Click to jump to signature section
Source: gRo3W1D3VU.exe | Malware Configuration Extractor: Customer Loader {"C2 url": "https://kyliansuperm92139124.shop/customer/914"} |
Source: gRo3W1D3VU.exe | Virustotal: Detection: 50% | Perma Link |
Source: gRo3W1D3VU.exe | ReversingLabs: Detection: 50% |
Source: https://kyliansuperm92139124.shop/customer/914 | Avira URL Cloud: Label: malware |
Source: https://kyliansuperm92139124.shop | Avira URL Cloud: Label: phishing |
Source: kyliansuperm92139124.shop | Virustotal: Detection: 17% | Perma Link |
Source: https://kyliansuperm92139124.shop | Virustotal: Detection: 11% | Perma Link |
Source: https://kyliansuperm92139124.shop/customer/914 | Virustotal: Detection: 20% | Perma Link |
Source: gRo3W1D3VU.exe | String decryptor: VirtualProtect |
Source: gRo3W1D3VU.exe | String decryptor: amsi.dll |
Source: gRo3W1D3VU.exe | String decryptor: AmsiScanBuffer |
Source: gRo3W1D3VU.exe | String decryptor: https://kyliansuperm92139124.shop/customer/914 |
Source: gRo3W1D3VU.exe | String decryptor: !!!(.*?)!!! |
Source: gRo3W1D3VU.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor | URLs: https://kyliansuperm92139124.shop/customer/914 |
Source: unknown | DNS traffic detected: query: kyliansuperm92139124.shop replaycode: Server failure (2) |
Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://kyliansuperm92139124.shop |
Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E641D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://kyliansuperm92139124.shop/customer/914 |
Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64256000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://kyliansuperm92139124.shopx |
Source: unknown | DNS traffic detected: queries for: kyliansuperm92139124.shop |
Source: gRo3W1D3VU.exe | Static PE information: No import functions for PE file found |
Source: gRo3W1D3VU.exe | Binary or memory string: OriginalFilename vs gRo3W1D3VU.exe |
Source: gRo3W1D3VU.exe, 00000000.00000002.368211617.0000016E62432000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilename vs gRo3W1D3VU.exe |
Source: gRo3W1D3VU.exe, 00000000.00000002.368233230.0000016E625E9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs gRo3W1D3VU.exe |
Source: gRo3W1D3VU.exe | Binary or memory string: OriginalFilename vs gRo3W1D3VU.exe |
Source: gRo3W1D3VU.exe | Virustotal: Detection: 50% |
Source: gRo3W1D3VU.exe | ReversingLabs: Detection: 50% |
Source: gRo3W1D3VU.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll | Jump to behavior |
Source: gRo3W1D3VU.exe, .cs | Base64 encoded string: 'mQ/DK6Sa9sDTlXe4IA2CbdDNyPolTdFsIZKsK+9E84ic4hIGDN9u4sAlXAikHcB6' |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\gRo3W1D3VU.exe.log | Jump to behavior |
Source: classification engine | Classification label: mal92.troj.evad.winEXE@1/1@3/0 |
Source: gRo3W1D3VU.exe, .cs | Cryptographic APIs: 'CreateDecryptor' |
Source: gRo3W1D3VU.exe, .cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: gRo3W1D3VU.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: gRo3W1D3VU.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Yara match | File source: Process Memory Space: gRo3W1D3VU.exe PID: 7508, type: MEMORYSTR |
Source: gRo3W1D3VU.exe, .cs | .Net Code: System.AppDomain.Load(byte[]) |
Source: gRo3W1D3VU.exe | Static PE information: real checksum: 0xffb5 should be: 0x2a65 |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe TID: 7540 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe TID: 7532 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: gRo3W1D3VU.exe, 00000000.00000002.368334749.0000016E62692000.00000004.00000020.00020000.00000000.sdmp, gRo3W1D3VU.exe, 00000000.00000003.368035080.0000016E62691000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllgg |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Queries volume information: C:\Users\user\Desktop\gRo3W1D3VU.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\gRo3W1D3VU.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |