Click to jump to signature section
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | ReversingLabs: Detection: 55% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Joe Sandbox ML: detected |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355913014.00007FF65DEE4000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: -----BEGIN PUBLIC KEY----- | memstr_e2f1d524-9 |
Source: unknown | HTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.10:49728 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View | IP Address: 104.26.1.5 104.26.1.5 |
Source: Joe Sandbox View | JA3 fingerprint: ce5f3254611a8c095a3d821d44539877 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: keyauth.win |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355913014.00007FF65DEE4000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/.COM;lc |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/64ApVc |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/C: |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/em |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | HTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.10:49728 version: TLS 1.2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7624 -s 508 |
Source: classification engine | Classification label: mal84.evad.winEXE@18/1@1/2 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7644:120:WilError_03 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6168:120:WilError_03 |
Source: C:\Windows\System32\WerFault.exe | File created: C:\ProgramData\Microsoft\Windows\WER\Temp\e4d9d42d-99b1-4226-a99b-4493de9da26d | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | ReversingLabs: Detection: 55% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\find.exe find /i /v "md5" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\find.exe find /i /v "certutil" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /t 5 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7624 -s 508 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\find.exe find /i /v "md5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\find.exe find /i /v "certutil" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /t 5 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: certcli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: cryptui.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: certca.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\find.exe | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\System32\find.exe | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\System32\find.exe | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\System32\find.exe | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\System32\timeout.exe | Section loaded: version.dll | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static file information: File size 5856256 > 1048576 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: Raw size of .lol2 is bigger than: 0x100000 < 0x594000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: initial sample | Static PE information: section where entry point is pointing to: .lol2 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: section name: .lol0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: section name: .lol1 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Static PE information: section name: .lol2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Memory written: PID: 7624 base: 7FF841A3000D value: E9 BB CB EC FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Memory written: PID: 7624 base: 7FF8418FCBC0 value: E9 5A 34 13 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355779625.000001D423195000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355779625.000001D423195000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355779625.000001D423195000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXEK |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E7F8BB7 second address: 7FF65E7F8BC1 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 inc ecx 0x00000005 pop ecx 0x00000006 inc ecx 0x00000007 movsx edx, cx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E23F4C8 second address: 7FF65E23F4D8 instructions: 0x00000000 rdtsc 0x00000002 inc esp 0x00000003 xor cl, ah 0x00000005 inc ebp 0x00000006 btr ebx, eax 0x00000009 popfd 0x0000000a movzx esi, sp 0x0000000d inc ecx 0x0000000e pop edx 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E28631A second address: 7FF65E286324 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 inc ecx 0x00000005 pop ecx 0x00000006 inc ecx 0x00000007 movsx edx, cx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E2355F8 second address: 7FF65E23560C instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 xadd ch, bl 0x00000006 add bp, 3FBFh 0x0000000b popfd 0x0000000c dec eax 0x0000000d movzx ebp, bp 0x00000010 cbw 0x00000012 inc ecx 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E23560C second address: 7FF65E235615 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 movsx eax, cx 0x00000006 cdq 0x00000007 pop esi 0x00000008 lahf 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E235615 second address: 7FF65E235627 instructions: 0x00000000 rdtsc 0x00000002 inc cx 0x00000004 movsx edi, dl 0x00000007 inc ecx 0x00000008 pop ebp 0x00000009 inc ecx 0x0000000a not bl 0x0000000c inc ecx 0x0000000d pop ecx 0x0000000e inc esp 0x0000000f movzx edi, bx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | RDTSC instruction interceptor: First address: 7FF65E7E6291 second address: 7FF65E7E62A1 instructions: 0x00000000 rdtsc 0x00000002 inc esp 0x00000003 xor cl, ah 0x00000005 inc ebp 0x00000006 btr ebx, eax 0x00000009 popfd 0x0000000a movzx esi, sp 0x0000000d inc ecx 0x0000000e pop edx 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Special instruction interceptor: First address: 7FF65E6E8094 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Special instruction interceptor: First address: 7FF65E2A2D41 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Windows\System32\timeout.exe TID: 5900 | Thread sleep count: 41 > 30 | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217E4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | System information queried: ModuleInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Handle closed: DEADC0DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtQuerySystemInformation: Indirect: 0x7FF65E2A2D6F | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtSetInformationThread: Direct from: 0x7FF65E83377F | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtProtectVirtualMemory: Direct from: 0x7FF65E833759 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtQueryInformationProcess: Direct from: 0x7FF65E29EFED | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtQueryInformationProcess: Direct from: 0x7FF65E833883 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtQuerySystemInformation: Indirect: 0x7FF65E2A2D77 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtSetInformationThread: Direct from: 0x7FF65E833832 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtQuerySystemInformation: Indirect: 0x7FF65E2A2DB1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | NtProtectVirtualMemory: Direct from: 0x7FF65E83370F | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\find.exe find /i /v "md5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\find.exe find /i /v "certutil" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /t 5 | Jump to behavior |