Click to jump to signature section
Source: Q7I4ToJZ0R.exe | ReversingLabs: Detection: 26% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 96.7% probability |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: Q7I4ToJZ0R.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Q7I4ToJZ0R.exe |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Q7I4ToJZ0R.exe |
Source: Joe Sandbox View | JA3 fingerprint: 72a589da586844d7f0818ce684948eea |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: global traffic | HTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165 |
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332276569.000001E0EF57C000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332107144.000001E0EF57C000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946503827.000001E0EF57C000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331968176.000001E0EF57A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946384270.000001E0EF53B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 |
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946384270.000001E0EF53B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3ssM |
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332135918.000001E0EF55F000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331985413.000001E0EF55F000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946481629.000001E0EF565000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332185947.000001E0EF564000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/oT |
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332045768.000001E0EF580000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331968176.000001E0EF57A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946527073.000001E0EF581000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Code function: 0_2_00007FF6CA1F11C0 | 0_2_00007FF6CA1F11C0 |
Source: classification engine | Classification label: mal52.winEXE@2/0@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5828:120:WilError_03 |
Source: Q7I4ToJZ0R.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: Q7I4ToJZ0R.exe | ReversingLabs: Detection: 26% |
Source: unknown | Process created: C:\Users\user\Desktop\Q7I4ToJZ0R.exe "C:\Users\user\Desktop\Q7I4ToJZ0R.exe" |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: Q7I4ToJZ0R.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: Q7I4ToJZ0R.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Q7I4ToJZ0R.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Q7I4ToJZ0R.exe |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Q7I4ToJZ0R.exe |
Source: Q7I4ToJZ0R.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: Q7I4ToJZ0R.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: Q7I4ToJZ0R.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: Q7I4ToJZ0R.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: Q7I4ToJZ0R.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe TID: 2380 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe TID: 932 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: Q7I4ToJZ0R.exe, 00000000.00000002.2946542654.000001E0EF58B000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332323542.000001E0EF58D000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331894323.000001E0EF58A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Code function: 0_2_00007FF6CA1F2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF6CA1F2098 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Code function: 0_2_00007FF6CA1F1B6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00007FF6CA1F1B6C |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Code function: 0_2_00007FF6CA1F223C SetUnhandledExceptionFilter, | 0_2_00007FF6CA1F223C |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Code function: 0_2_00007FF6CA1F2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF6CA1F2098 |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Code function: 0_2_00007FF6CA1F1F70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_00007FF6CA1F1F70 |
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |