Click to jump to signature section
Source: 00000000.00000003.1857422783.0000023C9BB1C000.00000020.00000001.00020000.00000000.sdmp | Malware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 18500, "MaxGetSize": 2140839, "Jitter": 35, "C2Server": "163.5.169.26,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wermgr.exe", "Spawnto_x64": "%windir%\\sysnative\\wermgr.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 12345, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 24576, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""} |
Source: 7RDTQuL8WF.exe | ReversingLabs: Detection: 57% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.7% probability |
Source: 7RDTQuL8WF.exe | Static PE information: certificate valid |
Source: 7RDTQuL8WF.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor | URLs: 163.5.169.26 |
Source: Joe Sandbox View | ASN Name: EPITECHFR EPITECHFR |
Source: Network traffic | Suricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49738 -> 163.5.169.26:443 |
Source: Network traffic | Suricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49851 -> 163.5.169.26:443 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 163.5.169.26 |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0Q |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0 |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0 |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0 |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://ocsps.ssl.com0 |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://ocsps.ssl.com0? |
Source: 7RDTQuL8WF.exe | String found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0 |
Source: 7RDTQuL8WF.exe, 00000000.00000003.2741530343.0000023C9BA3F000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA57000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA2A000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9B9CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/ |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9B9CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/H |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA2A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/b |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA08000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA57000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA1E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/broadcast |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/broadcastCB |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA57000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/broadcastl |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA1E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/broadcastoT |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA1E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/broadcastpT |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://163.5.169.26/broadcastse |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com |
Source: 7RDTQuL8WF.exe, 00000000.00000003.2741530343.0000023C9BA2A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.comp |
Source: 7RDTQuL8WF.exe | String found in binary or memory: https://www.ssl.com/repository0 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49741 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49851 |
Source: unknown | Network traffic detected: HTTP traffic on port 49741 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49851 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49823 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49823 |
Source: unknown | Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC50460 NtClose,NtUnmapViewOfSection,NtOpenSection,NtMapViewOfSection, | 0_2_00007FF72BC50460 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5AF10 NtProtectVirtualMemory,NtProtectVirtualMemory, | 0_2_00007FF72BC5AF10 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC65700 NtReadFile, | 0_2_00007FF72BC65700 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC64300 NtWriteFile, | 0_2_00007FF72BC64300 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC69A00 NtCreateFile, | 0_2_00007FF72BC69A00 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2A1C0 VirtualAlloc,VirtualProtect,LdrLoadDll,NtCreateThreadEx,NtClose, | 0_2_00007FF72BC2A1C0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5F240 NtAllocateVirtualMemory,NtProtectVirtualMemory,NtCreateThreadEx, | 0_2_00007FF72BC5F240 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC26BF0 | 0_2_00007FF72BC26BF0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC68A70 | 0_2_00007FF72BC68A70 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC28660 | 0_2_00007FF72BC28660 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC50460 | 0_2_00007FF72BC50460 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC29690 | 0_2_00007FF72BC29690 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5AF10 | 0_2_00007FF72BC5AF10 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5A290 | 0_2_00007FF72BC5A290 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC29500 | 0_2_00007FF72BC29500 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC65700 | 0_2_00007FF72BC65700 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC64300 | 0_2_00007FF72BC64300 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC69A00 | 0_2_00007FF72BC69A00 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC60520 | 0_2_00007FF72BC60520 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2A1C0 | 0_2_00007FF72BC2A1C0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5F240 | 0_2_00007FF72BC5F240 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5DD40 | 0_2_00007FF72BC5DD40 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC24D70 | 0_2_00007FF72BC24D70 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC237F0 | 0_2_00007FF72BC237F0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC40AF0 | 0_2_00007FF72BC40AF0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC3D1F0 | 0_2_00007FF72BC3D1F0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC60C70 | 0_2_00007FF72BC60C70 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC25060 | 0_2_00007FF72BC25060 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC4AB60 | 0_2_00007FF72BC4AB60 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC55260 | 0_2_00007FF72BC55260 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC6A960 | 0_2_00007FF72BC6A960 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC21190 | 0_2_00007FF72BC21190 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC34610 | 0_2_00007FF72BC34610 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5A410 | 0_2_00007FF72BC5A410 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC6E178 | 0_2_00007FF72BC6E178 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC21300 | 0_2_00007FF72BC21300 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC21000 | 0_2_00007FF72BC21000 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC25DB0 | 0_2_00007FF72BC25DB0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC377B0 | 0_2_00007FF72BC377B0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5F0B0 | 0_2_00007FF72BC5F0B0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC463A0 | 0_2_00007FF72BC463A0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2EF20 | 0_2_00007FF72BC2EF20 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5C820 | 0_2_00007FF72BC5C820 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC214D0 | 0_2_00007FF72BC214D0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC24ED0 | 0_2_00007FF72BC24ED0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC381D0 | 0_2_00007FF72BC381D0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2C550 | 0_2_00007FF72BC2C550 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC5DF50 | 0_2_00007FF72BC5DF50 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC66AD0 | 0_2_00007FF72BC66AD0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2E440 | 0_2_00007FF72BC2E440 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2C3C0 | 0_2_00007FF72BC2C3C0 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC36640 | 0_2_00007FF72BC36640 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC32240 | 0_2_00007FF72BC32240 |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC484C0 | 0_2_00007FF72BC484C0 |
Source: 7RDTQuL8WF.exe | Static PE information: No import functions for PE file found |
Source: 7RDTQuL8WF.exe | Binary or memory string: OriginalFilename vs 7RDTQuL8WF.exe |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3068437483.00007FF72BD03000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameiisexpress.exe\ vs 7RDTQuL8WF.exe |
Source: 7RDTQuL8WF.exe | Binary or memory string: OriginalFilenameiisexpress.exe\ vs 7RDTQuL8WF.exe |
Source: classification engine | Classification label: mal92.troj.evad.winEXE@1/1@0/1 |
Source: 7RDTQuL8WF.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: 7RDTQuL8WF.exe | ReversingLabs: Detection: 57% |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 | Jump to behavior |
Source: 7RDTQuL8WF.exe | Static PE information: certificate valid |
Source: 7RDTQuL8WF.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: 7RDTQuL8WF.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: 7RDTQuL8WF.exe | Static PE information: real checksum: 0x1012fe should be: 0xfbf95 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9BA48000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000002.3067894286.0000023C9B9CB000.00000004.00000020.00020000.00000000.sdmp, 7RDTQuL8WF.exe, 00000000.00000003.2741530343.0000023C9BA48000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Code function: 0_2_00007FF72BC2A1C0 VirtualAlloc,VirtualProtect,LdrLoadDll,NtCreateThreadEx,NtClose, | 0_2_00007FF72BC2A1C0 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x7FF72BC2B54D | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x7FF72BC60A32 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x23C9BB9F67D | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtClose: Direct from: 0x23C9BBA01D0 | |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtDelayExecution: Direct from: 0x7FF72BC27C52 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x7FF72BC5B18B | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BB9F716 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtQuerySystemInformation: Direct from: 0x23C9BADCD31 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x7FF72BC2B634 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x7FF72BC60AC4 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x7FF72BC5FCAF | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtClose: Direct from: 0x7FF72BC52A33 | |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x7FF72BC5BEAF | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtDelayExecution: Direct from: 0x7FF72BC29BB8 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtCreateFile: Direct from: 0x7FF72BC6A38D | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtQueryInformationToken: Direct from: 0x23C9BB9FA82 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtQuerySystemInformation: Direct from: 0x23C9BBA020B | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BADD169 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtQueryInformationToken: Direct from: 0x23C9BBA7DB0 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BBA00E6 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtSetSecurityObject: Direct from: 0x7FFE221C26A1 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BADD0DC | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BB911BE | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtCreateThreadEx: Direct from: 0x7FF72BC2BCF5 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x23C9BBC94C3 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtCreateThreadEx: Direct from: 0x7FF72BC603A7 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtWriteFile: Direct from: 0x7FF72BC64B46 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x7FF72BC2B680 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtClose: Direct from: 0x7FF72BC2BD18 | |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BB9FB61 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x7FF72BC6032D | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtReadFile: Direct from: 0x7FF72BC65F79 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x23C9BADCBBB | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtUnmapViewOfSection: Direct from: 0x7FF72BC536B7 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtDeviceIoControlFile: Direct from: 0x23C9BBA0141 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtProtectVirtualMemory: Direct from: 0x23C9BADD1B2 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | NtAllocateVirtualMemory: Direct from: 0x7FF72BC5CF17 | Jump to behavior |
Source: C:\Users\user\Desktop\7RDTQuL8WF.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: Yara match | File source: 0.3.7RDTQuL8WF.exe.23c9bac0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3068161539.0000023C9BBDC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1857422783.0000023C9BADD000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 7RDTQuL8WF.exe PID: 6832, type: MEMORYSTR |