Source: Submited Sample |
Integrated Neural Analysis Model: Matched 99.7% probability |
Source: file.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: file.exe, 00000000.00000002.2042940995.00007FF6D1A1B000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: http://193.169.105.15:3000/download/seyhhdBuild.exeC: |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A14860 |
0_2_00007FF6D1A14860 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A12080 |
0_2_00007FF6D1A12080 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A13320 |
0_2_00007FF6D1A13320 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1BED2F1 |
0_2_00007FF6D1BED2F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A151A0 |
0_2_00007FF6D1A151A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A1435B |
0_2_00007FF6D1A1435B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A12340 |
0_2_00007FF6D1A12340 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A11340 |
0_2_00007FF6D1A11340 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A135C0 |
0_2_00007FF6D1A135C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A2504C |
0_2_00007FF6D1A2504C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A18880 |
0_2_00007FF6D1A18880 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A14829 |
0_2_00007FF6D1A14829 |
Source: file.exe, 00000000.00000003.2042527988.000001A3BB962000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameD3D10Warp.dllj% vs file.exe |
Source: file.exe, 00000000.00000002.2042835645.000001A3BB963000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameD3D10Warp.dllj% vs file.exe |
Source: classification engine |
Classification label: mal56.evad.winEXE@1/0@0/0 |
Source: C:\Users\user\Desktop\file.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: msvcp140.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: d3d9.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140_1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140_1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: d3d10warp.dll |
Jump to behavior |
Source: file.exe |
Static PE information: Image base 0x140000000 > 0x60000000 |
Source: file.exe |
Static file information: File size 3653120 > 1048576 |
Source: file.exe |
Static PE information: Raw size of .abx is bigger than: 0x100000 < 0x379600 |
Source: file.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: initial sample |
Static PE information: section where entry point is pointing to: .abx |
Source: file.exe |
Static PE information: section name: ._/b |
Source: file.exe |
Static PE information: section name: .DIl |
Source: file.exe |
Static PE information: section name: .abx |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A19936 push rsi; iretd |
0_2_00007FF6D1A19937 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A23BD7 push rax; ret |
0_2_00007FF6D1A23BD8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A22F10 push rdi; retf |
0_2_00007FF6D1A22F11 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1A228B9 push rbx; iretd |
0_2_00007FF6D1A228C1 |
Source: C:\Users\user\Desktop\file.exe |
Memory written: PID: 3556 base: 7FF8C8A50008 value: E9 EB D9 E9 FF |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Memory written: PID: 3556 base: 7FF8C88ED9F0 value: E9 20 26 16 00 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened / queried: HGFS |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened / queried: VBoxMiniRdrDN |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1F53225 rdtsc |
0_2_00007FF6D1F53225 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\file.exe |
Process information queried: ProcessInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00007FF6D1F53225 rdtsc |
0_2_00007FF6D1F53225 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\file.exe |
NtMapViewOfSection: Direct from: 0x7FF6D1CBD61A |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Indirect: 0x7FF6D1C17FD4 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1ED7FE6 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1C71678 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1C66A48 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1F0A270 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1EDF15C |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1CCBF20 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1EF227F |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1F114E7 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1C553C2 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtProtectVirtualMemory: Direct from: 0x7FF6D1C3D3FA |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
NtUnmapViewOfSection: Direct from: 0x7FF6D1C6CE80 |
Jump to behavior |