Click to jump to signature section
Source: file.exe | ReversingLabs: Detection: 34% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: file.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: file.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube) |
Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube) |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003175000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.s |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003175000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/ip |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/users/ |
Source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE | Matched rule: Detects zgRAT Author: ditekSHen |
Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects zgRAT Author: ditekSHen |
Source: file.exe, MoveAngles.cs | Large array initialization: MoveAngles: array initializer size 504320 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4_2_014C745A | 4_2_014C745A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4_2_014C7468 | 4_2_014C7468 |
Source: file.exe, 00000000.00000002.2151319090.00000000013DE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs file.exe |
Source: file.exe, 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameCopita.exe" vs file.exe |
Source: file.exe, 00000000.00000000.2147605021.0000000000EC0000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamesecinitj% vs file.exe |
Source: file.exe | Binary or memory string: OriginalFilenamesecinitj% vs file.exe |
Source: file.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: file.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 0.2.file.exe.4245570.0.raw.unpack, Strings.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.file.exe.4245570.0.raw.unpack, TripleDes.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@7/2@0/0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1008:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3604:120:WilError_03 |
Source: file.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: file.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: file.exe | ReversingLabs: Detection: 34% |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: file.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: file.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: file.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.cs | .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: file.exe | Static PE information: section name: .text entropy: 7.998016375889197 |
Source: 0.2.file.exe.4245570.0.raw.unpack, Form1.cs | High entropy of concatenated method names: '_003CReadLine_003Eb__2_0', 'u6YPlGEI8QVmr8I8RpM', 'Wvju4xEDuYOca4808Qu', 'T7d5G9E2aug3mHaOPxY', 'Form1_Load', 'ReadLine', 'Dispose', 'InitializeComponent', 'YtIaI8j3rSiRyGAl2JW', 'N5mOPLjYAuiZjHAvqIA' |
Source: 0.2.file.exe.4245570.0.raw.unpack, FieldRoot20.cs | High entropy of concatenated method names: 'Field1', 'Field5', 'Field2', 'Field3', 'Field4', 'Key4Database', 'Key3Database', 'aGErA5sQtlXYtkc27h2', 'cIYEf8sLrL3CSuxF0Lm', 'oJJkSAsqX9jsWvIh64r' |
Source: 0.2.file.exe.4245570.0.raw.unpack, SystemInfoHelper.cs | High entropy of concatenated method names: '_003CCloseBrowser_003Eb__1', 'rpm1MhNS33bBfOCj94m', 'zygwd6NQQdNu9pEPE3K', 'ShowMessage', 'CloseBrowser', 'Add', 'GetProcessors', 'GetGraphicCards', 'GetBrowsers', 'GetSerialNumber' |
Source: 0.2.file.exe.4245570.0.raw.unpack, IPv4Helper.cs | High entropy of concatenated method names: '_003CGetDefaultIPv4Address_003Eb__1_0', '_003CGetDefaultIPv4Address_003Eb__1_1', 'sgfAjAEx0k9JoJfOBfT', 'oyrplTEnPeopkIp2NiN', 'C5MLWAEiqwHRZWOnJ4O', 'rnZAVrEtS20OgKUWM6v', 'Vhrg5vEzFa2NnOewMim', 'gYSU1JN9DcPZRYRkGeG', 'dTpFQlN56548JKyxPdP', 'IsLocalIp' |
Source: 0.2.file.exe.4245570.0.raw.unpack, FieldRoot19.cs | High entropy of concatenated method names: 'Field1', 'Field2', 'Field3', 'QjCcD1Zn4tcfsZA9sIa', 'OhbwbhZi0NFOPuNkb38', 'a1EK4mZt4GAltSMBmyJ', 'BIl3VvZzcrbGuVWGMlc', 'Eklam2s9hBVdbjZgWBe', 'D84VyLZJsBycBUGd6e9', 'w0w9LXZxRRyNDew5Euq' |
Source: 0.2.file.exe.4245570.0.raw.unpack, CryptoHelper.cs | High entropy of concatenated method names: 'GetDecoded', 'DecryptBlob', 'cryptUnprotectData', 'GetMd5Hash', 'GetHexString', 'hLQIITji4QpCkh9wjkg', 'wdjLWYjtOQnfZ401LjT', 'EtO0u7jx2SiMcqvvLE4', 'p6thTQjn3OEOCvQTBp0', 'GEAFaojzqOQRdZvRHAf' |
Source: 0.2.file.exe.4245570.0.raw.unpack, BerkeleyDB.cs | High entropy of concatenated method names: 'Extract', 'J1WSUBjDJSFisHixHI4', 'n0c3pAj2Rif647RIqXE', 'Sbl46hjKU2auxmj19VJ', 'VcI3PRjfLlC21DCR0ND', 'N9WNDCjgExGI7YSuU2Y', 'Fvt0YIjIqtoE0sLpZBG', 'NQ3M7jjPh1Z8gNyFIOT' |
Source: 0.2.file.exe.4245570.0.raw.unpack, TripleDes.cs | High entropy of concatenated method names: 'ComputeVoid', 'Compute', 'DecryptStringDesCbc', 'DecryptByteDesCbc', 'MmcFqZRL0qST7eLXOlf', 'eSgwX8Rl91afUQv4O9G', 'ge8AaBR8JGoTTKek3MA', 'qbE6jpRaW5pXB5Uqhrd', 'gul6CnRVV47QPE300pE', 'AEaPMTRpnoUEGMV5my8' |
Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.cs | High entropy of concatenated method names: 'NA10JdHu1v0HlJWFF9p', 'TR4sHkH1BFUKOVlIA2P', 'LtQPyoxJn7', 'P8Gh1PHTowh3fy8qlLk', 'g38PJ8K3c0', 'AZCPHbxqQi', 'kjCPpoa2Hi', 'zssPO0JXVk', 'wmTPVkxu9Y', 'fZOeODHb8Jam9ngiXRS' |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \QEMU-GA.EXE`, |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \QEMU-GA.EXE |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \QEMU-GA.EXE@\ |
Source: C:\Users\user\Desktop\file.exe | Memory allocated: 15F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Memory allocated: 3240000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Memory allocated: 3050000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Memory allocated: 14C0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Memory allocated: 3110000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Memory allocated: 5110000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 2056 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6432 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \qemu-ga.exe |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \qemu-ga.exe`, |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \qemu-ga.exe@\ |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_03242139 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread, | 0_2_03242139 |
Source: C:\Users\user\Desktop\file.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 456000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11CD008 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | Jump to behavior |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003388000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: GetProgmanWindow |
Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003388000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: SetProgmanWindow |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Users\user\Desktop\file.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: file.exe, 00000000.00000002.2151319090.000000000141D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: avp.exe |
Source: file.exe, 00000000.00000002.2151319090.000000000141D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AVP.exe |
Source: Yara match | File source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.2159148981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegAsm.exe PID: 6880, type: MEMORYSTR |
Source: Yara match | File source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.2159148981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegAsm.exe PID: 6880, type: MEMORYSTR |
Source: Yara match | File source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |