(..........y............... ..1C:\ProgramData\Microsoft\Network\Downloader\.................................................................................................................................................
........................................................................C:\ProgramData\Microsoft\Network\Downloader\............................................................................................................................
..............................................................................................0u..................@[email protected]............&......e.f.3...w.......................3...w..................h..C.:.\.P.r.o.g.r.a.m
.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b...G..........................................................................................................................................................
..................................................
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Process: C:\Windows\System32\svchost.exe
File Type: Extensible storage user DataBase, version 0x620, checksum 0xe83c5c89, page size 16384, DirtyShutdown, Windows version 10.0
Category: dropped
Size (bytes): 32768
Entropy (8bit): 0.09493202460636412
Encrypted: false
SSDEEP: 6:tkGzwl/+j4rUMRIE11Y8TRXDTUFXl8KnkGzwl/+j4rUMRIE11Y8TRXDTUFXl8K:90+j4FO4blTKz0+j4FO4blTK
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
Process: C:\Windows\System32\svchost.exe
File Type: data
Category: dropped
Size (bytes): 8192
Entropy (8bit): 0.10759976255945254
Encrypted: false
SSDEEP: 3:2Slt1EviVl+l7l/bJdAtiRSEll/llall:FyiVkl7t40XlA
MD5: 46FE72BBE9A8BF20845E600816203BDA
SHA1: 6EED8EBE85DA87950003385A5AEE940F6406045B
SHA-256: AD99051B34420518942F7ABFE90B41D001D11AA86DB36F6D8E61CB1E1A2302C0
SHA-512: DCAF70FC0A1902F51DE3C27ECCB7084EFBA2AF48935BCE60E44387F8759CB47530E516E1B4AFED077E83E3CD6187D805A2188EDE735653F6D8FE0226E63A1D
CA
Malicious: false
Preview:
?..n.....................................3...w.......yq......w...............w.......w....:O.....w....................w......yq...........................................................................................................................
..............................................................................................................................................................................................................................................................................
..............................................................................................................................................................................................................................................................................
..................................................................................................................................................................................................................
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
Process: C:\Windows\System32\svchost.exe
File Type: ASCII text, with no line terminators
Category: dropped
Size (bytes): 55
Entropy (8bit): 4.306461250274409
Encrypted: false
SSDEEP: 3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
MD5: DCA83F08D448911A14C22EBCACC5AD57
SHA1: 91270525521B7FE0D986DB19747F47D34B6318AD
SHA-256: 2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
SHA-512: 96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBAC
A
Malicious: false
Preview:
{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
\Device\ConDrv
Process: C:\Users\user\Desktop\UPX0v9WcE6.exe
File Type: ASCII text
Category: dropped
Size (bytes): 667
Entropy (8bit): 5.06057468541587
Encrypted: false
SSDEEP: 12:cfygzgypRmLhGu/RU2WBjGomqRUQsAkRU2WBkFBqRUQVZOEiBqyfdGBiBqyXORaT:uzAxRJ0jG6R1sbRJ0QMR1VZmM8dFM82u
MD5: DC8E00B1BA9FDF5363C925429151D018
SHA1: 249FEC2E3111BDD890565170FF1A27E70B54D315
SHA-256: 8ECC47C2FE6368EE093FB95186BE03407E7FC857A3BE0C89964C0B35B1D5B223
SHA-512: 73041EC987FDA3DD349AF9B84256FD828A1B6C20E13BD23E75BA835B361D7C3959213F03B3FF7B10298FDFF0D3C3513BFE8CBCD7C43FE512080DE7D4778D17C
0
Malicious: false
Preview:
panic: runtime error: invalid memory address or nil pointer dereference.[signal 0xc0000005 code=0x0 addr=0x0 pc=0x8365fd]..goroutine 7 [running]:.netbounce/tunnel.
(*Client).changeState(0x0, 0x1, 0x0, 0x0, 0x53)..C:/Users/Bob/go/src/netbounce/tunnel/client.go:409 +0x1d.netbounce/tunnel.(*Client).Start(0x0)..C:/Users/Bob/go/src/ne
tbounce/tunnel/client.go:273 +0x79.main.(*Program).startTunnelClients(0x11da3d00)..C:/Users/Bob/go/src/netbounce/client/clientworks.go:234 +0x74.main.(*Program)
.run(0x11da3d00)..C:/Users/Bob/go/src/netbounce/client/clientworks.go:325 +0x6a5.created by main.(*Program).Start..C:/Users/Bob/go/src/netbounce/client/clientwo
rks.go:213 +0x5c.
General
File type: PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit): 7.900869257046194
TrID: Win32 Executable (generic) a (10002005/4)
97.75%
Windows ActiveX control (116523/4) 1.14%
Inno Setup installer (109748/4) 1.07%
Generic Win/DOS Executable (2004/3) 0.02%
DOS Executable Generic (2002/1) 0.02%
File name: UPX0v9WcE6.exe
File size: 9046968
MD5: b4c18286275126d4682c7e336566cb66
SHA1: e1e3bcb27fec92d160591aca62e058654e2ef4a8
SHA256: 7c84f12d1931043664fde0954a5af1b0e30edd8f7fcc6b33
cfe298fc431baa84
SHA512: 2a47a5ba1e7a30cb6f89080e8943e62ff3fc9fd12a8cea93
9afbcdd8eed8b8f1c311e3b4c89b82454e0522a81129b0f
bf11a5be9fe4332cd3a05533ac8b13be9
SSDEEP: 196608:6jqN6pnt2NzFFXmCXNvyZRJHWhf0IemjoBbe
X:6txUNzL2ONMJHrIeMMbeX
File Content Preview: [email protected]....................!..L.
!..This program must be run under Win32..$7..................
.........................................................................................
............................
File Icon
Static PE Info
General
Entrypoint: 0x49b7dc
Entrypoint Section: CODE
Digitally signed: true
Imagebase: 0x400000
Subsystem: windows gui
Image File Characteristics: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO,
EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI,
RELOCS_STRIPPED
DLL Characteristics:
Time Stamp: 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major: 1
OS Version Minor: 0
File Version Major: 1
File Version Minor: 0
Subsystem Version Major: 1
Subsystem Version Minor: 0
Import Hash: ba4cc0afb12afe0a3f885ae6696404ed
Authenticode Signature
Entrypoint Preview
Instruction
push ebp
mov ebp, esp
add esp, FFFFFFF4h
push ebx
push esi
push edi
call 00007FF080DBC86Fh
call 00007FF080DBEBC6h
call 00007FF080DBF91Dh
call 00007FF080DBFD70h
call 00007FF080DC32F3h
call 00007FF080DCA106h
call 00007FF080DCA369h
call 00007FF080DCC2C0h
call 00007FF080DD29D3h
call 00007FF080DDE8CEh
call 00007FF080DE90E1h
call 00007FF080DEA3C8h
call 00007FF080E0929Fh
call 00007FF080E09766h
call 00007FF080E0A0D1h
call 00007FF080E0B4B0h
call 00007FF080E0CEA3h
call 00007FF080E10DBAh
call 00007FF080E11D19h
call 00007FF080E1302Ch
call 00007FF080E1EEDBh
call 00007FF080E2785Eh
call 00007FF080E34005h
call 00007FF080E3F614h
call 00007FF080E51C83h
xor eax, eax
push ebp
push 0049B8A0h
push dword ptr fs:[eax]
mov dword ptr fs:[eax], esp
push 00000001h
call 00007FF080DBEF4Ah
call 00007FF080E54A35h
mov eax, 0049B51Ch
push eax
push 0049B528h
mov eax, dword ptr [0049E62Ch]
call 00007FF080DDDDE8h
call 00007FF080E54A63h
xor eax, eax
pop edx
pop ecx
pop ecx
mov dword ptr fs:[eax], edx
jmp 00007FF080E54D2Bh
jmp 00007FF081DBC2E0h
Data Directories
Sections
Name Virtual Address Virtual Size Raw Size Xored PE ZLIB Complexity File Type Entropy Characteristics
CODE 0x1000 0x9aa20 0x9ac00 False 0.496884150343 data 6.60249204826 IMAGE_SCN_MEM_EXECUTE,
IMAGE_SCN_CNT_CODE,
IMAGE_SCN_MEM_READ
DATA 0x9c000 0x1144 0x1200 False 0.458116319444 data 4.56609282758 IMAGE_SCN_CNT_INITIALIZED_D
ATA, IMAGE_SCN_MEM_WRITE,
IMAGE_SCN_MEM_READ
BSS 0x9e000 0x1590 0x0 False 0 empty 0.0 IMAGE_SCN_MEM_WRITE,
IMAGE_SCN_MEM_READ
.idata 0xa0000 0x2632 0x2800 False 0.3662109375 data 4.88501269308 IMAGE_SCN_CNT_INITIALIZED_D
ATA, IMAGE_SCN_MEM_WRITE,
IMAGE_SCN_MEM_READ
.tls 0xa3000 0x8 0x0 False 0 empty 0.0 IMAGE_SCN_MEM_WRITE,
IMAGE_SCN_MEM_READ
.rdata 0xa4000 0x18 0x200 False 0.05078125 data 0.210826267787 IMAGE_SCN_CNT_INITIALIZED_D
ATA,
IMAGE_SCN_MEM_SHARED,
IMAGE_SCN_MEM_READ
.reloc 0xa5000 0x8d0c 0x0 False 0 empty 0.0 IMAGE_SCN_CNT_INITIALIZED_D
ATA,
IMAGE_SCN_MEM_SHARED,
IMAGE_SCN_MEM_READ
0xae000 0x52838 0x52a00 False 0.0617406155446 data 2.06375406771 IMAGE_SCN_CNT_INITIALIZED_D
ATA,
IMAGE_SCN_MEM_SHARED,
IMAGE_SCN_MEM_READ
CloudMot 0x101000 0x7ae000 0x7ae000 unknown unknown unknown unknown IMAGE_SCN_MEM_EXECUTE,
IMAGE_SCN_CNT_CODE,
IMAGE_SCN_MEM_READ
Analysis 0x8af000 0xf4f 0x200 False 0.02734375 data 0.0 IMAGE_SCN_MEM_EXECUTE,
IMAGE_SCN_CNT_INITIALIZED_D
ATA, IMAGE_SCN_MEM_READ
Resources
Imports
DLL Import
kernel32.dll DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree,
LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError,
GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize,
GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
user32.dll MessageBoxA
oleaut32.dll SafeArrayPutElement, SafeArrayCreate, VariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen,
SysAllocStringLen
advapi32.dll SetSecurityDescriptorDacl, RegSetValueExA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegEnumValueA,
RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey, OpenThreadToken,
OpenProcessToken, LookupPrivilegeValueA, InitializeSecurityDescriptor, GetUserNameA, GetTokenInformation, FreeSid,
EqualSid, AllocateAndInitializeSid
kernel32.dll lstrcmpA, WriteProfileStringA, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualFree, VirtualAlloc,
TransactNamedPipe, TerminateThread, TerminateProcess, Sleep, SizeofResource, SetNamedPipeHandleState, SetLastError,
SetFileTime, SetFilePointer, SetFileAttributesA, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, RemoveDirectoryA,
ReleaseMutex, ReadFile, QueryPerformanceCounter, OpenProcess, OpenMutexA, MultiByteToWideChar, MulDiv,
MoveFileExA, MoveFileA, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryExA, LoadLibraryA,
IsDBCSLeadByte, IsBadWritePtr, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalDeleteAtom,
GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetTickCount,
GetSystemTimeAsFileTime, GetSystemInfo, GetSystemDirectoryA, GetSystemDefaultLCID, GetShortPathNameA,
GetProfileStringA, GetProcAddress, GetPrivateProfileStringA, GetOverlappedResult, GetModuleHandleA,
GetModuleFileNameA, GetLogicalDrives, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize,
GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA,
GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA,
GetComputerNameA, GetCommandLineA, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA,
FlushFileBuffers, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime,
DeviceIoControl, DeleteFileA, CreateThread, CreateProcessA, CreateNamedPipeA, CreateMutexA, CreateFileA,
CreateEventA, CreateDirectoryA, CopyFileA, CompareStringA, CompareFileTime, CloseHandle
Copyright Joe Security LLC 2021 Page 21 of 36
DLL Import
version.dll VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
gdi32.dll UnrealizeObject, TextOutA, StretchDIBits, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode,
SetROP2, SetPixel, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC,
RemoveFontResourceA, Rectangle, RectVisible, RealizePalette, Polyline, Pie, PatBlt, MoveToEx, LineTo, LineDDA,
IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A,
GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits,
GetCurrentPositionEx, GetClipBox, GetBitmapBits, ExtFloodFill, ExcludeClipRect, EnumFontsA, Ellipse, DeleteObject,
DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateFontIndirectA, CreateDIBitmap,
CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, Chord, BitBlt, Arc,
AddFontResourceA
user32.dll WindowFromPoint, WinHelpA, WaitMessage, WaitForInputIdle, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx,
TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowOwnedPopups,
ShowCursor, SetWindowRgn, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement,
SetWindowLongW, SetWindowLongA, SetTimer, SetScrollPos, SetScrollInfo, SetRectEmpty, SetRect, SetPropA, SetMenu,
SetForegroundWindow, SetFocus, SetCursor, SetCapture, SetActiveWindow, SendNotifyMessageA, SendMessageTimeoutA,
SendMessageW, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, ReplyMessage, RemovePropA,
RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClassA, PtInRect, PostQuitMessage,
PostMessageA, PeekMessageA, OffsetRect, OemToCharBuffA, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA,
MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer,
IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, InvalidateRect,
IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRgn,
GetWindowRect, GetWindowPlacement, GetWindowLongA, GetSystemMetrics, GetSystemMenu, GetSysColor, GetSubMenu,
GetScrollPos, GetPropA, GetParent, GetWindow, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState,
GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow,
GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassInfoW, GetClassInfoA,
GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows,
EnumThreadWindows, EndPaint, EnableWindow, EnableMenuItem, DrawTextW, DrawTextA, DrawMenuBar, DrawIconEx,
DrawIcon, DrawFrameControl, DrawFocusRect, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon,
DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreateWindowExA, CreatePopupMenu,
CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcW, CallWindowProcA, CallNextHookEx,
BringWindowToTop, BeginPaint, AppendMenuA, CharPrevA, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA,
CharToOemBuffA, AdjustWindowRectEx
ole32.dll CoTaskMemFree, CLSIDFromProgID, CoCreateInstance, CoFreeUnusedLibraries, CoUninitialize, CoInitialize, IsEqualGUID
oleaut32.dll GetActiveObject, RegisterTypeLib, LoadTypeLib, SysFreeString
shell32.dll ShellExecuteExA, ShellExecuteA, SHGetFileInfoA, ExtractIconA
shell32.dll SHChangeNotify, SHBrowseForFolder, SHGetPathFromIDList, SHGetMalloc
ole32.dll CoDisconnectObject
advapi32.dll AdjustTokenPrivileges
Version Infos
Description Data
LegalCopyright (C) 2020 Advanced Micro Devices, Inc.
ISInternalVersion 23.0.511
InternalName Setup
FileVersion 2.6.2.1818
CompanyName Advanced Micro Devices, Inc.
Internal Build Number 174648
ProductName AMD Ryzen Master
ProductVersion 2.6.2.1818
FileDescription AMD Ryzen Master Installation
ISInternalDescription Setup Launcher Unicode
OriginalFilename InstallShield Setup.exe
Translation 0x0409 0x04b0
Possible Origin
Network Behavior
Total Packets: 59
• 53443(DNS)
• (HTTPS)
TCP Packets
UDP Packets
DNS Queries
DNS Answers
Timestamp Source IP Dest IP Trans ID Reply Code Name CName Address Type Class
Mar 29, 2021 8.8.8.8 192.168.2.6 0x2e4b No error (0) m1.uptime6 195.181.164.212 A (IP address) IN (0x0001)
09:11:21.865324020 6.com
CEST
Mar 29, 2021 8.8.8.8 192.168.2.6 0x9ca6 No error (0) m1.uptime6 195.181.164.212 A (IP address) IN (0x0001)
09:11:59.198646069 6.com
CEST
Mar 29, 2021 8.8.8.8 192.168.2.6 0x94c7 No error (0) m1.uptime6 195.181.164.212 A (IP address) IN (0x0001)
09:12:34.239896059 6.com
CEST
Statistics
Behavior
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• conhost.exe
• UPX0v9WcE6.exe
• explorer.exe
• UPX0v9WcE6.exe
• conhost.exe
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• conhost.exe
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• conhost.exe
• UPX0v9WcE6.exe
• svchost.exe
• conhost.exe
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• UPX0v9WcE6.exe
• conhost.exe
• conhost.exe
• UPX0v9WcE6.exe
System Behavior
General
File Activities
File Read
Source
File Path Offset Length Completion Count Address Symbol
C:\Windows\SysWOW64\ntdll.dll unknown 1024 success or wait 1 2A92917 ReadFile
C:\Windows\SysWOW64\ntdll.dll unknown 1124864 success or wait 7 2A929DE ReadFile
General
File Activities
Source
File Path Access Attributes Options Completion Count Address Symbol
Registry Activities
Key Created
Source
Key Path Completion Count Address Symbol
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\pubgame-updater success or wait 1 45D125 RegCreateKeyExW
Source
Key Path Name Type Data Completion Count Address Symbol
HKEY_CURRENT_USER\Software\Mic Prun unicode "C:\Program Files (x86)\Public success or wait 1 45D125 RegSetValueExW
rosoft\Windows\CurrentVersion\Run Gaming\prun.exe"
HKEY_LOCAL_MACHINE\SYSTEM\Cont CustomSource dword 1 success or wait 1 45D125 RegSetValueExW
rolSet001\Services\EventLog\Application\pubgame-
updater
HKEY_LOCAL_MACHINE\SYSTEM\Cont EventMessageFile expand %SystemRoot%\System32\EventCre success or wait 1 45D125 RegSetValueExW
rolSet001\Services\EventLog\Application\pubgame- unicode ate.exe
updater
HKEY_LOCAL_MACHINE\SYSTEM\Cont TypesSupported dword 7 success or wait 1 45D125 RegSetValueExW
rolSet001\Services\EventLog\Application\pubgame-
updater
General
General
File Activities
File Read
Source
File Path Offset Length Completion Count Address Symbol
C:\Windows\SysWOW64\ntdll.dll unknown 1024 success or wait 1 15F2917 ReadFile
C:\Windows\SysWOW64\ntdll.dll unknown 1124864 success or wait 7 15F29DE ReadFile
General
File Activities
Source
File Path Offset Length Value Ascii Completion Count Address Symbol
Source
File Path Offset Length Completion Count Address Symbol
Registry Activities
Source
Key Path Name Type Data Completion Count Address Symbol
General
File Activities
Source
File Path Access Attributes Options Completion Count Address Symbol
File Written
Source
File Path Offset Length Value Ascii Completion Count Address Symbol
\Device\ConDrv unknown 7 70 61 6e 69 63 3a 20 panic: success or wait 80 45D125 WriteFile
Source
File Path Offset Length Completion Count Address Symbol
Registry Activities
Source
Key Path Name Type Old Data New Data Completion Count Address Symbol
General
General
File Activities
File Read
Source
File Path Offset Length Completion Count Address Symbol
C:\Windows\SysWOW64\ntdll.dll unknown 1024 success or wait 1 2A32917 ReadFile
C:\Windows\SysWOW64\ntdll.dll unknown 1124864 success or wait 7 2A329DE ReadFile
General
File Activities
File Read
Source
File Path Offset Length Completion Count Address Symbol
C:\Windows\SysWOW64\ntdll.dll unknown 1024 success or wait 1 15C2917 ReadFile
C:\Windows\SysWOW64\ntdll.dll unknown 1124864 success or wait 7 15C29DE ReadFile
General
File Activities
Source
File Path Access Attributes Options Completion Count Address Symbol
General
General
File Activities
File Read
Source
File Path Offset Length Completion Count Address Symbol
C:\Windows\SysWOW64\ntdll.dll unknown 1024 success or wait 1 2A52917 ReadFile
C:\Windows\SysWOW64\ntdll.dll unknown 1124864 success or wait 7 2A529DE ReadFile
General
Source
File Path Access Attributes Options Completion Count Address Symbol
File Written
Source
File Path Offset Length Value Ascii Completion Count Address Symbol
\Device\ConDrv unknown 7 70 61 6e 69 63 3a 20 panic: success or wait 80 45D125 WriteFile
Source
File Path Offset Length Completion Count Address Symbol
General
General
File Activities
Source
File Path Access Attributes Options Completion Count Address Symbol
General
File Activities
Source
File Path Access Attributes Options Completion Count Address Symbol
Source
File Path Offset Length Value Ascii Completion Count Address Symbol
Source
File Path Offset Length Completion Count Address Symbol
Registry Activities
Source
Key Path Completion Count Address Symbol
Source
Key Path Name Type Data Completion Count Address Symbol
General
General
File Activities
Source
File Path Offset Length Completion Count Address Symbol
General
File Activities
File Read
Source
File Path Offset Length Completion Count Address Symbol
C:\Windows\SysWOW64\ntdll.dll unknown 1024 success or wait 1 2932917 ReadFile
C:\Windows\SysWOW64\ntdll.dll unknown 1124864 success or wait 7 29329DE ReadFile
General
File Activities
Source
File Path Access Attributes Options Completion Count Address Symbol
File Written
Source
File Path Offset Length Value Ascii Completion Count Address Symbol
\Device\ConDrv unknown 7 70 61 6e 69 63 3a 20 panic: success or wait 80 45D125 WriteFile
General
General
General
General
Copyright Joe Security LLC 2021 Page 35 of 36
Start time: 09:12:37
Start date: 29/03/2021
Path: C:\Users\user\Desktop\UPX0v9WcE6.exe
Wow64 process (32bit): true
Commandline: C:\Windows\Explorer.EXE
Imagebase: 0x400000
File size: 9046968 bytes
MD5 hash: B4C18286275126D4682C7E336566CB66
Has elevated privileges: true
Has administrator privileges: true
Programmed in: C, C++ or other language
Disassembly
Code Analysis