Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: 1Zp7qa5zFD.exe, 00000000.00000002.1690017269.0000000006420000.00000004.08000000.00040000.00000000.sdmp, Svchoste.exe, 00000003.00000002.1829974369.0000000004396000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: 1Zp7qa5zFD.exe, 00000000.00000002.1690017269.0000000006420000.00000004.08000000.00040000.00000000.sdmp, Svchoste.exe, 00000003.00000002.1829974369.0000000004396000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 4x nop then jmp 063DA005h | 0_2_063D9C30 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 4x nop then jmp 063DA005h | 0_2_063D9C40 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 4x nop then jmp 063FB9A8h | 0_2_063FB8F0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 4x nop then jmp 063FB9A8h | 0_2_063FB8E8 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_064EDAF0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then jmp 067BA005h | 3_2_067B9C40 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then jmp 067BA005h | 3_2_067B9C30 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 3_2_067CDAF0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 3_2_067D41F0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 3_2_067D41EF |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then jmp 067EFD30h | 3_2_067EFC78 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 4x nop then jmp 067EFD30h | 3_2_067EFC73 |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: Svchoste.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: 1Zp7qa5zFD.exe, 00000001.00000002.4126443245.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: 77EC63BDA74BD0D0E0426DC8F80085060.1.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: 1Zp7qa5zFD.exe, 00000001.00000002.4126443245.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab= |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1674212388.0000000003120000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000001.00000002.4128879410.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, Svchoste.exe, 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp, Svchoste.exe, 00000003.00000002.1829974369.0000000004375000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: 1Zp7qa5zFD.exe, Svchoste.exe.0.dr | String found in binary or memory: https://notepad-plus-plus.org/0 |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1674212388.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp, Svchoste.exe, 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: Yara match | File source: 0.2.1Zp7qa5zFD.exe.3180700.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.Svchoste.exe.327d570.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.Svchoste.exe.327d570.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.Svchoste.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.1Zp7qa5zFD.exe.3180700.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.1860002257.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1819518660.000000000350B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.4126443245.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1674212388.0000000003168000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.4128879410.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 1Zp7qa5zFD.exe PID: 7312, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: 1Zp7qa5zFD.exe PID: 7360, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: Svchoste.exe PID: 7628, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: Svchoste.exe PID: 7680, type: MEMORYSTR |
Source: dump.pcap, type: PCAP | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 3.2.Svchoste.exe.327d570.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 3.2.Svchoste.exe.327d570.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 3.2.Svchoste.exe.327d570.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 3.2.Svchoste.exe.327d570.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 4.2.Svchoste.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 4.2.Svchoste.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000004.00000002.1860002257.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000003.00000002.1819518660.000000000350B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000003.00000002.1819518660.000000000350B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000001.00000002.4126443245.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000001.00000002.4134429076.0000000005468000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000002.1674212388.0000000003168000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000000.00000002.1674212388.0000000003168000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000004.00000002.1870499763.00000000051B8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000001.00000002.4128879410.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000004.00000002.1861983240.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: Process Memory Space: 1Zp7qa5zFD.exe PID: 7312, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: 1Zp7qa5zFD.exe PID: 7360, type: MEMORYSTR | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: Process Memory Space: Svchoste.exe PID: 7628, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: Svchoste.exe PID: 7680, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: Svchoste.exe PID: 7680, type: MEMORYSTR | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FE790 NtResumeThread, | 0_2_063FE790 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FD310 NtProtectVirtualMemory, | 0_2_063FD310 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FE788 NtResumeThread, | 0_2_063FE788 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FD30A NtProtectVirtualMemory, | 0_2_063FD30A |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067D0F70 NtProtectVirtualMemory, | 3_2_067D0F70 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067D23F0 NtResumeThread, | 3_2_067D23F0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067D0F6B NtProtectVirtualMemory, | 3_2_067D0F6B |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067D23EB NtResumeThread, | 3_2_067D23EB |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_0121D1E0 | 0_2_0121D1E0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_0121BEB0 | 0_2_0121BEB0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_012185F8 | 0_2_012185F8 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_01218608 | 0_2_01218608 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_01217C9D | 0_2_01217C9D |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_01217FB0 | 0_2_01217FB0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_01217FC0 | 0_2_01217FC0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063D6C50 | 0_2_063D6C50 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063DB4F0 | 0_2_063DB4F0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063DB4E0 | 0_2_063DB4E0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063F6A80 | 0_2_063F6A80 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FAB20 | 0_2_063FAB20 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063F9BC8 | 0_2_063F9BC8 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FD080 | 0_2_063FD080 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063F38E0 | 0_2_063F38E0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FAB10 | 0_2_063FAB10 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063FD072 | 0_2_063FD072 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_063F38D0 | 0_2_063F38D0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06407F80 | 0_2_06407F80 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_0640C3F0 | 0_2_0640C3F0 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06407F71 | 0_2_06407F71 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_0640C717 | 0_2_0640C717 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06408FC8 | 0_2_06408FC8 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06408FD8 | 0_2_06408FD8 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_0640D5F8 | 0_2_0640D5F8 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06400040 | 0_2_06400040 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06400006 | 0_2_06400006 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_064E0040 | 0_2_064E0040 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_064E0006 | 0_2_064E0006 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_0677DF38 | 0_2_0677DF38 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06760040 | 0_2_06760040 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 0_2_06760007 | 0_2_06760007 |
Source: C:\Users\user\Desktop\1Zp7qa5zFD.exe | Code function: 1_2_07471F68 | 1_2_07471F68 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_0175D1E0 | 3_2_0175D1E0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_0175BEB0 | 3_2_0175BEB0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_017585F8 | 3_2_017585F8 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_01758608 | 3_2_01758608 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_01757FC0 | 3_2_01757FC0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_01757FB0 | 3_2_01757FB0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067B69D0 | 3_2_067B69D0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067BB4F0 | 3_2_067BB4F0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067BB4E0 | 3_2_067BB4E0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067C0040 | 3_2_067C0040 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067C0039 | 3_2_067C0039 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067D0CE0 | 3_2_067D0CE0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067D0CD3 | 3_2_067D0CD3 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067EB408 | 3_2_067EB408 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067EE088 | 3_2_067EE088 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067EEF77 | 3_2_067EEF77 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067EEF88 | 3_2_067EEF88 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067ED3F7 | 3_2_067ED3F7 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067EE078 | 3_2_067EE078 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067F7F80 | 3_2_067F7F80 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067FC3F0 | 3_2_067FC3F0 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067F7F71 | 3_2_067F7F71 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067FC717 | 3_2_067FC717 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067F8FD8 | 3_2_067F8FD8 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067F8FC8 | 3_2_067F8FC8 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067FD5F8 | 3_2_067FD5F8 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067F0040 | 3_2_067F0040 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_067F001F | 3_2_067F001F |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_06A5DF38 | 3_2_06A5DF38 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_06A40007 | 3_2_06A40007 |
Source: C:\Users\user\AppData\Roaming\Svchoste.exe | Code function: 3_2_06A40040 | 3_2_06A40040 |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1688203079.0000000005550000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMpwjylvno.dll" vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003FFF000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1674212388.0000000002E51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1690017269.0000000006420000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1673896100.000000000123E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1687413124.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1674212388.0000000003168000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1689553615.0000000006340000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000000.00000002.1690628356.0000000006821000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameKeirlev.exe4 vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe, 00000001.00000002.4135038513.0000000005689000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameUNKNOWN_FILET vs 1Zp7qa5zFD.exe |
Source: 1Zp7qa5zFD.exe | Binary or memory string: OriginalFilenameKeirlev.exe4 vs 1Zp7qa5zFD.exe |
Source: dump.pcap, type: PCAP | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 3.2.Svchoste.exe.327d570.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 3.2.Svchoste.exe.327d570.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 3.2.Svchoste.exe.327d570.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 3.2.Svchoste.exe.327d570.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 4.2.Svchoste.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 4.2.Svchoste.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.2.1Zp7qa5zFD.exe.3180700.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000004.00000002.1860002257.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000003.00000002.1819518660.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000003.00000002.1819518660.000000000350B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000003.00000002.1819518660.000000000350B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000001.00000002.4126443245.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000001.00000002.4134429076.0000000005468000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000002.1674212388.0000000003168000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000000.00000002.1674212388.0000000003168000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000004.00000002.1870499763.00000000051B8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000001.00000002.4128879410.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000004.00000002.1861983240.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: Process Memory Space: 1Zp7qa5zFD.exe PID: 7312, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: 1Zp7qa5zFD.exe PID: 7360, type: MEMORYSTR | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: Process Memory Space: Svchoste.exe PID: 7628, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: Svchoste.exe PID: 7680, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: Svchoste.exe PID: 7680, type: MEMORYSTR | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.1Zp7qa5zFD.exe.6420000.9.raw.unpack, ITaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask' |
Source: 0.2.1Zp7qa5zFD.exe.6420000.9.raw.unpack, TaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder' |
Source: 0.2.1Zp7qa5zFD.exe.6420000.9.raw.unpack, Task.cs | Task registration methods: 'RegisterChanges', 'CreateTask' |
Source: 0.2.1Zp7qa5zFD.exe.6420000.9.raw.unpack, TaskService.cs | Task registration methods: 'CreateFromToken' |