Click to jump to signature section
Source: tasktow.exe | ReversingLabs: Detection: 58% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.9% probability |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: -----BEGIN PUBLIC KEY----- | memstr_6d33feb6-d |
Source: tasktow.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: chrome.cloudflare-dns.com |
Source: global traffic | DNS traffic detected: DNS query: srtb.msn.com |
Source: global traffic | DNS traffic detected: DNS query: tse1.mm.bing.net |
Source: global traffic | DNS traffic detected: DNS query: ecn.dev.virtualearth.net |
Source: global traffic | DNS traffic detected: DNS query: api.tzproject.com |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://.css |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://.jpg |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLThis |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julieta |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://fontawesome.com |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/JulietaUla/Montserrat) |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/itfoundry/Poppins)&&&&r |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/itfoundry/Poppins)&&&&s |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/itfoundry/Poppins)&&&&v |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://scripts.sil.org/OFLThis |
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49791 |
Source: unknown | Network traffic detected: HTTP traffic on port 49791 -> 443 |
Source: tasktow.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: tasktow.exe, 00000001.00000000.11740974983.00007FF6F6EFF000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenametaskhostw.exe< vs tasktow.exe |
Source: tasktow.exe | Binary or memory string: OriginalFilenametaskhostw.exe< vs tasktow.exe |
Source: classification engine | Classification label: mal92.evad.winEXE@1/0@5/2 |
Source: C:\Users\user\Desktop\tasktow.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: tasktow.exe | ReversingLabs: Detection: 58% |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: directxdatabasehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: tasktow.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: tasktow.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: tasktow.exe | Static file information: File size 7520768 > 1048576 |
Source: tasktow.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x72b600 |
Source: tasktow.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp |
Source: | Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp |
Source: initial sample | Static PE information: section where entry point is pointing to: .vmp1 |
Source: tasktow.exe | Static PE information: section name: .vmp0 |
Source: tasktow.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\tasktow.exe | Memory written: PID: 5684 base: 7FFD76C90008 value: E9 1B 0B E8 FF | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Memory written: PID: 5684 base: 7FFD76B10B20 value: E9 F0 F4 17 00 | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Memory written: PID: 5684 base: 7FFD76CA000D value: E9 5B 72 EA FF | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Memory written: PID: 5684 base: 7FFD76B47260 value: E9 BA 8D 15 00 | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | RDTSC instruction interceptor: First address: 7FF6F6E6B52F second address: 7FF6F6E6B538 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movzx ebx, di 0x00000006 lahf 0x00000007 inc ecx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tasktow.exe | RDTSC instruction interceptor: First address: 7FF6F66E6D6F second address: 7FF6F67BDDEB instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 cmp dh, bh 0x00000005 pop ecx 0x00000006 dec eax 0x00000007 sar edi, cl 0x00000009 inc ecx 0x0000000a pop eax 0x0000000b inc esp 0x0000000c movzx esp, sp 0x0000000f pop edi 0x00000010 cmc 0x00000011 inc ecx 0x00000012 setnb dl 0x00000015 inc cx 0x00000017 sal edx, cl 0x00000019 popfd 0x0000001a inc ecx 0x0000001b mov ch, bh 0x0000001d inc ecx 0x0000001e pop esi 0x0000001f inc cx 0x00000021 movzx esi, bh 0x00000024 cwd 0x00000026 jmp 00007F0D51220529h 0x0000002b inc ecx 0x0000002c pop edx 0x0000002d inc ecx 0x0000002e setne ah 0x00000031 cwd 0x00000033 cwde 0x00000034 inc ecx 0x00000035 pop ebx 0x00000036 inc ecx 0x00000037 pop edi 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\tasktow.exe | RDTSC instruction interceptor: First address: 7FF6F679314E second address: 7FF6F6793157 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movzx ebx, di 0x00000006 lahf 0x00000007 inc ecx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tasktow.exe | RDTSC instruction interceptor: First address: 7FF6F66C2FB5 second address: 7FF6F66C2FD0 instructions: 0x00000000 rdtsc 0x00000002 inc esp 0x00000003 movsx edx, ax 0x00000006 inc ecx 0x00000007 pop edx 0x00000008 cbw 0x0000000a dec eax 0x0000000b cwde 0x0000000c inc ecx 0x0000000d pop ebp 0x0000000e inc eax 0x0000000f mov dh, A5h 0x00000011 pop ebx 0x00000012 inc ecx 0x00000013 not bh 0x00000015 seto cl 0x00000018 dec eax 0x00000019 cwde 0x0000001a pop ecx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\tasktow.exe | RDTSC instruction interceptor: First address: 7FF6F66C2FD0 second address: 7FF6F66C2FE0 instructions: 0x00000000 rdtsc 0x00000002 cdq 0x00000003 inc ecx 0x00000004 mov dh, ch 0x00000006 inc ecx 0x00000007 pop esi 0x00000008 dec eax 0x00000009 cwde 0x0000000a dec ebp 0x0000000b movzx edi, bp 0x0000000e inc ecx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tasktow.exe | Special instruction interceptor: First address: 7FF6F6D92E0C instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: tasktow.exe, 00000001.00000002.11806825517.000001C7F3268000.00000004.00000020.00020000.00000000.sdmp, tasktow.exe, 00000001.00000003.11805845558.000001C7F3268000.00000004.00000020.00020000.00000000.sdmp, tasktow.exe, 00000001.00000003.11806109229.000001C7F3268000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\tasktow.exe | System information queried: ModuleInformation | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Handle closed: DEADC0DE |
Source: C:\Users\user\Desktop\tasktow.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Desktop\tasktow.exe | NtProtectVirtualMemory: Indirect: 0x7FF6F67C8CB2 | Jump to behavior |