Windows Analysis Report
EKSTRE_1022.exe

Overview

General Information

Sample name: EKSTRE_1022.exe
Analysis ID: 1559971
MD5: 3503285c5dcb5ddf134d7617366cf050
SHA1: 277773b0e3c13989a52ca37963f7e342fa1a0be8
SHA256: 077dc59cc8a2b17c1c2f17f0620368fe3b252c881cdb600aee54662d2699351c
Tags: exeuser-lowmal3
Infos:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
OS version to string mapping found (often used in BOTs)
One or more processes crash
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Agent Tesla, AgentTesla A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla

AV Detection

barindex
Source: 5.2.pteropod.exe.1030000.1.raw.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "zqamcx.com", "Username": "sender@zqamcx.com", "Password": "Methodman991"}
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe ReversingLabs: Detection: 34%
Source: EKSTRE_1022.exe ReversingLabs: Detection: 34%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Joe Sandbox ML: detected
Source: EKSTRE_1022.exe Joe Sandbox ML: detected
Source: EKSTRE_1022.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: wntdll.pdbUGP source: pteropod.exe, 00000002.00000003.2082031247.0000000004170000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000002.00000003.2083926282.0000000004360000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223531243.00000000038E0000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223231909.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: pteropod.exe, 00000002.00000003.2082031247.0000000004170000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000002.00000003.2083926282.0000000004360000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223531243.00000000038E0000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223231909.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A6CA9 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_002A6CA9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 0_2_002A60DD
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 0_2_002A63F9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_002AEB60
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AF56F FindFirstFileW,FindClose, 0_2_002AF56F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_002AF5FA
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_002B1B2F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_002B1C8A
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_002B1F94
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB6CA9 GetFileAttributesW,FindFirstFileW,FindClose, 2_2_00AB6CA9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 2_2_00AB60DD
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 2_2_00AB63F9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 2_2_00ABEB60
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 2_2_00ABF5FA
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABF56F FindFirstFileW,FindClose, 2_2_00ABF56F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00AC1B2F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00AC1C8A
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 2_2_00AC1F94
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ Jump to behavior
Source: global traffic TCP traffic: 192.168.2.5:49704 -> 78.110.166.82:587
Source: Joe Sandbox View IP Address: 78.110.166.82 78.110.166.82
Source: global traffic TCP traffic: 192.168.2.5:49704 -> 78.110.166.82:587
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B4EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile, 0_2_002B4EB5
Source: global traffic DNS traffic detected: DNS query: zqamcx.com
Source: RegSvcs.exe, 00000003.00000002.4511121854.00000000064D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://r11.i.lenc
Source: RegSvcs.exe, 00000003.00000002.4508762505.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4508762505.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4511121854.00000000064D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://r11.i.lencr.org/0#
Source: RegSvcs.exe, 00000003.00000002.4508762505.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4508762505.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4511121854.00000000064D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://r11.o.lencr.org0#
Source: RegSvcs.exe, 00000003.00000002.4508762505.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4508762505.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4511121854.00000000064D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://x1.c.lencr.org/0
Source: RegSvcs.exe, 00000003.00000002.4508762505.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4508762505.0000000003208000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4511121854.00000000064D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://x1.i.lencr.org/0
Source: RegSvcs.exe, 00000003.00000002.4508762505.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4508762505.0000000003208000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://zqamcx.com
Source: pteropod.exe, 00000002.00000002.2085926396.0000000004130000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4507142862.0000000000402000.00000040.80000000.00040000.00000000.sdmp, pteropod.exe, 00000005.00000002.2225418640.0000000001030000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://account.dyn.com/

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, O9KGcRw9bkp.cs .Net Code: KAZ
Source: 5.2.pteropod.exe.1030000.1.raw.unpack, O9KGcRw9bkp.cs .Net Code: KAZ
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Windows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_002B6B0C
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_002B6D07
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 2_2_00AC6D07
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_002B6B0C
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, 0_2_002A2B37
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002CF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_002CF7FF
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ADF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 2_2_00ADF7FF

System Summary

barindex
Source: 5.2.pteropod.exe.1030000.1.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 5.2.pteropod.exe.1030000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 2.2.pteropod.exe.4130000.1.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 00000002.00000002.2085926396.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 00000005.00000002.2225418640.0000000001030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: This is a third-party compiled AutoIt script. 0_2_00263D19
Source: EKSTRE_1022.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: EKSTRE_1022.exe, 00000000.00000002.2063315668.000000000030E000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_a6a92aac-2
Source: EKSTRE_1022.exe, 00000000.00000002.2063315668.000000000030E000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: )SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_2330edc1-9
Source: EKSTRE_1022.exe, 00000000.00000003.2062201560.0000000003A7D000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_712420f4-1
Source: EKSTRE_1022.exe, 00000000.00000003.2062201560.0000000003A7D000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_13915c03-7
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: This is a third-party compiled AutoIt script. 2_2_00A73D19
Source: pteropod.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: pteropod.exe, 00000002.00000002.2084777705.0000000000B1E000.00000002.00000001.01000000.00000004.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_633a2f05-c
Source: pteropod.exe, 00000002.00000002.2084777705.0000000000B1E000.00000002.00000001.01000000.00000004.sdmp String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_28499bdd-a
Source: pteropod.exe, 00000005.00000000.2198511784.0000000000B1E000.00000002.00000001.01000000.00000004.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_3f5ca10e-1
Source: pteropod.exe, 00000005.00000000.2198511784.0000000000B1E000.00000002.00000001.01000000.00000004.sdmp String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_3a26fbca-8
Source: EKSTRE_1022.exe String found in binary or memory: This is a third-party compiled AutoIt script. memstr_6b161366-0
Source: EKSTRE_1022.exe String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_58722d25-f
Source: pteropod.exe.0.dr String found in binary or memory: This is a third-party compiled AutoIt script. memstr_dae2da6e-0
Source: pteropod.exe.0.dr String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_e655a4dc-6
Source: C:\Windows\System32\wscript.exe COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A6606: CreateFileW,DeviceIoControl,CloseHandle, 0_2_002A6606
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_0029ACC5
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 0_2_002A79D3
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 2_2_00AB79D3
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0028B043 0_2_0028B043
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00273200 0_2_00273200
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00273B70 0_2_00273B70
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029410F 0_2_0029410F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002802A4 0_2_002802A4
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0026E3B0 0_2_0026E3B0
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029038E 0_2_0029038E
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029467F 0_2_0029467F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002806D9 0_2_002806D9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002CAACE 0_2_002CAACE
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00294BEF 0_2_00294BEF
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0028CCC1 0_2_0028CCC1
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00266F07 0_2_00266F07
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0026AF50 0_2_0026AF50
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027B11F 0_2_0027B11F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002C31BC 0_2_002C31BC
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0028D1B9 0_2_0028D1B9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0028123A 0_2_0028123A
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029724D 0_2_0029724D
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002693F0 0_2_002693F0
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A13CA 0_2_002A13CA
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027F563 0_2_0027F563
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AB6CC 0_2_002AB6CC
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002696C0 0_2_002696C0
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002677B0 0_2_002677B0
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002CF7FF 0_2_002CF7FF
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002979C9 0_2_002979C9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027FA57 0_2_0027FA57
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00269B60 0_2_00269B60
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00267D19 0_2_00267D19
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027FE6F 0_2_0027FE6F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00289ED0 0_2_00289ED0
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00267FA3 0_2_00267FA3
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_01351148 0_2_01351148
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A9B043 2_2_00A9B043
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A83200 2_2_00A83200
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A83B70 2_2_00A83B70
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AA410F 2_2_00AA410F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A902A4 2_2_00A902A4
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A7E3B0 2_2_00A7E3B0
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AA038E 2_2_00AA038E
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A906D9 2_2_00A906D9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AA467F 2_2_00AA467F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ADAACE 2_2_00ADAACE
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AA4BEF 2_2_00AA4BEF
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A9CCC1 2_2_00A9CCC1
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A76F07 2_2_00A76F07
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A7AF50 2_2_00A7AF50
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A9D1B9 2_2_00A9D1B9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AD31BC 2_2_00AD31BC
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A8B11F 2_2_00A8B11F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A9123A 2_2_00A9123A
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AA724D 2_2_00AA724D
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A793F0 2_2_00A793F0
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB13CA 2_2_00AB13CA
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A8F563 2_2_00A8F563
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABB6CC 2_2_00ABB6CC
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A796C0 2_2_00A796C0
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A777B0 2_2_00A777B0
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ADF7FF 2_2_00ADF7FF
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AA79C9 2_2_00AA79C9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A8FA57 2_2_00A8FA57
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A79B60 2_2_00A79B60
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A77D19 2_2_00A77D19
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A99ED0 2_2_00A99ED0
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A8FE6F 2_2_00A8FE6F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A77FA3 2_2_00A77FA3
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_01A544F0 2_2_01A544F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_013641B8 3_2_013641B8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_01369B40 3_2_01369B40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_01364A88 3_2_01364A88
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_0136CDC0 3_2_0136CDC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_01363E70 3_2_01363E70
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_0136F4B9 3_2_0136F4B9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 5_2_0132D2B8 5_2_0132D2B8
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: String function: 00A8EC2F appears 68 times
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: String function: 00A9F8A0 appears 35 times
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: String function: 00A96AC0 appears 42 times
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: String function: 0028F8A0 appears 35 times
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: String function: 00286AC0 appears 42 times
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: String function: 0027EC2F appears 68 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 12
Source: EKSTRE_1022.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: 5.2.pteropod.exe.1030000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 5.2.pteropod.exe.1030000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 2.2.pteropod.exe.4130000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 00000002.00000002.2085926396.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 00000005.00000002.2225418640.0000000001030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, CMa60k.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, CMa60k.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, CMa60k.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, CMa60k.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, EgTglEucnUn.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, EgTglEucnUn.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, MmVR.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 2.2.pteropod.exe.4130000.1.raw.unpack, MmVR.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engine Classification label: mal100.troj.spyw.expl.evad.winEXE@11/10@1/1
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002ACE7A GetLastError,FormatMessageW, 0_2_002ACE7A
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029AB84 AdjustTokenPrivileges,CloseHandle, 0_2_0029AB84
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 0_2_0029B134
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AAAB84 AdjustTokenPrivileges,CloseHandle, 2_2_00AAAB84
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AAB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 2_2_00AAB134
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode, 0_2_002AE1FD
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle, 0_2_002A6532
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002BC18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket, 0_2_002BC18C
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0026406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource, 0_2_0026406B
Source: C:\Users\user\Desktop\EKSTRE_1022.exe File created: C:\Users\user\AppData\Local\ageless Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Mutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess736
Source: C:\Users\user\Desktop\EKSTRE_1022.exe File created: C:\Users\user\AppData\Local\Temp\aut4C87.tmp Jump to behavior
Source: unknown Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs"
Source: EKSTRE_1022.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: EKSTRE_1022.exe ReversingLabs: Detection: 34%
Source: C:\Users\user\Desktop\EKSTRE_1022.exe File read: C:\Users\user\Desktop\EKSTRE_1022.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\EKSTRE_1022.exe "C:\Users\user\Desktop\EKSTRE_1022.exe"
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Process created: C:\Users\user\AppData\Local\ageless\pteropod.exe "C:\Users\user\Desktop\EKSTRE_1022.exe"
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EKSTRE_1022.exe"
Source: unknown Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs"
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\ageless\pteropod.exe "C:\Users\user\AppData\Local\ageless\pteropod.exe"
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\ageless\pteropod.exe"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 12
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Process created: C:\Users\user\AppData\Local\ageless\pteropod.exe "C:\Users\user\Desktop\EKSTRE_1022.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EKSTRE_1022.exe" Jump to behavior
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\ageless\pteropod.exe "C:\Users\user\AppData\Local\ageless\pteropod.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\ageless\pteropod.exe" Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: vbscript.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\Profiles Jump to behavior
Source: EKSTRE_1022.exe Static file information: File size 1255936 > 1048576
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EKSTRE_1022.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wntdll.pdbUGP source: pteropod.exe, 00000002.00000003.2082031247.0000000004170000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000002.00000003.2083926282.0000000004360000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223531243.00000000038E0000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223231909.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: pteropod.exe, 00000002.00000003.2082031247.0000000004170000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000002.00000003.2083926282.0000000004360000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223531243.00000000038E0000.00000004.00001000.00020000.00000000.sdmp, pteropod.exe, 00000005.00000003.2223231909.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
Source: EKSTRE_1022.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EKSTRE_1022.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EKSTRE_1022.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EKSTRE_1022.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EKSTRE_1022.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027E01E LoadLibraryA,GetProcAddress, 0_2_0027E01E
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00286B05 push ecx; ret 0_2_00286B18
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A96B05 push ecx; ret 2_2_00A96B18
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_01A54897 push edi; ret 2_2_01A54898
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 5_2_0132D65F push edi; ret 5_2_0132D660
Source: C:\Users\user\Desktop\EKSTRE_1022.exe File created: C:\Users\user\AppData\Local\ageless\pteropod.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs Jump to dropped file
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002C8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_002C8111
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_0027EB42
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AD8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 2_2_00AD8111
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A8EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 2_2_00A8EB42
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0028123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_0028123A
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe API/Special instruction interceptor: Address: 1A54114
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe API/Special instruction interceptor: Address: 132CEDC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Window / User API: threadDelayed 2544 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Window / User API: threadDelayed 7276 Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Evaded block: after key decision
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Evaded block: after key decision
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\EKSTRE_1022.exe API coverage: 4.5 %
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe API coverage: 4.7 %
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A6CA9 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_002A6CA9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 0_2_002A60DD
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 0_2_002A63F9
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_002AEB60
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AF56F FindFirstFileW,FindClose, 0_2_002AF56F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002AF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_002AF5FA
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_002B1B2F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_002B1C8A
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_002B1F94
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB6CA9 GetFileAttributesW,FindFirstFileW,FindClose, 2_2_00AB6CA9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 2_2_00AB60DD
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 2_2_00AB63F9
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 2_2_00ABEB60
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 2_2_00ABF5FA
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00ABF56F FindFirstFileW,FindClose, 2_2_00ABF56F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00AC1B2F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00AC1C8A
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 2_2_00AC1F94
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0027DDC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99891 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99674 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99516 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99398 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99297 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99187 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 99078 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98969 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98860 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98735 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98610 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98485 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98360 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98235 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 98110 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97985 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97860 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97735 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97610 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97485 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97360 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97235 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 97110 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96964 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96721 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96594 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96485 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96369 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96264 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96157 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 96032 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95907 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95782 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95657 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95532 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95398 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95297 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95188 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 95063 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94938 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94813 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94688 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94579 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94454 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94330 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 94105 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 93988 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 93875 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 93766 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 93657 Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ Jump to behavior
Source: RegSvcs.exe, 00000003.00000002.4511121854.00000000064D0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\EKSTRE_1022.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\EKSTRE_1022.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe API call chain: ExitProcess graph end node
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B6AAF BlockInput, 0_2_002B6AAF
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00263D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00263D19
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00293920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW, 0_2_00293920
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027E01E LoadLibraryA,GetProcAddress, 0_2_0027E01E
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_01351038 mov eax, dword ptr fs:[00000030h] 0_2_01351038
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0134F9A8 mov eax, dword ptr fs:[00000030h] 0_2_0134F9A8
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_01350FD8 mov eax, dword ptr fs:[00000030h] 0_2_01350FD8
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_01A54380 mov eax, dword ptr fs:[00000030h] 2_2_01A54380
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_01A543E0 mov eax, dword ptr fs:[00000030h] 2_2_01A543E0
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_01A52D50 mov eax, dword ptr fs:[00000030h] 2_2_01A52D50
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 5_2_0132D1A8 mov eax, dword ptr fs:[00000030h] 5_2_0132D1A8
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 5_2_0132BB18 mov eax, dword ptr fs:[00000030h] 5_2_0132BB18
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 5_2_0132D148 mov eax, dword ptr fs:[00000030h] 5_2_0132D148
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_0029A66C
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002881AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_002881AC
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00288189 SetUnhandledExceptionFilter, 0_2_00288189
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A981AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_00A981AC
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00A98189 SetUnhandledExceptionFilter, 2_2_00A98189
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Section unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base address: 430000 Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F08008 Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7FB008 Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029B106 LogonUserW, 0_2_0029B106
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00263D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00263D19
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A411C SendInput,keybd_event, 0_2_002A411C
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A74BB mouse_event, 0_2_002A74BB
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EKSTRE_1022.exe" Jump to behavior
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\ageless\pteropod.exe "C:\Users\user\AppData\Local\ageless\pteropod.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\ageless\pteropod.exe" Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0029A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_0029A66C
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002A71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_002A71FA
Source: EKSTRE_1022.exe, pteropod.exe Binary or memory string: Shell_TrayWnd
Source: EKSTRE_1022.exe, pteropod.exe.0.dr Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002865C4 cpuid 0_2_002865C4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW, 0_2_002B091D
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002DB340 GetUserNameW, 0_2_002DB340
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_00291E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 0_2_00291E8E
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_0027DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0027DDC0
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 5.2.pteropod.exe.1030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.pteropod.exe.1030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.pteropod.exe.4130000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.pteropod.exe.4130000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.2085926396.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2225418640.0000000001030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.000000000322A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4507142862.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.0000000003200000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.00000000031B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: pteropod.exe PID: 5524, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 2748, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: pteropod.exe PID: 320, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\FTP Navigator\Ftplist.txt Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: pteropod.exe Binary or memory string: WIN_81
Source: pteropod.exe Binary or memory string: WIN_XP
Source: pteropod.exe.0.dr Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
Source: pteropod.exe Binary or memory string: WIN_XPe
Source: pteropod.exe Binary or memory string: WIN_VISTA
Source: pteropod.exe Binary or memory string: WIN_7
Source: pteropod.exe Binary or memory string: WIN_8
Source: Yara match File source: 5.2.pteropod.exe.1030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.pteropod.exe.1030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.pteropod.exe.4130000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.pteropod.exe.4130000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.2085926396.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2225418640.0000000001030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4507142862.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.00000000031B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: pteropod.exe PID: 5524, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 2748, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: pteropod.exe PID: 320, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 5.2.pteropod.exe.1030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.pteropod.exe.1030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.pteropod.exe.4130000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.pteropod.exe.4130000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.2085926396.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2225418640.0000000001030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.000000000322A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4507142862.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.0000000003200000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4508762505.00000000031B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: pteropod.exe PID: 5524, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 2748, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: pteropod.exe PID: 320, type: MEMORYSTR
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 0_2_002B8C4F
Source: C:\Users\user\Desktop\EKSTRE_1022.exe Code function: 0_2_002B923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_002B923B
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 2_2_00AC8C4F
Source: C:\Users\user\AppData\Local\ageless\pteropod.exe Code function: 2_2_00AC923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 2_2_00AC923B
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs