Windows Analysis Report
file.exe

Overview

General Information

Sample name: file.exe
Analysis ID: 1536228
MD5: ccb3b74d378733c21fc584875b5a8b07
SHA1: 6779b4d3cfff750eeeeba77ec7abf4e206cc3931
SHA256: 0b1fadc136b71d5961664a2a1dc8e340c28324d3d8637667f1280bee4c3d12db
Tags: exeuser-jstrosch
Infos:

Detection

HawkEye, MailPassView, PureLog Stealer
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected HawkEye Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected HawkEye Keylogger
Yara detected MailPassView
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Changes the view of files in windows explorer (hidden files and folders)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Sample uses process hollowing technique
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious desktop.ini Action
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Keylogger Generic
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Name Description Attribution Blogpost URLs Link
HawkEye Keylogger, HawkEye, HawkEye Reborn HawKeye is a keylogger that is distributed since 2013. Discovered by IBM X-Force, it is currently spread over phishing campaigns targeting businesses on a worldwide scale. It is designed to steal credentials from numerous applications but, in the last observed versions, new "loader capabilities" have been spotted. It is sold by its development team on dark web markets and hacking forums. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.hawkeye_keylogger

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe ReversingLabs: Detection: 68%
Source: file.exe ReversingLabs: Detection: 68%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Joe Sandbox ML: detected
Source: file.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_00558554 EP_CryptHashStringW, 8_2_00558554
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_00558544 EP_CryptHashFileW, 8_2_00558544
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0055854C EP_CryptHashStringA, 8_2_0055854C
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_00558534 EP_CryptHashBuffer, 8_2_00558534
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0055853C EP_CryptHashFileA, 8_2_0055853C
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_00558594 EP_CryptEncryptBuffer, 8_2_00558594
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0055859C EP_CryptEncryptBufferEx, 8_2_0055859C
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_005585A4 EP_CryptDecryptBuffer, 8_2_005585A4
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_005585AC EP_CryptDecryptBufferEx, 8_2_005585AC
Source: file.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 104.19.222.79:443 -> 192.168.2.9:49756 version: TLS 1.0
Source: C:\Users\user\Desktop\file.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll Jump to behavior
Source: Binary string: \??\C:\Windows\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3830984984.0000000009596000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: indows\System.Runtime.Remoting.pdbpdbing.pdb7 source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: indows\symbols\dll\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbO[ source: file.exe, 00000002.00000002.3830984984.0000000009596000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ws\dll\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3822570770.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: _.pdb source: file.exe, 00000002.00000002.3828060827.0000000004398000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1607673008.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1610567858.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1609878742.0000000004421000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000009.00000002.1711672680.0000000004418000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdbo source: file.exe, 00000002.00000002.3822570770.0000000000C11000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdbI source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: file.exe, 00000002.00000002.3832442794.000000000A060000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Runtime.Remoting.pdb0| source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000005.00000002.1485373201.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: C:\Windows\dll\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: em.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003300000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Runtime.Remoting.pdbc source: file.exe, 00000002.00000002.3832742558.000000000A450000.00000004.00000020.00020000.00000000.sdmp
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: autorun.inf
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: [autorun]
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: autorun.inf
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: [autorun]
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen, 5_2_00406EC3
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen, 6_2_00408441
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00407E0E FindFirstFileW,FindNextFileW,FindClose, 6_2_00407E0E
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then jmp 057AD29Bh 2_2_057AD120
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then mov esp, ebp 2_2_0773F6C0
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13DBA
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-08h] 2_2_09D16E60
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D141BA
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D14108
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13D30
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13D20
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D1B860
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D14C35
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13FE5
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D133E7
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13F44
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D1336C
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13F3E
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13ECA
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13E46
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13E70
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-0Ch] 2_2_09D13E00
Source: C:\Users\user\Desktop\file.exe Code function: 4x nop then lea esp, dword ptr [ebp-08h] 2_2_09D16E27

Networking

barindex
Source: Yara match File source: 2.2.file.exe.33522a4.0.raw.unpack, type: UNPACKEDPE
Source: global traffic TCP traffic: 192.168.2.9:49800 -> 142.251.173.109:587
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
Source: Joe Sandbox View JA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
Source: unknown DNS query: name: whatismyipaddress.com
Source: unknown DNS query: name: whatismyipaddress.com
Source: unknown DNS query: name: whatismyipaddress.com
Source: Network traffic Suricata IDS: 2810703 - Severity 2 - ETPRO MALWARE MSIL/Golroted.B or HawkEye External IP Check with minimal headers : 192.168.2.9:49750 -> 104.19.222.79:80
Source: Network traffic Suricata IDS: 2810703 - Severity 2 - ETPRO MALWARE MSIL/Golroted.B or HawkEye External IP Check with minimal headers : 192.168.2.9:49756 -> 104.19.222.79:443
Source: global traffic TCP traffic: 192.168.2.9:49800 -> 142.251.173.109:587
Source: unknown HTTPS traffic detected: 104.19.222.79:443 -> 192.168.2.9:49756 version: TLS 1.0
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_030EB0B2 recv, 2_2_030EB0B2
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
Source: vbc.exe, 00000006.00000002.1487732769.00000000005FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: ://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
Source: vbc.exe, 00000006.00000002.1487732769.00000000005FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: ://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
Source: vbc.exe String found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: global traffic DNS traffic detected: DNS query: 13.169.14.0.in-addr.arpa
Source: global traffic DNS traffic detected: DNS query: whatismyipaddress.com
Source: global traffic DNS traffic detected: DNS query: smtp.gmail.com
Source: global traffic HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 17 Oct 2024 16:07:56 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeAccept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UACritical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UACross-Origin-Embedder-Policy: require-corpCross-Origin-Opener-Policy: same-originCross-Origin-Resource-Policy: same-originOrigin-Agent-Cluster: ?1Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()Referrer-Policy: same-originX-Content-Options: nosniffcf-mitigated: challenge
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000009.00000002.1710822613.0000000003400000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://foo.com/fooT
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000009.00000002.1710822613.00000000033BA000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://whatismyipaddress.com/
Source: WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005CA000.00000040.00000001.01000000.0000000C.sdmp String found in binary or memory: http://www.enigmaprotector.com/
Source: vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://www.nirsoft.net/
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.site.com/logs.php
Source: vbc.exe, 00000006.00000002.1487732769.00000000005FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: vbc.exe, 00000006.00000002.1488452725.0000000002666000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
Source: vbc.exe String found in binary or memory: https://login.yahoo.com/config/login
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://whatismyipaddress.com
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://whatismyipaddress.com/
Source: vbc.exe String found in binary or memory: https://www.google.com/accounts/servicelogin
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7556, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WindowsUpdate.exe PID: 8104, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_0040AC8A GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA, 5_2_0040AC8A
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00406069 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, 5_2_00406069
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00405FC6 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, 5_2_00405FC6
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_004072FB EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, 6_2_004072FB
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00407363 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, 6_2_00407363
Source: Yara match File source: 8.2.WindowsUpdate.exe.490000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.1603365983.00000000005CA000.00000040.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: WindowsUpdate.exe PID: 8104, type: MEMORYSTR

System Summary

barindex
Source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: HawkEye Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
Source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: HawkEye Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: C:\Users\user\Desktop\file.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F6BBE NtQuerySystemInformation, 2_2_059F6BBE
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F69AA NtResumeThread, 2_2_059F69AA
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F6A52 NtWriteVirtualMemory, 2_2_059F6A52
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F6B8B NtQuerySystemInformation, 2_2_059F6B8B
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F6A25 NtWriteVirtualMemory, 2_2_059F6A25
Source: C:\Users\user\Desktop\file.exe File created: C:\Windows\assembly\Desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_054D07E8 2_2_054D07E8
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_054D07F8 2_2_054D07F8
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_054D03F8 2_2_054D03F8
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_054D0408 2_2_054D0408
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_057A6A40 2_2_057A6A40
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_057A0070 2_2_057A0070
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_057A0047 2_2_057A0047
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_0773CA38 2_2_0773CA38
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_07736C08 2_2_07736C08
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_0773F008 2_2_0773F008
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_0773E748 2_2_0773E748
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_07736BF8 2_2_07736BF8
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_07730070 2_2_07730070
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_07730007 2_2_07730007
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00404DDB 5_2_00404DDB
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_0040BD8A 5_2_0040BD8A
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00404E4C 5_2_00404E4C
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00404EBD 5_2_00404EBD
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00404F4E 5_2_00404F4E
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00404419 6_2_00404419
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00404516 6_2_00404516
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00413538 6_2_00413538
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_004145A1 6_2_004145A1
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_0040E639 6_2_0040E639
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_004337AF 6_2_004337AF
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_004399B1 6_2_004399B1
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_0043DAE7 6_2_0043DAE7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00405CF6 6_2_00405CF6
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00403F85 6_2_00403F85
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00411F99 6_2_00411F99
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A0262 8_2_004A0262
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_02830408 8_2_02830408
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_028307E7 8_2_028307E7
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_028307F8 8_2_028307F8
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_028303F8 8_2_028303F8
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_05756A40 8_2_05756A40
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_05750070 8_2_05750070
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_05750007 8_2_05750007
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_031D07F8 9_2_031D07F8
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_031D03F8 9_2_031D03F8
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_031D07EA 9_2_031D07EA
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_031D0408 9_2_031D0408
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_05756A40 9_2_05756A40
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_05750070 9_2_05750070
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_05750007 9_2_05750007
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: String function: 00413F8E appears 66 times
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: String function: 00413E2D appears 34 times
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: String function: 00442A90 appears 36 times
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: String function: 004141D6 appears 88 times
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: String function: 00411538 appears 35 times
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: String function: 004944AC appears 68 times
Source: file.exe, 00000002.00000002.3832442794.000000000A060000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameCMemoryExecute.dll@ vs file.exe
Source: file.exe, 00000002.00000002.3828060827.0000000004398000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename_.dll4 vs file.exe
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamemailpv.exe< vs file.exe
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameWebBrowserPassView.exeF vs file.exe
Source: file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameWebBrowserPassView.exeF vs file.exe
Source: file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameCMemoryExecute.dll@ vs file.exe
Source: file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenamemailpv.exe< vs file.exe
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCMemoryExecute.dll@ vs file.exe
Source: file.exe Binary or memory string: OriginalFilenamePhulli.exe0 vs file.exe
Source: file.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
Source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: HawkEye date = 2015/06, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, ref = http://malwareconfig.com/stats/HawkEye
Source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
Source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
Source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: HawkEye date = 2015/06, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, ref = http://malwareconfig.com/stats/HawkEye
Source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
Source: file.exe Static PE information: Section: ZLIB complexity 1.0004534040178572
Source: file.exe Static PE information: Section: ZLIB complexity 1.0003255208333333
Source: file.exe Static PE information: Section: .data ZLIB complexity 0.9972468899880096
Source: WindowsUpdate.exe.2.dr Static PE information: Section: ZLIB complexity 1.0004534040178572
Source: WindowsUpdate.exe.2.dr Static PE information: Section: ZLIB complexity 1.0003255208333333
Source: WindowsUpdate.exe.2.dr Static PE information: Section: .data ZLIB complexity 0.9972468899880096
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, T7K8j40yAnyj77Wa8t.cs Cryptographic APIs: 'CreateDecryptor'
Source: classification engine Classification label: mal100.phis.troj.spyw.evad.winEXE@7/7@3/3
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00415AFD GetLastError,FormatMessageW,FormatMessageA,LocalFree,free, 6_2_00415AFD
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_030EA9DA AdjustTokenPrivileges, 2_2_030EA9DA
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_030EA9A3 AdjustTokenPrivileges, 2_2_030EA9A3
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0256A9DA AdjustTokenPrivileges, 8_2_0256A9DA
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0256A9A3 AdjustTokenPrivileges, 8_2_0256A9A3
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_02AFA9DA AdjustTokenPrivileges, 9_2_02AFA9DA
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_02AFA9A3 AdjustTokenPrivileges, 9_2_02AFA9A3
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free, 6_2_00415F87
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle, 6_2_00411196
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_0040ED0B FindResourceA,SizeofResource,LoadResource,LockResource, 5_2_0040ED0B
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Roaming\pid.txt Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Mutant created: NULL
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe File created: C:\Users\user\AppData\Local\Temp\holdermail.txt Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: vbc.exe, 00000006.00000002.1488398346.000000000260A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: file.exe ReversingLabs: Detection: 68%
Source: C:\Users\user\Desktop\file.exe File read: C:\Users\user\Desktop\file.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
Source: unknown Process created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: napinsp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: pnrpnsp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wshbth.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: nlaapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winrnr.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: security.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msv1_0.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ntlmshared.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptdll.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: pstorec.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: pstorec.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: security.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: msv1_0.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: ntlmshared.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: cryptdll.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: security.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: msv1_0.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: ntlmshared.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Section loaded: cryptdll.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\file.exe File written: C:\Windows\assembly\Desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Automated click: OK
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Automated click: OK
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Automated click: OK
Source: C:\Users\user\Desktop\file.exe File opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Jump to behavior
Source: file.exe Static file information: File size 1744384 > 1048576
Source: C:\Users\user\Desktop\file.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll Jump to behavior
Source: file.exe Static PE information: Raw size of .data is bigger than: 0x100000 < 0x104a00
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Windows\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3830984984.0000000009596000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: indows\System.Runtime.Remoting.pdbpdbing.pdb7 source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: indows\symbols\dll\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbO[ source: file.exe, 00000002.00000002.3830984984.0000000009596000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ws\dll\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3822570770.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: _.pdb source: file.exe, 00000002.00000002.3828060827.0000000004398000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1607673008.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1610567858.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, WindowsUpdate.exe, 00000008.00000002.1609878742.0000000004421000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000009.00000002.1711672680.0000000004418000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdbo source: file.exe, 00000002.00000002.3822570770.0000000000C11000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdbI source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: file.exe, 00000002.00000002.3832442794.000000000A060000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Runtime.Remoting.pdb0| source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000005.00000002.1485373201.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: C:\Windows\dll\System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: file.exe, 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, vbc.exe, vbc.exe, 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: System.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003307000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: em.Runtime.Remoting.pdb source: file.exe, 00000002.00000002.3825078969.0000000003300000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Runtime.Remoting.pdbc source: file.exe, 00000002.00000002.3832742558.000000000A450000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, T7K8j40yAnyj77Wa8t.cs .Net Code: Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777365)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777259)),Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777257))})
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, T7K8j40yAnyj77Wa8t.cs .Net Code: Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777365)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777259)),Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777257))})
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, T7K8j40yAnyj77Wa8t.cs .Net Code: Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777365)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777259)),Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777257))})
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, T7K8j40yAnyj77Wa8t.cs .Net Code: Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777365)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777259)),Type.GetTypeFromHandle(i6IvJQK7Bd6MyP8l2U.I0TFQV5Dk7OJU(16777257))})
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00403C3D LoadLibraryA,GetProcAddress,strcpy, 5_2_00403C3D
Source: WindowsUpdate.exe.2.dr Static PE information: real checksum: 0x2ffd9 should be: 0x1b9a3e
Source: file.exe Static PE information: real checksum: 0x2ffd9 should be: 0x1b9a3e
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: WindowsUpdate.exe.2.dr Static PE information: section name:
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_02724CB5 push ebx; retf 0001h 2_2_02724CB9
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_027305B1 push esp; retn 0001h 2_2_027305B2
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_054D6192 push esi; iretd 2_2_054D6193
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_054D3E28 push edx; retf 2_2_054D3E29
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00411879 push ecx; ret 5_2_00411889
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_004118A0 push eax; ret 5_2_004118B4
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_004118A0 push eax; ret 5_2_004118DC
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00442871 push ecx; ret 6_2_00442881
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00442A90 push eax; ret 6_2_00442AA4
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00442A90 push eax; ret 6_2_00442ACC
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00446E54 push eax; ret 6_2_00446E61
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049A098 push ecx; mov dword ptr [esp], eax 8_2_0049A099
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049A098 push ecx; mov dword ptr [esp], eax 8_2_0049A099
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049A098 push ecx; mov dword ptr [esp], eax 8_2_0049A099
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049A098 push ecx; mov dword ptr [esp], eax 8_2_0049A099
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_00493198 push eax; ret 8_2_004931D4
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049A2C4 push ecx; mov dword ptr [esp], eax 8_2_0049A2C5
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004B135C push ecx; mov dword ptr [esp], edx 8_2_004B135E
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A9468 push ecx; mov dword ptr [esp], eax 8_2_004A9469
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004AC538 push ecx; mov dword ptr [esp], ecx 8_2_004AC53D
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A96CC push ecx; mov dword ptr [esp], edx 8_2_004A96D1
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A67E4 push 004A685Ah; ret 8_2_004A6852
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A685C push 004A6904h; ret 8_2_004A68FC
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A98F4 push ecx; mov dword ptr [esp], edx 8_2_004A98F9
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A6906 push 004A6A54h; ret 8_2_004A6A4C
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A7904 push 004A7951h; ret 8_2_004A7949
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049692C push 0049697Dh; ret 8_2_00496975
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049F98A push 0049F9FBh; ret 8_2_0049F9F3
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A9A54 push ecx; mov dword ptr [esp], edx 8_2_004A9A59
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0049FA04 push 0049FA38h; ret 8_2_0049FA30
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_004A9A10 push ecx; mov dword ptr [esp], edx 8_2_004A9A15
Source: file.exe Static PE information: section name: entropy: 7.9969468718881
Source: file.exe Static PE information: section name: entropy: 7.925198071277456
Source: file.exe Static PE information: section name: entropy: 7.259464038085116
Source: file.exe Static PE information: section name: entropy: 7.999517806191356
Source: file.exe Static PE information: section name: .data entropy: 7.983532029632699
Source: WindowsUpdate.exe.2.dr Static PE information: section name: entropy: 7.9969468718881
Source: WindowsUpdate.exe.2.dr Static PE information: section name: entropy: 7.925198071277456
Source: WindowsUpdate.exe.2.dr Static PE information: section name: entropy: 7.259464038085116
Source: WindowsUpdate.exe.2.dr Static PE information: section name: entropy: 7.999517806191356
Source: WindowsUpdate.exe.2.dr Static PE information: section name: .data entropy: 7.983532029632699
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, HGGcLEDOe2xwWaNbw7.cs High entropy of concatenated method names: 'JBgmLHkktF', 'HXummqDCF1', 'aKPmSivMjT', 'xE3mOj5Mdi', 'aM1mvQT386', 'rKemjSFh8I', 'AStmtnmqrU', 'iLamUJS1rv', 'c2WmC7891v', 'WbTmeHsE8X'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, T7K8j40yAnyj77Wa8t.cs High entropy of concatenated method names: 'w8wF3BPTgAkh73hHNVU', 'rDkDcuPzAyjYemyQM9d', 'AKnLFIMDwh', 'Ja1D2f1t5K1dWJWko21', 'DSm5qX1plhpj1sflOgl', 'n6KOXp16IqdMmfGOGan', 'bJx63M1UwG0dUqJMf95', 'bfeD6L1JLdGDCdcqjto', 'yEakYY1lr4sMIBfeZeF', 'vIB3Er1bVPDeYRBQLHU'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, Ft3NU8so0CaW6b1ZiJ.cs High entropy of concatenated method names: 'Ft3sNU8o0', 'jaWg6b1Zi', 'OnCreateMainForm', 'mlReaYJYFj3TZPIYnG', 'WQohq56rondVgoIuAf', 'bVvw4cUxMIvo3hrv2x', 'Gx0oWWlXLE4puacaWW', 'FJvbiWbCIhtxmNXmFJ', 'J2CH4aOLrAKZDsJ4If', 'mX64njqkbMk5cSnx8c'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, Form1.cs High entropy of concatenated method names: 'WZw2DLTqd', 'Dispose', 'OtTpkAY8y', 'QQWmGrndve', 'kCYm4ayuC8', 'UnhookWindowsHookEx', 'jFyh6kd0f', 'sBs9caGTO', 'iEHyonAl8', 'ItlYZXniZ'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, RunPE.cs High entropy of concatenated method names: 'YC9gVtxKaP', 'LWGgEapB7w', 'L3kgnGhu79', 'CaXgGhbFqr', 'uZDg4Rcc8K', 'U4vgusHk1W', 'I8xgrYr8fu', 'QsEgxr4rH8', 'mdQgT0lJCs', 'PE'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, VY9oZVSlHjNlxU4CoP.cs High entropy of concatenated method names: 'OqsuS4Zoo', 'm1crVkrvA', 'Equals', 'GetHashCode', 'Epmx2fgLA', 'ToString', 'rsqsvpKhBmTs0da7Y8', 'X8leKaLuoHJYQqnAtg', 'L2UrB8aF7O4lS4KUOm', 'TefVnLQJgAIT7qYBZx'
Source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, ilZXni4ZIYHALvG1SQ.cs High entropy of concatenated method names: 'chogwkC7rm', 'zG1gs15ZVa', 'bQXgg7mo5y', 'qDZgLguZ5M', 'G9KgOwH3XX', 'xlRgvfqwsY', 'AJXgmP3KTq', 'xWEgSMwyE8', 'WndProc', 'Finalize'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, HGGcLEDOe2xwWaNbw7.cs High entropy of concatenated method names: 'JBgmLHkktF', 'HXummqDCF1', 'aKPmSivMjT', 'xE3mOj5Mdi', 'aM1mvQT386', 'rKemjSFh8I', 'AStmtnmqrU', 'iLamUJS1rv', 'c2WmC7891v', 'WbTmeHsE8X'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, T7K8j40yAnyj77Wa8t.cs High entropy of concatenated method names: 'w8wF3BPTgAkh73hHNVU', 'rDkDcuPzAyjYemyQM9d', 'AKnLFIMDwh', 'Ja1D2f1t5K1dWJWko21', 'DSm5qX1plhpj1sflOgl', 'n6KOXp16IqdMmfGOGan', 'bJx63M1UwG0dUqJMf95', 'bfeD6L1JLdGDCdcqjto', 'yEakYY1lr4sMIBfeZeF', 'vIB3Er1bVPDeYRBQLHU'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, Ft3NU8so0CaW6b1ZiJ.cs High entropy of concatenated method names: 'Ft3sNU8o0', 'jaWg6b1Zi', 'OnCreateMainForm', 'mlReaYJYFj3TZPIYnG', 'WQohq56rondVgoIuAf', 'bVvw4cUxMIvo3hrv2x', 'Gx0oWWlXLE4puacaWW', 'FJvbiWbCIhtxmNXmFJ', 'J2CH4aOLrAKZDsJ4If', 'mX64njqkbMk5cSnx8c'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, Form1.cs High entropy of concatenated method names: 'WZw2DLTqd', 'Dispose', 'OtTpkAY8y', 'QQWmGrndve', 'kCYm4ayuC8', 'UnhookWindowsHookEx', 'jFyh6kd0f', 'sBs9caGTO', 'iEHyonAl8', 'ItlYZXniZ'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, RunPE.cs High entropy of concatenated method names: 'YC9gVtxKaP', 'LWGgEapB7w', 'L3kgnGhu79', 'CaXgGhbFqr', 'uZDg4Rcc8K', 'U4vgusHk1W', 'I8xgrYr8fu', 'QsEgxr4rH8', 'mdQgT0lJCs', 'PE'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, VY9oZVSlHjNlxU4CoP.cs High entropy of concatenated method names: 'OqsuS4Zoo', 'm1crVkrvA', 'Equals', 'GetHashCode', 'Epmx2fgLA', 'ToString', 'rsqsvpKhBmTs0da7Y8', 'X8leKaLuoHJYQqnAtg', 'L2UrB8aF7O4lS4KUOm', 'TefVnLQJgAIT7qYBZx'
Source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, ilZXni4ZIYHALvG1SQ.cs High entropy of concatenated method names: 'chogwkC7rm', 'zG1gs15ZVa', 'bQXgg7mo5y', 'qDZgLguZ5M', 'G9KgOwH3XX', 'xlRgvfqwsY', 'AJXgmP3KTq', 'xWEgSMwyE8', 'WndProc', 'Finalize'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, HGGcLEDOe2xwWaNbw7.cs High entropy of concatenated method names: 'JBgmLHkktF', 'HXummqDCF1', 'aKPmSivMjT', 'xE3mOj5Mdi', 'aM1mvQT386', 'rKemjSFh8I', 'AStmtnmqrU', 'iLamUJS1rv', 'c2WmC7891v', 'WbTmeHsE8X'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, T7K8j40yAnyj77Wa8t.cs High entropy of concatenated method names: 'w8wF3BPTgAkh73hHNVU', 'rDkDcuPzAyjYemyQM9d', 'AKnLFIMDwh', 'Ja1D2f1t5K1dWJWko21', 'DSm5qX1plhpj1sflOgl', 'n6KOXp16IqdMmfGOGan', 'bJx63M1UwG0dUqJMf95', 'bfeD6L1JLdGDCdcqjto', 'yEakYY1lr4sMIBfeZeF', 'vIB3Er1bVPDeYRBQLHU'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, Ft3NU8so0CaW6b1ZiJ.cs High entropy of concatenated method names: 'Ft3sNU8o0', 'jaWg6b1Zi', 'OnCreateMainForm', 'mlReaYJYFj3TZPIYnG', 'WQohq56rondVgoIuAf', 'bVvw4cUxMIvo3hrv2x', 'Gx0oWWlXLE4puacaWW', 'FJvbiWbCIhtxmNXmFJ', 'J2CH4aOLrAKZDsJ4If', 'mX64njqkbMk5cSnx8c'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, Form1.cs High entropy of concatenated method names: 'WZw2DLTqd', 'Dispose', 'OtTpkAY8y', 'QQWmGrndve', 'kCYm4ayuC8', 'UnhookWindowsHookEx', 'jFyh6kd0f', 'sBs9caGTO', 'iEHyonAl8', 'ItlYZXniZ'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, RunPE.cs High entropy of concatenated method names: 'YC9gVtxKaP', 'LWGgEapB7w', 'L3kgnGhu79', 'CaXgGhbFqr', 'uZDg4Rcc8K', 'U4vgusHk1W', 'I8xgrYr8fu', 'QsEgxr4rH8', 'mdQgT0lJCs', 'PE'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, VY9oZVSlHjNlxU4CoP.cs High entropy of concatenated method names: 'OqsuS4Zoo', 'm1crVkrvA', 'Equals', 'GetHashCode', 'Epmx2fgLA', 'ToString', 'rsqsvpKhBmTs0da7Y8', 'X8leKaLuoHJYQqnAtg', 'L2UrB8aF7O4lS4KUOm', 'TefVnLQJgAIT7qYBZx'
Source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, ilZXni4ZIYHALvG1SQ.cs High entropy of concatenated method names: 'chogwkC7rm', 'zG1gs15ZVa', 'bQXgg7mo5y', 'qDZgLguZ5M', 'G9KgOwH3XX', 'xlRgvfqwsY', 'AJXgmP3KTq', 'xWEgSMwyE8', 'WndProc', 'Finalize'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, HGGcLEDOe2xwWaNbw7.cs High entropy of concatenated method names: 'JBgmLHkktF', 'HXummqDCF1', 'aKPmSivMjT', 'xE3mOj5Mdi', 'aM1mvQT386', 'rKemjSFh8I', 'AStmtnmqrU', 'iLamUJS1rv', 'c2WmC7891v', 'WbTmeHsE8X'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, T7K8j40yAnyj77Wa8t.cs High entropy of concatenated method names: 'w8wF3BPTgAkh73hHNVU', 'rDkDcuPzAyjYemyQM9d', 'AKnLFIMDwh', 'Ja1D2f1t5K1dWJWko21', 'DSm5qX1plhpj1sflOgl', 'n6KOXp16IqdMmfGOGan', 'bJx63M1UwG0dUqJMf95', 'bfeD6L1JLdGDCdcqjto', 'yEakYY1lr4sMIBfeZeF', 'vIB3Er1bVPDeYRBQLHU'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, Ft3NU8so0CaW6b1ZiJ.cs High entropy of concatenated method names: 'Ft3sNU8o0', 'jaWg6b1Zi', 'OnCreateMainForm', 'mlReaYJYFj3TZPIYnG', 'WQohq56rondVgoIuAf', 'bVvw4cUxMIvo3hrv2x', 'Gx0oWWlXLE4puacaWW', 'FJvbiWbCIhtxmNXmFJ', 'J2CH4aOLrAKZDsJ4If', 'mX64njqkbMk5cSnx8c'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, Form1.cs High entropy of concatenated method names: 'WZw2DLTqd', 'Dispose', 'OtTpkAY8y', 'QQWmGrndve', 'kCYm4ayuC8', 'UnhookWindowsHookEx', 'jFyh6kd0f', 'sBs9caGTO', 'iEHyonAl8', 'ItlYZXniZ'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, RunPE.cs High entropy of concatenated method names: 'YC9gVtxKaP', 'LWGgEapB7w', 'L3kgnGhu79', 'CaXgGhbFqr', 'uZDg4Rcc8K', 'U4vgusHk1W', 'I8xgrYr8fu', 'QsEgxr4rH8', 'mdQgT0lJCs', 'PE'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, VY9oZVSlHjNlxU4CoP.cs High entropy of concatenated method names: 'OqsuS4Zoo', 'm1crVkrvA', 'Equals', 'GetHashCode', 'Epmx2fgLA', 'ToString', 'rsqsvpKhBmTs0da7Y8', 'X8leKaLuoHJYQqnAtg', 'L2UrB8aF7O4lS4KUOm', 'TefVnLQJgAIT7qYBZx'
Source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, ilZXni4ZIYHALvG1SQ.cs High entropy of concatenated method names: 'chogwkC7rm', 'zG1gs15ZVa', 'bQXgg7mo5y', 'qDZgLguZ5M', 'G9KgOwH3XX', 'xlRgvfqwsY', 'AJXgmP3KTq', 'xWEgSMwyE8', 'WndProc', 'Finalize'
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Update Jump to behavior
Source: C:\Users\user\Desktop\file.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Update Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\file.exe Key value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced Hidden Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_0040F64B memset,strcpy,memset,strcpy,strcat,strcpy,strcat,GetModuleHandleA,LoadLibraryExA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 5_2_0040F64B
Source: C:\Users\user\Desktop\file.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\file.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: file.exe PID: 7556, type: MEMORYSTR
Source: C:\Users\user\Desktop\file.exe Memory allocated: 3170000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory allocated: 5310000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Memory allocated: 25B0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Memory allocated: 28D0000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Memory allocated: 2B80000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Memory allocated: 5390000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window / User API: threadDelayed 558 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window / User API: threadDelayed 947 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window / User API: threadDelayed 973 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window / User API: threadDelayed 5689 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Window / User API: threadDelayed 758 Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7588 Thread sleep time: -947000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7616 Thread sleep time: -973000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7676 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7848 Thread sleep time: -120000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7852 Thread sleep time: -140000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8064 Thread sleep time: -180000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8072 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8072 Thread sleep time: -100000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8072 Thread sleep time: -100000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7588 Thread sleep time: -5689000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8072 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 8108 Thread sleep count: 188 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 8168 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 8136 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 1172 Thread sleep count: 758 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 7140 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 4872 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen, 5_2_00406EC3
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen, 6_2_00408441
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_00407E0E FindFirstFileW,FindNextFileW,FindClose, 6_2_00407E0E
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F7442 GetSystemInfo, 2_2_059F7442
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 120000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 140000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: WindowsUpdate.exe, 00000008.00000002.1607370163.0000000000C6E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
Source: WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005CA000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: JwaWinBase]DLL_Loader_VirtualMachine(Win32TypesfZ
Source: WindowsUpdate.exe, 00000008.00000002.1603365983.0000000000490000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: VBoxService.exe
Source: WindowsUpdate.exe, WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005B2000.00000040.00000001.01000000.0000000C.sdmp, WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005CA000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: ~VirtualMachineTypes
Source: file.exe, 00000002.00000002.3822570770.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
Source: WindowsUpdate.exe, WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005B2000.00000040.00000001.01000000.0000000C.sdmp, WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005CA000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: ]DLL_Loader_VirtualMachine
Source: WindowsUpdate.exe, 00000008.00000002.1603365983.0000000000490000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: VMWare
Source: WindowsUpdate.exe, 00000008.00000002.1603365983.00000000005B2000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
Source: WindowsUpdate.exe, 00000009.00000002.1705391816.0000000000B4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\file.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00403C3D LoadLibraryA,GetProcAddress,strcpy, 5_2_00403C3D
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_02733F39 mov eax, dword ptr fs:[00000030h] 2_2_02733F39
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_02733F39 mov eax, dword ptr fs:[00000030h] 2_2_02733F39
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_02723F8A mov eax, dword ptr fs:[00000030h] 8_2_02723F8A
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_02723F8A mov eax, dword ptr fs:[00000030h] 8_2_02723F8A
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_02723F88 mov eax, dword ptr fs:[00000030h] 8_2_02723F88
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_02723F88 mov eax, dword ptr fs:[00000030h] 8_2_02723F88
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_02933F90 mov eax, dword ptr fs:[00000030h] 9_2_02933F90
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_02933F90 mov eax, dword ptr fs:[00000030h] 9_2_02933F90
Source: C:\Users\user\Desktop\file.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 2.2.file.exe.33522a4.0.raw.unpack, CMemoryExecute.cs .Net Code: Run contains injection code
Source: 2.2.file.exe.a060000.7.raw.unpack, CMemoryExecute.cs .Net Code: Run contains injection code
Source: 2.2.file.exe.5c463a1.6.raw.unpack, CMemoryExecute.cs .Net Code: Run contains injection code
Source: 2.2.file.exe.33522a4.0.raw.unpack, CMemoryExecute.cs Reference to suspicious API methods: VirtualAllocEx((IntPtr)array4[0], intPtr, *(uint*)(ptr2 + 80), 12288u, 64u)
Source: 2.2.file.exe.33522a4.0.raw.unpack, CMemoryExecute.cs Reference to suspicious API methods: NtWriteVirtualMemory((IntPtr)array4[0], intPtr, (IntPtr)ptr5, *(uint*)(ptr2 + 84), IntPtr.Zero)
Source: 2.2.file.exe.33522a4.0.raw.unpack, CMemoryExecute.cs Reference to suspicious API methods: NtSetContextThread((IntPtr)array4[1], (IntPtr)ptr4)
Source: C:\Users\user\Desktop\file.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 6_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy, 6_2_0041604B
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_0040724C memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy, 5_2_0040724C
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: 5_2_00406278 GetVersionExA, 5_2_00406278
Source: C:\Users\user\Desktop\file.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: file.exe, 00000002.00000002.3822570770.0000000000B2E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7556, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WindowsUpdate.exe PID: 8104, type: MEMORYSTR
Source: Yara match File source: 2.2.file.exe.5c47da6.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5c47da6.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.4313248.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5c463a1.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.4313248.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf053c.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1485373201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7556, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: vbc.exe PID: 7944, type: MEMORYSTR
Source: Yara match File source: 8.2.WindowsUpdate.exe.24b6f16.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4424140.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0ee8.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4423258.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.44ac610.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0000.9.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.5520000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4423258.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4424140.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.1607673008.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1610567858.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1610355342.0000000005520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1609878742.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword 5_2_00402D9A
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword 5_2_00402D9A
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe Code function: ESMTPPassword 5_2_004033D7
Source: Yara match File source: 6.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.4313248.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.432b468.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf053c.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.432b468.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf053c.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.file.exe.5bf0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.3828060827.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.3829547092.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.1487462665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7556, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: vbc.exe PID: 7968, type: MEMORYSTR

Remote Access Functionality

barindex
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: \pidloc.txt HawkEyeKeylogger
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: Installed Firewall: LHawkEye_Keylogger_Execution_Confirmed_
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ==============================================DHawkEye_Keylogger_Stealer_Records_LHawkEye Keylogger | Stealer Records |
Source: file.exe, 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: .jpegBHawkEye_Keylogger_Keylog_Records_
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: \pidloc.txt HawkEyeKeylogger
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: Installed Firewall: LHawkEye_Keylogger_Execution_Confirmed_
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ==============================================DHawkEye_Keylogger_Stealer_Records_LHawkEye Keylogger | Stealer Records |
Source: WindowsUpdate.exe, 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: .jpegBHawkEye_Keylogger_Keylog_Records_
Source: WindowsUpdate.exe, 00000009.00000002.1710822613.00000000033BA000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: .jpegBHawkEye_Keylogger_Keylog_Records_
Source: Yara match File source: 00000008.00000002.1609372667.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.3825159403.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7556, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WindowsUpdate.exe PID: 8104, type: MEMORYSTR
Source: Yara match File source: 8.2.WindowsUpdate.exe.24b6f16.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4424140.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0ee8.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.5520000.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4423258.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.24b6f16.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0ee8.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.44ac610.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.55b0000.9.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.5520000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.44ac610.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4423258.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.WindowsUpdate.exe.4424140.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.1607673008.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1610567858.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1610355342.0000000005520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1609878742.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F1B0A bind, 2_2_059F1B0A
Source: C:\Users\user\Desktop\file.exe Code function: 2_2_059F1AD7 bind, 2_2_059F1AD7
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_05861C32 bind, 8_2_05861C32
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0586186A listen, 8_2_0586186A
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_05861BFF bind, 8_2_05861BFF
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 8_2_0586182C listen, 8_2_0586182C
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_03371C32 bind, 9_2_03371C32
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_0337186A listen, 9_2_0337186A
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_0337182C listen, 9_2_0337182C
Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe Code function: 9_2_03371BFF bind, 9_2_03371BFF
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs