Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: file.exe, 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000036B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://103.130.147.85 |
Source: file.exe, 00000002.00000002.3752962098.0000000003893000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.000000000386D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.0000000003880000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038DC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.com |
Source: file.exe, 00000002.00000002.3752962098.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038DC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.0000000003817000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org |
Source: file.exe, 00000002.00000002.3752962098.00000000036B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/ |
Source: file.exe, 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/q |
Source: file.exe, 00000002.00000002.3752962098.0000000003893000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.000000000386D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.0000000003880000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000037E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038DC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://reallyfreegeoip.org |
Source: file.exe, 00000002.00000002.3752962098.00000000036B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: file.exe, 00000002.00000002.3752962098.0000000003893000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.000000000386D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.0000000003880000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000038DC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.0000000003817000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org |
Source: file.exe, 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, file.exe, 00000002.00000002.3752962098.00000000037C9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: file.exe, 00000002.00000002.3752962098.0000000003817000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33 |
Source: file.exe, 00000002.00000002.3752962098.00000000037C9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33p |
Source: unknown |
Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49710 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49710 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49716 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49716 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: file.exe, 00000000.00000000.1289655346.00000000005F0000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameeGDw.exe6 vs file.exe |
Source: file.exe, 00000000.00000002.1326290597.000000001CE90000.00000004.08000000.00040000.00000000.sdmp |
Binary or memory string: OriginalFilenameTyrone.dll8 vs file.exe |
Source: file.exe, 00000000.00000002.1323573190.0000000003B31000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamefbXfjPLUOxpHounQOLpg.exeX vs file.exe |
Source: file.exe, 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamefbXfjPLUOxpHounQOLpg.exeX vs file.exe |
Source: file.exe, 00000000.00000002.1324556825.0000000013E04000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameTyrone.dll8 vs file.exe |
Source: file.exe, 00000000.00000002.1325932825.000000001C5D0000.00000004.08000000.00040000.00000000.sdmp |
Binary or memory string: OriginalFilenameAxiom.dll@ vs file.exe |
Source: file.exe, 00000000.00000002.1323573190.0000000003A91000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameReactionDiffusion.dll0 vs file.exe |
Source: file.exe, 00000000.00000002.1323573190.0000000003BB3000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameReactionDiffusion.dll0 vs file.exe |
Source: file.exe, 00000000.00000002.1323354490.0000000003520000.00000004.08000000.00040000.00000000.sdmp |
Binary or memory string: OriginalFilenameReactionDiffusion.dll0 vs file.exe |
Source: file.exe, 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameAxiom.dll@ vs file.exe |
Source: file.exe, 00000002.00000002.3757403719.0000000140022000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamefbXfjPLUOxpHounQOLpg.exeX vs file.exe |
Source: file.exe |
Binary or memory string: OriginalFilenameeGDw.exe6 vs file.exe |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599546 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599434 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598671 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598343 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598234 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598125 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598015 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597906 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597797 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597684 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597562 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597453 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597343 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597234 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597125 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597015 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596906 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596797 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596687 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596578 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596468 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596359 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596250 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596139 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596031 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595920 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595812 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595703 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595593 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595484 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595375 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595265 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595156 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595046 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594937 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594828 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594718 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594609 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7460 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -23980767295822402s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -600000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599875s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7652 |
Thread sleep count: 7952 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7652 |
Thread sleep count: 1909 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599765s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599656s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599546s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599434s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599328s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -599000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598671s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -598015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597906s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597797s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597684s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -597015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596906s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596797s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596687s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596578s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596468s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596359s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596250s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596139s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -596031s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595920s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595812s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595703s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595593s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595484s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595375s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595265s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595156s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -595046s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -594937s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -594828s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -594718s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7648 |
Thread sleep time: -594609s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599546 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599434 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598671 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598343 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598234 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598125 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 598015 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597906 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597797 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597684 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597562 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597453 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597343 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597234 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597125 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 597015 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596906 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596797 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596687 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596578 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596468 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596359 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596250 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596139 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 596031 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595920 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595812 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595703 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595593 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595484 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595375 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595265 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595156 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 595046 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594937 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594828 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594718 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Thread delayed: delay time: 594609 |
Jump to behavior |
Source: Yara match |
File source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3752962098.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3752962098.00000000036B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |
Source: Yara match |
File source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |
Source: Yara match |
File source: 0.2.file.exe.13d818c0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.file.exe.140000000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d61280.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d818c0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.13d61280.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000002.00000002.3757403719.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3752962098.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1324556825.0000000013AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1324556825.0000000013C95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3752962098.00000000036B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: file.exe PID: 7436, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: file.exe PID: 7532, type: MEMORYSTR |