Click to jump to signature section
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Avira: detection malicious, Label: BDS/Backdoor.Gen7 |
Source: golfinfo.ini.0.dr | Malware Configuration Extractor: Urelas {"C2 url": ["218.54.47.77", "218.54.47.74"], "Drop filename": ["houtue", "biudfw"]} |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.8% probability |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Joe Sandbox ML: detected |
Source: WOa6j2H74T.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: WOa6j2H74T.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Network traffic | Suricata IDS: 2804923 - Severity 1 - ETPRO MALWARE Rootkit.Win32.Bootkor.ha CnC Traffic : 192.168.2.4:49738 -> 218.54.47.76:11170 |
Source: Network traffic | Suricata IDS: 2804923 - Severity 1 - ETPRO MALWARE Rootkit.Win32.Bootkor.ha CnC Traffic : 192.168.2.4:49737 -> 218.54.47.74:11150 |
Source: Network traffic | Suricata IDS: 2804923 - Severity 1 - ETPRO MALWARE Rootkit.Win32.Bootkor.ha CnC Traffic : 192.168.2.4:49730 -> 218.54.47.76:11120 |
Source: Malware configuration extractor | IPs: 218.54.47.77 |
Source: Malware configuration extractor | IPs: 218.54.47.74 |
Source: global traffic | TCP traffic: 192.168.2.4:49730 -> 218.54.47.76:11120 |
Source: global traffic | TCP traffic: 192.168.2.4:49737 -> 218.54.47.74:11150 |
Source: Joe Sandbox View | IP Address: 218.54.47.74 218.54.47.74 |
Source: Joe Sandbox View | IP Address: 218.54.47.76 218.54.47.76 |
Source: Joe Sandbox View | IP Address: 218.54.47.77 218.54.47.77 |
Source: Joe Sandbox View | ASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR |
Source: Joe Sandbox View | ASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR |
Source: Joe Sandbox View | ASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.74 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.74 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.74 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.74 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.74 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: unknown | TCP traffic detected without corresponding DNS query: 218.54.47.76 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F54C0 _memset,_memset,recv,recv,WSAGetLastError,_memcmp,_memmove,_memmove, | 0_2_003F54C0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F3280: CreateFileW,DeviceIoControl,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,FindCloseChangeNotification, | 0_2_003F3280 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003FAD16 | 0_2_003FAD16 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F25D0 | 0_2_003F25D0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_004024D6 | 0_2_004024D6 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F7CA8 | 0_2_003F7CA8 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00401C89 | 0_2_00401C89 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_004020A1 | 0_2_004020A1 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_0040290B | 0_2_0040290B |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00401795 | 0_2_00401795 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_002725D0 | 1_2_002725D0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_002820A1 | 1_2_002820A1 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_00277CA8 | 1_2_00277CA8 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_00281C89 | 1_2_00281C89 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_002824D6 | 1_2_002824D6 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_0028290B | 1_2_0028290B |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_0027AD16 | 1_2_0027AD16 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_00281795 | 1_2_00281795 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: String function: 003F94F0 appears 34 times | |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: String function: 002794F0 appears 34 times | |
Source: WOa6j2H74T.exe, 00000000.00000002.1741743563.000000000040F000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamebhydtfre.exe8 vs WOa6j2H74T.exe |
Source: WOa6j2H74T.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@7/3@0/3 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_03 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | File created: C:\Users\user\AppData\Local\Temp\golfinfo.ini | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sanfdr.bat" " |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Command line argument: Hutdre | 0_2_003F19F0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Command line argument: Polkkhdfte | 0_2_003F19F0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Command line argument: Hutdre | 0_2_003F19F0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Command line argument: Polkkhdfte | 0_2_003F19F0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Command line argument: 218.54.31.226 | 0_2_003F19F0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Command line argument: djfuhgdt.exe | 0_2_003F19F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: Hutdre | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: Polkkhdfte | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: Hutdre | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: Polkkhdfte | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: 218.54.47.74 | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: djfuhgdt.exe | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: djfuhgdt.exe | 1_2_002719F0 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Command line argument: djfuhgdt.exe | 1_2_002719F0 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | File read: C:\Users\user\Desktop\desktop.ini | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | File read: C:\Users\user\Desktop\WOa6j2H74T.exe | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\WOa6j2H74T.exe "C:\Users\user\Desktop\WOa6j2H74T.exe" | |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Users\user\AppData\Local\Temp\biudfw.exe "C:\Users\user\AppData\Local\Temp\biudfw.exe" | |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sanfdr.bat" " | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Users\user\AppData\Local\Temp\biudfw.exe "C:\Users\user\AppData\Local\Temp\biudfw.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sanfdr.bat" " | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | File written: C:\Users\user\AppData\Local\Temp\golfinfo.ini | Jump to behavior |
Source: WOa6j2H74T.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Unpacked PE file: 0.2.WOa6j2H74T.exe.3f0000.0.unpack HSUDHUHW:EW;HSUDHUHW:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Unpacked PE file: 1.2.biudfw.exe.270000.0.unpack HSUDHUHW:EW;HSUDHUHW:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00400829 RtlEncodePointer,RtlEncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, | 0_2_00400829 |
Source: initial sample | Static PE information: section where entry point is pointing to: HSUDHUHW |
Source: WOa6j2H74T.exe | Static PE information: section name: HSUDHUHW |
Source: WOa6j2H74T.exe | Static PE information: section name: HSUDHUHW |
Source: biudfw.exe.0.dr | Static PE information: section name: HSUDHUHW |
Source: biudfw.exe.0.dr | Static PE information: section name: HSUDHUHW |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F9535 push ecx; ret | 0_2_003F9548 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003FE58D push edi; ret | 0_2_003FE58F |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003FE62B push edi; ret | 0_2_003FE62D |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003FE359 push esi; ret | 0_2_003FE369 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_00279535 push ecx; ret | 1_2_00279548 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_0027E58D push edi; ret | 1_2_0027E58F |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_0027E62B push edi; ret | 1_2_0027E62D |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_0027E359 push esi; ret | 1_2_0027E369 |
Source: WOa6j2H74T.exe | Static PE information: section name: HSUDHUHW entropy: 7.889335703941072 |
Source: biudfw.exe.0.dr | Static PE information: section name: HSUDHUHW entropy: 7.889335703941072 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | File created: C:\Users\user\AppData\Local\Temp\biudfw.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Key value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Run | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F7CA8 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_003F7CA8 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Window / User API: threadDelayed 706 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe TID: 6176 | Thread sleep count: 706 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe TID: 6176 | Thread sleep time: -141200s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | File opened: PHYSICALDRIVE0 | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: biudfw.exe, 00000001.00000003.2408452676.00000000008C9000.00000004.00000020.00020000.00000000.sdmp, biudfw.exe, 00000001.00000002.2408852624.00000000008C9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00400829 RtlEncodePointer,RtlEncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, | 0_2_00400829 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00400829 RtlEncodePointer,RtlEncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, | 0_2_00400829 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00400829 RtlEncodePointer,RtlEncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, | 0_2_00400829 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_00403429 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock, | 0_2_00403429 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F7EE7 SetUnhandledExceptionFilter, | 0_2_003F7EE7 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F7F0A SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_003F7F0A |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_00277EE7 SetUnhandledExceptionFilter, | 1_2_00277EE7 |
Source: C:\Users\user\AppData\Local\Temp\biudfw.exe | Code function: 1_2_00277F0A SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_00277F0A |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Users\user\AppData\Local\Temp\biudfw.exe "C:\Users\user\AppData\Local\Temp\biudfw.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sanfdr.bat" " | Jump to behavior |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003FC755 cpuid | 0_2_003FC755 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003FC5D3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_003FC5D3 |
Source: C:\Users\user\Desktop\WOa6j2H74T.exe | Code function: 0_2_003F2B50 _memset,GetVersionExW, | 0_2_003F2B50 |
Source: Yara match | File source: 0.2.WOa6j2H74T.exe.3f0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.biudfw.exe.270000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000001.00000002.2408594836.0000000000271000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1741743563.00000000003F1000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0.2.WOa6j2H74T.exe.3f0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.biudfw.exe.270000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000001.00000002.2408594836.0000000000271000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1741743563.00000000003F1000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |