Click to jump to signature section
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | ReversingLabs: Detection: 63% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Joe Sandbox ML: detected |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: -----BEGIN PUBLIC KEY----- | memstr_818a0c3b-1 |
Source: unknown | HTTPS traffic detected: 104.21.1.82:443 -> 192.168.2.7:49701 version: TLS 1.2 |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp |
Source: Joe Sandbox View | JA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad |
Source: Network traffic | Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.7:49728 |
Source: Network traffic | Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.7:49893 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: api.tzproject.com |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://.css |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://.jpg |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLThis |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julieta |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1262008824.000000000061F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.tzproject.com/api/tzx/security/seed_tzx_v3 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1262008824.000000000061F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.tzproject.com/api/tzx/security/seed_tzx_v3qr0U. |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://fontawesome.com |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/JulietaUla/Montserrat) |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/itfoundry/Poppins)&&&&r |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/itfoundry/Poppins)&&&&s |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/itfoundry/Poppins)&&&&v |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://scripts.sil.org/OFLThis |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad |
Source: unknown | Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: unknown | HTTPS traffic detected: 104.21.1.82:443 -> 192.168.2.7:49701 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1293554086.0000000140E39000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenametaskhostw.exe< vs SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Binary or memory string: OriginalFilenametaskhostw.exe< vs SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe |
Source: classification engine | Classification label: mal80.evad.winEXE@1/0@1/2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | ReversingLabs: Detection: 63% |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static file information: File size 6927872 > 1048576 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static PE information: Raw size of .sv1 is bigger than: 0x100000 < 0x69ac00 |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp |
Source: initial sample | Static PE information: section where entry point is pointing to: .sv1 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static PE information: section name: _RDATA |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static PE information: section name: .sv0 |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Static PE information: section name: .sv1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Memory written: PID: 1796 base: 7FFB2D030008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Memory written: PID: 1796 base: 7FFB2CECD9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Memory written: PID: 1796 base: 7FFB2D04000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Memory written: PID: 1796 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | RDTSC instruction interceptor: First address: 140D44609 second address: 140CCFD9E instructions: 0x00000000 rdtsc 0x00000002 pop ebp 0x00000003 dec eax 0x00000004 cwde 0x00000005 pop ecx 0x00000006 inc sp 0x00000008 btr edx, eax 0x0000000b inc ecx 0x0000000c movsx ebx, sp 0x0000000f inc ecx 0x00000010 pop esp 0x00000011 test bx, 1174h 0x00000016 or ebx, 4A6113B3h 0x0000001c popfd 0x0000001d jmp 00007FB5F4B42025h 0x00000022 pop edi 0x00000023 dec eax 0x00000024 not esi 0x00000026 pop edx 0x00000027 cwde 0x00000028 pop esi 0x00000029 dec eax 0x0000002a cwde 0x0000002b dec ebp 0x0000002c movsx ecx, ax 0x0000002f inc esp 0x00000030 movzx ecx, si 0x00000033 pop ebx 0x00000034 inc ecx 0x00000035 pop edx 0x00000036 inc esp 0x00000037 movzx ecx, cx 0x0000003a dec ebp 0x0000003b cmovns ecx, ecx 0x0000003e inc ecx 0x0000003f pop esi 0x00000040 mov al, B5h 0x00000042 inc bp 0x00000044 movzx ecx, ch 0x00000047 cbw 0x00000049 pop eax 0x0000004a inc sp 0x0000004c movsx ecx, dh 0x0000004f inc cx 0x00000051 bswap ecx 0x00000053 inc sp 0x00000055 movzx ecx, dl 0x00000058 inc ecx 0x00000059 pop ecx 0x0000005a jmp 00007FB5F4B72FDFh 0x0000005f ret 0x00000060 popfd 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | RDTSC instruction interceptor: First address: 1406EC327 second address: 1406EC331 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edx 0x00000004 dec eax 0x00000005 movsx esi, cx 0x00000008 inc ecx 0x00000009 pop esp 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Special instruction interceptor: First address: 140CCFD9E instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1290817859.0000000000603000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1291417050.0000000000603000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | System information queried: ModuleInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Handle closed: DEADC0DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe | NtProtectVirtualMemory: Indirect: 0x140794474 | Jump to behavior |