Edit tour
Windows
Analysis Report
K4gsPJGEi4.exe
Overview
General Information
Sample name: | K4gsPJGEi4.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original sample name: | a606d29ead61ee09f59236f0c105763d1e3aba914edc30210425049ad5ce275b |
Analysis ID: | 1467765 |
MD5: | 997f25415b30c6da407a75c55806d752 |
SHA1: | 5efadd4bfb032e773492a42c391b3be12eabbe98 |
SHA256: | a606d29ead61ee09f59236f0c105763d1e3aba914edc30210425049ad5ce275b |
Infos: | |
Detection
Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Yara detected Powershell download and execute
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Command shell drops VBS files
Drops PE files to the user root directory
Found strings related to Crypto-Mining
Machine Learning detection for dropped file
Machine Learning detection for sample
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Sample is not signed and drops a device driver
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Uses cmd line tools excessively to alter registry or file data
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates driver files
Creates files inside the system directory
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the user directory
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May infect USB drives
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected NirCmd tool
Yara signature match
Classification
- System is w10x64
- K4gsPJGEi4.exe (PID: 3652 cmdline:
"C:\Users\ user\Deskt op\K4gsPJG Ei4.exe" MD5: 997F25415B30C6DA407A75C55806D752) - cmd.exe (PID: 3788 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\Star t.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5492 cmdline:
C:\Windows \System32\ cmd.exe /c "C:\Users \user\AppD ata\Local\ Temp\Start .cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - reg.exe (PID: 4844 cmdline:
C:\Windows \System32\ reg.exe qu ery "HKEY_ LOCAL_MACH INE\Softwa re\Microso ft\Windows \CurrentVe rsion\Poli cies\Syste m" /v "Con sentPrompt BehaviorAd min" MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - find.exe (PID: 7060 cmdline:
C:\Windows \System32\ find.exe " 0x0" MD5: 15B158BC998EEF74CFDD27C44978AEA0) - wscript.exe (PID: 5312 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\es t1.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 5952 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\est 1.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 1248 cmdline:
C:\Windows \System32\ timeout.ex e /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - cmd.exe (PID: 6164 cmdline:
C:\Windows \system32\ cmd.exe /c type "C:\ Users\user \AppData\L ocal\Temp\ Start.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - wscript.exe (PID: 5576 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\Vn oad.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 4296 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\two .cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - screen.exe (PID: 6668 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\screen .exe" win hide ititl e "cod2" MD5: A1CD6A64E8F8AD5D4B6C07DC4113C7EC) - cmd.exe (PID: 1992 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho "C:\Use rs\user\Ap pData\Loca l\Temp" 2> NUL" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 5780 cmdline:
C:\Windows \System32\ findstr.ex e /i /c:"L ocal" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 408 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho "C:\Use rs\user" 2 >NUL" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 4824 cmdline:
C:\Windows \System32\ findstr.ex e /i /c:"' " MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - screen.exe (PID: 4128 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\screen .exe" win hide ititl e "cod2" MD5: A1CD6A64E8F8AD5D4B6C07DC4113C7EC) - timeout.exe (PID: 2000 cmdline:
C:\Windows \System32\ timeout.ex e /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 2780 cmdline:
C:\Windows \System32\ timeout.ex e /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 4676 cmdline:
C:\Windows \System32\ timeout.ex e /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - reg.exe (PID: 4324 cmdline:
C:\Windows \System32\ reg.exe qu ery "HKCU\ Software\M icrosoft\W indows" MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - attrib.exe (PID: 6484 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Progra mData\Micr osoft\Wind ows\Start Menu\Progr ams\StartU p\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0) - attrib.exe (PID: 6096 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\*.* " MD5: 0E938DD280E83B1596EC6AA48729C2B0) - reg.exe (PID: 6416 cmdline:
C:\Windows \System32\ reg.exe de lete "HKEY _LOCAL_MAC HINE\Softw are\Micros oft\Window s NT\Curre ntVersion\ AppCompatF lags\Layer s" /va /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - reg.exe (PID: 4072 cmdline:
C:\Windows \System32\ reg.exe de lete "HKEY _LOCAL_MAC HINE\Softw are\Micros oft\Window s NT\Curre ntVersion\ AppCompatF lags\Layer s" /va /f /reg:64 MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - reg.exe (PID: 5168 cmdline:
C:\Windows \System32\ reg.exe de lete "HKEY _CURRENT_U SER\Softwa re\Microso ft\Windows NT\Curren tVersion\A ppCompatFl ags\Layers " /va /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - reg.exe (PID: 3408 cmdline:
C:\Windows \System32\ reg.exe de lete "HKEY _CURRENT_U SER\Softwa re\Microso ft\Windows NT\Curren tVersion\A ppCompatFl ags\Layers " /va /f / reg:64 MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - WMIC.exe (PID: 5700 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where (n ame="RtkAu dio.exe") get comman dline MD5: E2DE6500DE1148C7F6027AD50AC8B891) - findstr.exe (PID: 3576 cmdline:
findstr /i /c:"RtkAu dio" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - Conhost.exe (PID: 5576 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WMIC.exe (PID: 7044 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %RtkAudio. exe%'" Cal l Terminat e MD5: E2DE6500DE1148C7F6027AD50AC8B891) - WMIC.exe (PID: 1992 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %IntelSvc. exe%'" Cal l Terminat e MD5: E2DE6500DE1148C7F6027AD50AC8B891) - WMIC.exe (PID: 408 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %Systemfon t.exe%'" C all Termin ate MD5: E2DE6500DE1148C7F6027AD50AC8B891) - WMIC.exe (PID: 6604 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %palemoon. exe%'" Cal l Terminat e MD5: E2DE6500DE1148C7F6027AD50AC8B891) - Conhost.exe (PID: 4024 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WMIC.exe (PID: 7128 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %screen.ex e%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891) - WMIC.exe (PID: 5800 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %choice.ex e%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891) - WMIC.exe (PID: 4432 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %fontdrvho ts.exe%'" Call Termi nate MD5: E2DE6500DE1148C7F6027AD50AC8B891) - WMIC.exe (PID: 5684 cmdline:
C:\Windows \System32\ wbem\WMIC. exe proces s where "n ame like ' %tv_x86.ex e%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891) - attrib.exe (PID: 3288 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Users\ user\AppDa ta\Local\T emp\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0) - attrib.exe (PID: 6132 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Users\ user\AppDa ta\Local\T emp\Tweake r\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0) - attrib.exe (PID: 5740 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Window s\SysWOW64 \en\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0) - attrib.exe (PID: 6252 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Users\ Public\*.* " MD5: 0E938DD280E83B1596EC6AA48729C2B0) - attrib.exe (PID: 728 cmdline:
C:\Windows \System32\ attrib.exe -h -r -s "C:\Progra mData\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0) - timeout.exe (PID: 5580 cmdline:
C:\Windows \System32\ timeout.ex e /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 7124 cmdline:
C:\Windows \System32\ timeout.ex e /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - chcp.com (PID: 1576 cmdline:
chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Linux_Trojan_Pornoasset_927f314f | unknown | unknown |
| |
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
| |
MAL_XMR_Miner_May19_1 | Detects Monero Crypto Coin Miner | Florian Roth |
| |
MALWARE_Win_CoinMiner02 | Detects coinmining malware | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Click to see the 29 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_NirCmd | Yara detected NirCmd tool | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
| |
JoeSecurity_NirCmd | Yara detected NirCmd tool | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NirCmd | Yara detected NirCmd tool | Joe Security | ||
JoeSecurity_NirCmd | Yara detected NirCmd tool | Joe Security | ||
Linux_Trojan_Pornoasset_927f314f | unknown | unknown |
| |
Linux_Trojan_Pornoasset_927f314f | unknown | unknown |
| |
Linux_Trojan_Pornoasset_927f314f | unknown | unknown |
| |
Click to see the 5 entries |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Perez Diego (@darkquassar), oscd.community: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Michael Haag: |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 18_2_004024C1 | |
Source: | Code function: | 18_2_004030D0 |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 18_2_00402057 |
Source: | Code function: | 18_2_00402057 | |
Source: | Code function: | 18_2_004018A1 | |
Source: | Code function: | 18_2_00402D57 |
Source: | Code function: | 18_2_00402CB5 |
Source: | Code function: | 18_2_0040D139 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Dropped file: | Jump to dropped file | ||
Source: | Dropped file: | Jump to dropped file | ||
Source: | Dropped file: | Jump to dropped file |
Source: | COM Object queried: | Jump to behavior |
Source: | Code function: | 18_2_00405118 |
Source: | Code function: | 18_2_0040AC8D |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Process created: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Code function: | 18_2_0040E395 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Key opened: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |