Click to jump to signature section
Source: yoyf.exe | ReversingLabs: Detection: 71% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 94.2% probability |
Source: unknown | HTTPS traffic detected: 91.134.10.127:443 -> 192.168.2.6:49713 version: TLS 1.2 |
Source: yoyf.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-5Ch] | 0_2_00F0A58D |
Source: global traffic | HTTP traffic detected: GET /ByQRHy3/126-Final.webp HTTP/1.1Host: i.ibb.coConnection: Keep-Alive |
Source: Joe Sandbox View | JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /ByQRHy3/126-Final.webp HTTP/1.1Host: i.ibb.coConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: i.ibb.co |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 18 Dec 2024 13:20:34 GMTContent-Type: image/pngContent-Length: 1031Connection: close |
Source: yoyf.exe | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: yoyf.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: yoyf.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: yoyf.exe | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: yoyf.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: yoyf.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: yoyf.exe | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: yoyf.exe, 00000000.00000002.3192146181.0000000002B32000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://i.ibb.co |
Source: yoyf.exe, 00000000.00000002.3192146181.0000000002B32000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://i.ibb.cod |
Source: yoyf.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: yoyf.exe | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: yoyf.exe | String found in binary or memory: http://ocsp.sectigo.com0; |
Source: yoyf.exe, 00000000.00000002.3192146181.0000000002B1A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: yoyf.exe, 00000000.00000002.3192146181.0000000002B1A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://i.ibb.co |
Source: yoyf.exe | String found in binary or memory: https://i.ibb.co/ByQRHy3/126-Final.webp |
Source: yoyf.exe, 00000000.00000002.3192146181.0000000002AB1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://i.ibb.co/ByQRHy3/126-Final.webpT |
Source: yoyf.exe, 00000000.00000002.3192146181.0000000002AB1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://i.ibb.co/ByQRHy3/126-Final.webpt |
Source: yoyf.exe | String found in binary or memory: https://sectigo.com/CPS0 |
Source: unknown | Network traffic detected: HTTP traffic on port 49713 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49713 |
Source: unknown | HTTPS traffic detected: 91.134.10.127:443 -> 192.168.2.6:49713 version: TLS 1.2 |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F058F0 | 0_2_00F058F0 |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F09AB8 | 0_2_00F09AB8 |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F02B63 | 0_2_00F02B63 |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F00C50 | 0_2_00F00C50 |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F04C40 | 0_2_00F04C40 |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F0543C | 0_2_00F0543C |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F00C28 | 0_2_00F00C28 |
Source: yoyf.exe, 00000000.00000000.2187197989.0000000000560000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameTestConnection.exeB vs yoyf.exe |
Source: yoyf.exe, 00000000.00000002.3191794792.0000000000F3E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs yoyf.exe |
Source: yoyf.exe | Binary or memory string: OriginalFilenameTestConnection.exeB vs yoyf.exe |
Source: classification engine | Classification label: mal64.evad.winEXE@1/1@1/1 |
Source: C:\Users\user\Desktop\yoyf.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yoyf.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Mutant created: NULL |
Source: yoyf.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: yoyf.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01% |
Source: C:\Users\user\Desktop\yoyf.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: yoyf.exe | ReversingLabs: Detection: 71% |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll | Jump to behavior |
Source: yoyf.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: yoyf.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: yoyf.exe, Pf6j2.cs | .Net Code: NewLateBinding.LateCall(_0024VB_0024Me.zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{_0024VB_0024Me.Km40W();}) }, (string[])null, (Type[])null, (bool[])null, true) |
Source: yoyf.exe, Pf6j2.cs | .Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{object logTextBox = LogTextBox;NewLateBinding.LateSet(logTextBox, (Type)null, "Text", new object[1] { Operators.AddObject(NewLateBinding.LateGet(logTextBox, (Type)null, "Text", new object[0], (string[])null, (Type[])null, (bool[])null), (object)(g6Q3C + Environment.NewLine)) }, (string[])null, (Type[])null);}) }, (string[])null, (Type[])null, (bool[])null, true) |
Source: yoyf.exe, Pf6j2.cs | .Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{NewLateBinding.LateSet(LogTextBox, (Type)null, "Text", new object[1] { "" }, (string[])null, (Type[])null);}) }, (string[])null, (Type[])null, (bool[])null, true) |
Source: yoyf.exe, Pf6j2.cs | .Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{NewLateBinding.LateSet(LabelStatus, (Type)null, "Text", new object[1] { j4HAa }, (string[])null, (Type[])null);NewLateBinding.LateSet(LabelStatus, (Type)null, "BackColor", new object[1] { z6APa }, (string[])null, (Type[])null);}) }, (string[])null, (Type[])null, (bool[])null, true) |
Source: yoyf.exe, Pf6j2.cs | .Net Code: NewLateBinding.LateCall(zmort, (Type)null, "BeginInvoke", new object[1] { (q1JZy)([SpecialName] () =>{NewLateBinding.LateSetComplex(StartValueTextbox, (Type)null, "Text", new object[1] { e7R9E }, (string[])null, (Type[])null, false, true);NewLateBinding.LateSetComplex(NewLateBinding.LateGet(zmort, (Type)null, "Settings", new object[0], (string[])null, (Type[])null, (bool[])null), (Type)null, "CurrentDNI", new object[1] { e7R9E }, (string[])null, (Type[])null, false, true);NewLateBinding.LateSetComplex(NewLateBinding.LateGet(zmort, (Type)null, "Settings", new object[0], (string[])null, (Type[])null, (bool[])null), (Type)null, "LastDNI", new object[1] { NewLateBinding.LateGet(EndValueTextbox, (Type)null, "Text", new object[0], (string[])null, (Type[])null, (bool[])null) }, (string[])null, (Type[])null, false, true);NewLateBinding.LateCall(NewLateBinding.LateGet(zmort, (Type)null, "Settings", new object[0], (string[])null, (Type[])null, (bool[])null), (Type)null, "Save", new object[0], (string[])null, (Type[])null, (bool[])null, true);}) }, (string[])null, (Type[])null, (bool[])null, true) |
Source: yoyf.exe, s0J7Z.cs | .Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", obj2, (string[])null, (Type[])null, obj3, true) |
Source: yoyf.exe, s0J7Z.cs | .Net Code: NewLateBinding.LateCall(typeFromHandle, (Type)null, "Invoke", new object[2]{null,new object[0]}, (string[])null, (Type[])null, (bool[])null, true) |
Source: C:\Users\user\Desktop\yoyf.exe | Code function: 0_2_00F05990 pushfd ; iretd | 0_2_00F05991 |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Memory allocated: ED0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Memory allocated: 2AB0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Memory allocated: 4AB0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe TID: 6812 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe TID: 6812 | Thread sleep time: -100000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe TID: 6688 | Thread sleep count: 313 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe TID: 6960 | Thread sleep count: 182 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe TID: 5636 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe TID: 992 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: yoyf.exe, 00000000.00000002.3191794792.0000000000F71000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[ |
Source: C:\Users\user\Desktop\yoyf.exe | Queries volume information: C:\Users\user\Desktop\yoyf.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\yoyf.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |