Source: CLNGs0rZD4.exe |
ReversingLabs: Detection: 57% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: CLNGs0rZD4.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: Joe Sandbox View |
ASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS |
Source: Network traffic |
Suricata IDS: 2850023 - Severity 1 - ETPRO JA3 Hash - Possible Ligolo Server/Golang Binary Response : 34.22.231.73:443 -> 192.168.2.6:55400 |
Source: unknown |
DNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3) |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.22.231.73 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49711 |
Source: unknown |
Network traffic detected: HTTP traffic on port 55400 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49711 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 55400 |
Source: unknown |
Network traffic detected: HTTP traffic on port 55395 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 55395 |
Source: explorer.exe, 00000003.00000002.3405497706.000000C000182000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: RegisterRawInputDevices |
memstr_e9d2a3c7-c |
Source: CLNGs0rZD4.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 0.0.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 0.2.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000003.00000002.3404033112.0000000004B71000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown |
Source: 00000003.00000002.3402461880.0000000003C2F000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown |
Source: 00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000000.00000000.2159400728.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000003.00000002.3401343293.0000000000800000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000000.00000002.2171227596.000001A96A531000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTR |
Matched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown |
Source: CLNGs0rZD4.exe |
Static PE information: Number of sections : 19 > 10 |
Source: CLNGs0rZD4.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 0.0.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 0.2.CLNGs0rZD4.exe.7ff6e8840000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000003.00000002.3404033112.0000000004B71000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14 |
Source: 00000003.00000002.3402461880.0000000003C2F000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14 |
Source: 00000000.00000002.2175628426.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000000.00000000.2159400728.00007FF6E88F8000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000003.00000002.3401343293.0000000000800000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000000.00000002.2171227596.000001A96A531000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTR |
Matched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14 |
Source: classification engine |
Classification label: mal96.troj.evad.winEXE@4/1@1/1 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3960:120:WilError_03 |
Source: C:\Windows\explorer.exe |
File opened: C:\Windows\system32\9953560394ab05fca6ab04dd8b46ba74ee75865b8a04b4dbd463b820e163b64aAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Process created: C:\Windows\explorer.exe |
|
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Process created: C:\Windows\explorer.exe |
Jump to behavior |
Source: CLNGs0rZD4.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: CLNGs0rZD4.exe |
ReversingLabs: Detection: 57% |
Source: unknown |
Process created: C:\Users\user\Desktop\CLNGs0rZD4.exe "C:\Users\user\Desktop\CLNGs0rZD4.exe" |
|
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Process created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" |
|
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Process created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: aepic.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: twinapi.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: powrprof.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: dxgi.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: twinapi.appcore.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: umpdc.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: CLNGs0rZD4.exe |
Static PE information: Image base 0x140000000 > 0x60000000 |
Source: CLNGs0rZD4.exe |
Static file information: File size 7852704 > 1048576 |
Source: CLNGs0rZD4.exe |
Static PE information: Raw size of .data is bigger than: 0x100000 < 0x53b600 |
Source: CLNGs0rZD4.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: CLNGs0rZD4.exe |
Static PE information: section name: .xdata |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /4 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /19 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /31 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /45 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /57 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /70 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /81 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /97 |
Source: CLNGs0rZD4.exe |
Static PE information: section name: /113 |
Source: C:\Windows\explorer.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
Jump to behavior |
Source: explorer.exe, 00000003.00000002.3401745300.0000000000E83000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Memory allocated: C:\Windows\explorer.exe base: 800000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Memory written: PID: 5264 base: 800000 value: E8 |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Memory written: C:\Windows\explorer.exe base: 800000 |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Process created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\CLNGs0rZD4.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: Yara match |
File source: 00000003.00000002.3405497706.000000C000138000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTR |
Source: Yara match |
File source: 00000003.00000002.3405497706.000000C000138000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: explorer.exe PID: 5264, type: MEMORYSTR |