Click to jump to signature section
Source: http://a1023269.xsph.ru | Avira URL Cloud: Label: malware |
Source: http://a1023269.xsph.ru/yhjjk.exeT | Avira URL Cloud: Label: malware |
Source: http://a1023269.xsph.ru/yhjjk.exe | Avira URL Cloud: Label: malware |
Source: a1023269.xsph.ru | Virustotal: Detection: 9% | Perma Link |
Source: http://a1023269.xsph.ru | Virustotal: Detection: 9% | Perma Link |
Source: http://a1023269.xsph.ru/yhjjk.exe | Virustotal: Detection: 5% | Perma Link |
Source: http://a1023269.xsph.ru/yhjjk.exeT | Virustotal: Detection: 8% | Perma Link |
Source: 01US71QGnu.exe | Virustotal: Detection: 47% | Perma Link |
Source: 01US71QGnu.exe | ReversingLabs: Detection: 54% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.6% probability |
Source: 01US71QGnu.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\ADMIN\source\repos\ConsoleApp1\ConsoleApp1\obj\Release\wqb.pdb source: 01US71QGnu.exe |
Source: global traffic | HTTP traffic detected: GET /yhjjk.exe HTTP/1.1Host: a1023269.xsph.ruConnection: Keep-Alive |
Source: Joe Sandbox View | IP Address: 141.8.197.42 141.8.197.42 |
Source: Joe Sandbox View | IP Address: 141.8.197.42 141.8.197.42 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /yhjjk.exe HTTP/1.1Host: a1023269.xsph.ruConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: a1023269.xsph.ru |
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, 01US71QGnu.exe, 00000000.00000002.1677567169.0000000002998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://a1023269.xsph.ru |
Source: 01US71QGnu.exe | String found in binary or memory: http://a1023269.xsph.ru/yhjjk.exe |
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.0000000002921000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://a1023269.xsph.ru/yhjjk.exeT |
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.00000000029A4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://a1023269.xsph.rud |
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.000000000298C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 01US71QGnu.exe, 00000000.00000000.1663752237.0000000000652000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamewqb.exe8 vs 01US71QGnu.exe |
Source: 01US71QGnu.exe, 00000000.00000002.1676997268.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 01US71QGnu.exe |
Source: 01US71QGnu.exe | Binary or memory string: OriginalFilenamewqb.exe8 vs 01US71QGnu.exe |
Source: 01US71QGnu.exe, a1b2c3.cs | Suspicious URL: 'http://a1023269.xsph.ru/yhjjk.exe' |
Source: classification engine | Classification label: mal68.winEXE@2/2@1/1 |
Source: C:\Users\user\Desktop\01US71QGnu.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\01US71QGnu.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7552:120:WilError_03 |
Source: 01US71QGnu.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 01US71QGnu.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: 01US71QGnu.exe | Virustotal: Detection: 47% |
Source: 01US71QGnu.exe | ReversingLabs: Detection: 54% |
Source: unknown | Process created: C:\Users\user\Desktop\01US71QGnu.exe "C:\Users\user\Desktop\01US71QGnu.exe" |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: 01US71QGnu.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: 01US71QGnu.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: 01US71QGnu.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: C:\Users\ADMIN\source\repos\ConsoleApp1\ConsoleApp1\obj\Release\wqb.pdb source: 01US71QGnu.exe |
Source: 01US71QGnu.exe | Static PE information: 0xBEF1DB58 [Tue Jul 7 19:02:48 2071 UTC] |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Memory allocated: EC0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Memory allocated: 2920000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Memory allocated: 4920000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Window / User API: threadDelayed 1374 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Window / User API: threadDelayed 508 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -4611686018427385s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -100000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99671s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99559s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612 | Thread sleep time: -99228s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7624 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7600 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99890 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99781 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99671 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99559 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99453 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99343 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 99228 | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: 01US71QGnu.exe, 00000000.00000002.1676997268.0000000000A84000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Queries volume information: C:\Users\user\Desktop\01US71QGnu.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\01US71QGnu.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |