Click to jump to signature section
Source: Ne7qNMCeuy.exe | ReversingLabs: Detection: 26% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 94.7% probability |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.6:49707 version: TLS 1.2 |
Source: Ne7qNMCeuy.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Ne7qNMCeuy.exe |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Ne7qNMCeuy.exe |
Source: Joe Sandbox View | JA3 fingerprint: 72a589da586844d7f0818ce684948eea |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: global traffic | HTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165 |
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749064237.000001692B7CF000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7D4000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749100418.000001692B7D4000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148697121.000001692B7CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/ |
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749199611.000001692B7C5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7C5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748931357.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748999347.000001692B7F9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 |
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749242586.000001692B7FC000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748931357.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748999347.000001692B7F9000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975404596.000001692B7FC000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749013744.000001692B7FB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.6:49707 version: TLS 1.2 |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Code function: 0_2_00007FF7620E11C0 | 0_2_00007FF7620E11C0 |
Source: classification engine | Classification label: mal52.winEXE@2/0@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5396:120:WilError_03 |
Source: Ne7qNMCeuy.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: Ne7qNMCeuy.exe | ReversingLabs: Detection: 26% |
Source: unknown | Process created: C:\Users\user\Desktop\Ne7qNMCeuy.exe "C:\Users\user\Desktop\Ne7qNMCeuy.exe" |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: Ne7qNMCeuy.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: Ne7qNMCeuy.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Ne7qNMCeuy.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Ne7qNMCeuy.exe |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Ne7qNMCeuy.exe |
Source: Ne7qNMCeuy.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: Ne7qNMCeuy.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: Ne7qNMCeuy.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: Ne7qNMCeuy.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: Ne7qNMCeuy.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe TID: 4152 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe TID: 4180 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749199611.000001692B7B8000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7BB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: Ne7qNMCeuy.exe, 00000000.00000002.3975404596.000001692B80D000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B808000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748972438.000001692B808000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749228085.000001692B80A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Code function: 0_2_00007FF7620E2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF7620E2098 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Code function: 0_2_00007FF7620E223C SetUnhandledExceptionFilter, | 0_2_00007FF7620E223C |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Code function: 0_2_00007FF7620E1B6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00007FF7620E1B6C |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Code function: 0_2_00007FF7620E2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF7620E2098 |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Code function: 0_2_00007FF7620E1F70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_00007FF7620E1F70 |
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |