Click to jump to signature section
Source: Submited Sample | Integrated Neural Analysis Model: Matched 97.7% probability |
Source: unknown | HTTPS traffic detected: 162.159.138.232:443 -> 192.168.2.6:49712 version: TLS 1.2 |
Source: runtime.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: blah.pdb source: runtime.exe |
Source: | Binary string: blah.pdb- source: runtime.exe |
Source: global traffic | HTTP traffic detected: POST /api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R6R7FDurnupZArnouhEkR5 HTTP/1.1content-type: multipart/form-data; boundary=3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729f1926dcontent-length: 509accept: */*host: discord.com |
Source: Joe Sandbox View | IP Address: 162.159.138.232 162.159.138.232 |
Source: Joe Sandbox View | JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: discord.com |
Source: global traffic | DNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa |
Source: unknown | HTTP traffic detected: POST /api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R6R7FDurnupZArnouhEkR5 HTTP/1.1content-type: multipart/form-data; boundary=3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729f1926dcontent-length: 509accept: */*host: discord.com |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 25 Oct 2024 07:11:16 GMTContent-Type: application/jsonContent-Length: 45Connection: closeCache-Control: public, max-age=3600, s-maxage=3600strict-transport-security: max-age=31536000; includeSubDomains; preloadx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1729840277x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IIP0D3aRQk1L8yXSNpYeaAjncrxByOMzUuOTJYf1Wi6GWpGqortYvk7BdDgt9jMyKoTcsEy5TMHF3uleOOXQiZzwkvZXIIyBDTGNb4LywP%2B0jM262N2y9Ghb5WB6"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffSet-Cookie: __cfruid=672774b61d688e89340cc611b24790905df7aefa-1729840276; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneContent-Security-Policy: frame-ancestors 'none'; default-src 'none'Set-Cookie: _cfuvid=Fm4XHW3.LuKeG.98VTGt97lVmseXkzzkM6wIbRC1bbA-1729840276066-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8d80643cebfc2cc7-DFW |
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digic |
Source: runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digiccom/ |
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: runtime.exe, 00000000.00000003.2207099867.00000250EB69E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com1.3.6.1.5.5.7.48.2http://cacerts.digicert.com/DigiCertGlobalRootG2.crt |
Source: runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di |
Source: runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: runtime.exe, 00000000.00000002.2238055806.00000250EB1E3000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2236714574.00000250EB618000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R |
Source: runtime.exe | String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support |
Source: unknown | Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: unknown | HTTPS traffic detected: 162.159.138.232:443 -> 192.168.2.6:49712 version: TLS 1.2 |
Source: runtime.exe, type: SAMPLE | Matched rule: OlympicDestroyer Payload Author: kevoreilly |
Source: 0.2.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPE | Matched rule: OlympicDestroyer Payload Author: kevoreilly |
Source: 0.0.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPE | Matched rule: OlympicDestroyer Payload Author: kevoreilly |
Source: runtime.exe, 00000000.00000003.2203375590.00000250EB78A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameApplicationFrameHost.exej% vs runtime.exe |
Source: runtime.exe, 00000000.00000003.2195109691.00000250EB39C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameApplicationFrameHost.exej% vs runtime.exe |
Source: runtime.exe, type: SAMPLE | Matched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload |
Source: 0.2.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPE | Matched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload |
Source: 0.0.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPE | Matched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload |
Source: runtime.exe | Binary string: Failed to open \Device\Afd\Mio: Pb:@ |
Source: runtime.exe | Binary string: CompletionPorthandle\Device\Afd\Mio |
Source: classification engine | Classification label: mal64.spyw.evad.winEXE@2/3@2/1 |
Source: C:\Users\user\Desktop\runtime.exe | File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data_copy | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2680:120:WilError_03 |
Source: runtime.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\runtime.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB); |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB); |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx)); |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q); |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB); |
Source: Login Data_copy0.0.dr, Login Data_copy.0.dr | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode); |
Source: runtime.exe | String found in binary or memory: aifcaiffairapplication/vnd.adobe.air-application-installer-package+zip |
Source: runtime.exe | String found in binary or memory: aifcaiffairapplication/vnd.adobe.air-application-installer-package+zip[ |
Source: runtime.exe | String found in binary or memory: ghfapplication/vnd.groove-help |
Source: runtime.exe | String found in binary or memory: installapplication/x-install-instructions |
Source: runtime.exe | String found in binary or memory: /load_hpack; header malformed -- pseudo not at head of blockp |
Source: unknown | Process created: C:\Users\user\Desktop\runtime.exe "C:\Users\user\Desktop\runtime.exe" |
Source: C:\Users\user\Desktop\runtime.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: perfos.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: cryptnet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\runtime.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: runtime.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: runtime.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: runtime.exe | Static file information: File size 4795392 > 1048576 |
Source: runtime.exe | Static PE information: Raw size of .text is bigger than: 0x100000 < 0x31c200 |
Source: runtime.exe | Static PE information: Raw size of .rdata is bigger than: 0x100000 < 0x13e600 |
Source: runtime.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: runtime.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: blah.pdb source: runtime.exe |
Source: | Binary string: blah.pdb- source: runtime.exe |
Source: runtime.exe | Binary or memory string: PROCEXP64.EXEPROCEXP.EXEPROCMON.EXEPROCMON64.EXEPESTUDIO.EXEKSDUMPER.EXEPRL_CC.EXEPRL_TOOLS.EXEPE-SIEVE64.EXEHOLLOWS_HUNTER32.EXEMONETA64.EXEFAKENET.EXEWIRESHARK.EXEVBOXSERVICE.EXEVMWAREUSER.EXEVMTOOLSD.EXEVMWARETRAY.EXEVMSRVC.EXEVGAUTHSERVICE.EXEVBOXTRAY.EXEC:\USERS\DOHANYZOE\.CARGO\REGISTRY\SRC\INDEX.CRATES.IO-6F17D22BBA15001F\ANTILYSIS-0.1.2\SRC\LIB.RS |
Source: runtime.exe, 00000000.00000002.2238083196.00000250EB231000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2237021435.00000250EB231000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2237262559.00000250EB231000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 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 |