Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792324780 lstrcmpA,CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptImportPublicKeyInfo,CryptExportKey,LocalAlloc,CryptExportKey,GetLastError,LocalFree,CryptDestroyKey,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext, | 0_2_00007FF792324780 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792323990 CryptHashCertificate,LocalAlloc,LocalFree,recv,WSAGetLastError,GetLastError,closesocket, | 0_2_00007FF792323990 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792323490 CryptHashCertificate,LocalAlloc,LocalFree,recv,WSAGetLastError,GetLastError, | 0_2_00007FF792323490 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792324920 CryptAcquireContextA,GetLastError,CryptAcquireContextA,GetLastError,CryptGenRandom,GetLastError,CryptReleaseContext, | 0_2_00007FF792324920 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792324530 CryptAcquireContextA,CryptCreateHash,GetLastError,CryptReleaseContext,GetLastError, | 0_2_00007FF792324530 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792324130 CryptQueryObject,CertGetNameStringW,CertNameToStrW,CertNameToStrW,CryptHashCertificate,wsprintfA,CertFreeCertificateContext,GetLastError,CertFreeCertificateContext,GetLastError, | 0_2_00007FF792324130 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF7923243C0 CryptAcquireContextA,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,GetLastError, | 0_2_00007FF7923243C0 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF7923245D0 lstrcmpA,CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptImportPublicKeyInfo,LocalAlloc,CryptEncrypt,LocalFree,CryptDestroyKey,GetLastError,LocalFree,CryptDestroyKey,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext, | 0_2_00007FF7923245D0 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF79232B068 CryptCreateHash, | 0_2_00007FF79232B068 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF79232B070 CryptHashData, | 0_2_00007FF79232B070 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF79232B0D8 CryptQueryObject,CryptImportPublicKeyInfo,CryptHashCertificate, | 0_2_00007FF79232B0D8 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF7923244E0 CryptGetHashParam, | 0_2_00007FF7923244E0 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF79232B0E8 CryptImportPublicKeyInfo, | 0_2_00007FF79232B0E8 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF79232B0F0 CryptHashCertificate, | 0_2_00007FF79232B0F0 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF7923245C0 CryptHashData, | 0_2_00007FF7923245C0 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree, | 0_2_00007FF792322330 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree, | 0_2_00007FF792322330 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 47.236.8.208 |
Source: mG31YklE0k.exe, type: SAMPLE | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown |
Source: 0.0.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown |
Source: 0.2.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown |
Source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown |
Source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown |
Source: mG31YklE0k.exe | Binary or memory string: OriginalFilename vs mG31YklE0k.exe |
Source: mG31YklE0k.exe, 00000000.00000000.1316429199.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameAccessEnum.exeP vs mG31YklE0k.exe |
Source: mG31YklE0k.exe, 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameAccessEnum.exeP vs mG31YklE0k.exe |
Source: mG31YklE0k.exe | Binary or memory string: OriginalFilenameAccessEnum.exeP vs mG31YklE0k.exe |
Source: mG31YklE0k.exe, type: SAMPLE | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12 |
Source: 0.0.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12 |
Source: 0.2.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12 |
Source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12 |
Source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7404:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Mutant created: \Sessions\1\BaseNamedObjects\30D78F9B-C56E-472C-8A29-E91111115 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7612:120:WilError_03 |
Source: unknown | Process created: C:\Users\user\Desktop\mG31YklE0k.exe "C:\Users\user\Desktop\mG31YklE0k.exe" | |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic os get Name,OSArchitecture /format:rawxml | |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get Name /format:rawxml | |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic os get TotalVisibleMemorySize /format:rawxml | |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml" | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml" | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic os get Name,OSArchitecture /format:rawxml | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get Name /format:rawxml | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic os get TotalVisibleMemorySize /format:rawxml | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: esdsip.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\chcp.com | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\System32\chcp.com | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\chcp.com | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\System32\chcp.com | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\chcp.com | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\System32\chcp.com | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree, | 0_2_00007FF792322330 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree, | 0_2_00007FF792322330 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792322F00 CreateMutexA,CreateMutexExA,GetLastError,GetCommandLineA,SetUnhandledExceptionFilter,GetCurrentProcessId,lstrlenA,lstrlenA,GetVersionExA,GetLastError,WSAStartup,WSAGetLastError,lstrlenA,gethostbyname,inet_addr,Sleep,htons,inet_ntoa,socket,connect,GetTickCount,closesocket,WSAGetLastError,closesocket,Sleep,WSAGetLastError,Sleep,closesocket,CloseHandle, | 0_2_00007FF792322F00 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF7923260A8 SetUnhandledExceptionFilter,_set_new_mode,_set_new_mode, | 0_2_00007FF7923260A8 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792326740 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF792326740 |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml" | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml" | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic os get Name,OSArchitecture /format:rawxml | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get Name /format:rawxml | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic os get TotalVisibleMemorySize /format:rawxml | Jump to behavior |
Source: C:\Users\user\Desktop\mG31YklE0k.exe | Code function: 0_2_00007FF792324BE0 GetVersionExA,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetLastError,LocalFree,GetLastError,CloseHandle,GetLastError, | 0_2_00007FF792324BE0 |
Source: Yara match | File source: mG31YklE0k.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: mG31YklE0k.exe PID: 7272, type: MEMORYSTR |