Source: stevenhead.ddns.net |
Virustotal: Detection: 7% |
Perma Link |
Source: 4QamAQhoxB.exe |
ReversingLabs: Detection: 73% |
Source: 4QamAQhoxB.exe |
Virustotal: Detection: 56% |
Perma Link |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: 4QamAQhoxB.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 4QamAQhoxB.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: unknown |
DNS query: name: booosisnhead.ddns.net |
Source: unknown |
DNS query: name: stevenhead.ddns.net |
Source: Yara match |
File source: 4QamAQhoxB.exe, type: SAMPLE |
Source: global traffic |
TCP traffic: 192.168.2.5:49704 -> 157.20.182.5:36365 |
Source: Joe Sandbox View |
ASN Name: FCNUniversityPublicCorporationOsakaJP FCNUniversityPublicCorporationOsakaJP |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: booosisnhead.ddns.net |
Source: global traffic |
DNS traffic detected: DNS query: stevenhead.ddns.net |
Source: 4QamAQhoxB.exe, 00000000.00000002.3282783028.0000000002717000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs 4QamAQhoxB.exe |
Source: 4QamAQhoxB.exe, 00000000.00000000.2033525770.0000000002292000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameStub.exe" vs 4QamAQhoxB.exe |
Source: 4QamAQhoxB.exe |
Binary or memory string: OriginalFilenameStub.exe" vs 4QamAQhoxB.exe |
Source: 4QamAQhoxB.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal76.troj.evad.winEXE@1/0@18/1 |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Mutant created: \Sessions\1\BaseNamedObjects\dfoipoduifdpodupifduodud9d78yd9078df098dp90yu9py7d9 |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Mutant created: NULL |
Source: 4QamAQhoxB.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 4QamAQhoxB.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01% |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: 4QamAQhoxB.exe |
ReversingLabs: Detection: 73% |
Source: 4QamAQhoxB.exe |
Virustotal: Detection: 56% |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: 4QamAQhoxB.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: 4QamAQhoxB.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: 4QamAQhoxB.exe |
Static file information: File size 21362688 > 1048576 |
Source: 4QamAQhoxB.exe |
Static PE information: Raw size of .text is bigger than: 0x100000 < 0x145ea00 |
Source: 4QamAQhoxB.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Yara match |
File source: 4QamAQhoxB.exe, type: SAMPLE |
Source: Yara match |
File source: 00000000.00000002.3283781224.0000000004521000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000000.2027295530.0000000001832000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4QamAQhoxB.exe PID: 2360, type: MEMORYSTR |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Memory allocated: 2BC0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Memory allocated: 4520000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Memory allocated: 6520000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe TID: 6484 |
Thread sleep count: 115 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe TID: 6484 |
Thread sleep time: -1035000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: 4QamAQhoxB.exe |
Binary or memory string: cHjLJAFJdovmcI |
Source: 4QamAQhoxB.exe |
Binary or memory string: NIHGfsokYOdN |
Source: 4QamAQhoxB.exe, 00000000.00000002.3283128431.00000000027B9000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Process token adjusted: Debug |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Queries volume information: C:\Users\user\Desktop\4QamAQhoxB.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\4QamAQhoxB.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |