Windows Analysis Report
U6ghPv3E7k.exe

Overview

General Information

Sample name: U6ghPv3E7k.exe
renamed because original name is a hash value
Original sample name: 3c9bc8ec388807318127107c760233483bbba43a9c186eb7ed794d8fe4ffeb44.exe
Analysis ID: 1546123
MD5: 00ba1e1d154e18d1124d87934fae9f20
SHA1: 41bfc98b2b24f4f70852f2de62c08e3c2aaf85ad
SHA256: 3c9bc8ec388807318127107c760233483bbba43a9c186eb7ed794d8fe4ffeb44
Tags: exevacationtogotravels-netuser-JAMESWT_MHT
Infos:

Detection

Score: 3
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic

Classification

Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49771 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49807 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49835 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49865 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49901 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49932 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49961 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49997 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49999 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50000 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50002 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50003 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50004 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50005 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50006 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50007 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50008 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50009 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50010 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50011 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50012 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50013 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50014 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50015 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50016 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50017 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50018 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50019 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50020 version: TLS 1.2
Source: U6ghPv3E7k.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox View JA3 fingerprint: 6271f898ce5be7dd52b0fc260d0662b3
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49708
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49931
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: vacationtogotravels.netConnection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: vacationtogotravels.net
Source: unknown HTTP traffic detected: POST /register HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-CHUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: vacationtogotravels.netContent-Length: 8Connection: Keep-AliveCache-Control: no-cache
Source: U6ghPv3E7k.exe, 00000000.00000003.2203274887.000002D47C23E000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2194792115.000002D47C23E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vacationtogotravels.net/register
Source: U6ghPv3E7k.exe, 00000000.00000003.2257822965.000002D47C2C6000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2218327326.000002D47C24F000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2254497955.000002D47C2C6000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2251266127.000002D47C24B000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2254920750.000002D47C2C6000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2248276830.000002D47C2D3000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2256754273.000002D47C2C6000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2245514478.000002D47C290000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2257911553.000002D47C2CD000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2215564565.000002D47C24D000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2219233771.000002D47C24B000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2246626009.000002D47C2D1000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2245701697.000002D47C24B000.00000004.00000020.00020000.00000000.sdmp, U6ghPv3E7k.exe, 00000000.00000003.2251266127.000002D47C2C6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vacationtogotravels.net/upload
Source: unknown Network traffic detected: HTTP traffic on port 49865 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49865
Source: unknown Network traffic detected: HTTP traffic on port 49997 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50013 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50018
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50017
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50019
Source: unknown Network traffic detected: HTTP traffic on port 50017 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50007 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50010
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49932 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50012
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50011
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50014
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50013
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50016
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50015
Source: unknown Network traffic detected: HTTP traffic on port 49961 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49807 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50003 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49932
Source: unknown Network traffic detected: HTTP traffic on port 50010 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49771
Source: unknown Network traffic detected: HTTP traffic on port 50008 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50014 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50018 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50020
Source: unknown Network traffic detected: HTTP traffic on port 50000 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50004 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49807
Source: unknown Network traffic detected: HTTP traffic on port 49999 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49901 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49961
Source: unknown Network traffic detected: HTTP traffic on port 50009 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50011 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50015 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50019 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50005 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49835
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49999
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49997
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50007
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50006
Source: unknown Network traffic detected: HTTP traffic on port 50012 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50009
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50008
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50016 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49835 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50020 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50000
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50003
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50002
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50005
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50004
Source: unknown Network traffic detected: HTTP traffic on port 50002 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50006 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49901
Source: unknown Network traffic detected: HTTP traffic on port 49771 -> 443
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49771 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49807 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49835 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49865 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49901 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49932 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49961 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49997 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:49999 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50000 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50002 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50003 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50004 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50005 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50006 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50007 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50008 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50009 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50010 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50011 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50012 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50013 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50014 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50015 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50016 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50017 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50018 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50019 version: TLS 1.2
Source: unknown HTTPS traffic detected: 89.221.225.227:443 -> 192.168.2.5:50020 version: TLS 1.2
Source: classification engine Classification label: clean3.winEXE@7/28@1/1
Source: C:\Program Files\Internet Explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5892:120:WilError_03
Source: C:\Program Files\Internet Explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF4C4ABBEFBEE1C868.TMP Jump to behavior
Source: U6ghPv3E7k.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Program Files\Internet Explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\U6ghPv3E7k.exe "C:\Users\user\Desktop\U6ghPv3E7k.exe"
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Program Files\Internet Explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5532 CREDAT:17410 /prefetch:2
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe "C:\PROGRA~2\Java\jre-1.8\bin\ssvagent.exe" -new
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5532 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe "C:\PROGRA~2\Java\jre-1.8\bin\ssvagent.exe" -new Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Section loaded: ieproxy.dll Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: version.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: msvcp140.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: U6ghPv3E7k.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: U6ghPv3E7k.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: U6ghPv3E7k.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: U6ghPv3E7k.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: U6ghPv3E7k.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: U6ghPv3E7k.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: U6ghPv3E7k.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: U6ghPv3E7k.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: U6ghPv3E7k.exe Static PE information: section name: .msvcjmc
Source: U6ghPv3E7k.exe Static PE information: section name: _RDATA
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe TID: 3140 Thread sleep time: -120000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\U6ghPv3E7k.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs