Source: NVIDIAWebHelper.exe |
Virustotal: Detection: 59% |
Perma Link |
Source: NVIDIAWebHelper.exe |
ReversingLabs: Detection: 44% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 97.9% probability |
Source: NVIDIAWebHelper.exe |
Joe Sandbox ML: detected |
Source: Yara match |
File source: 00000000.00000002.1879721744.00000213EB43C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: NVIDIAWebHelper.exe PID: 5264, type: MEMORYSTR |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: stratum+tcp:// |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: cryptonight/0 |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: stratum+tcp:// |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: -o, --url=URL URL of mining server |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: Usage: xmrig [OPTIONS] |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: XMRig 6.15.3 |
Source: NVIDIAWebHelper.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: https://xmrig.com/benchmark/%s |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp, NVIDIAWebHelper.exe, 00000000.00000002.1879721744.00000213EB469000.00000004.00000020.00020000.00000000.sdmp, NVIDIAWebHelper.exe, 00000000.00000002.1879721744.00000213EB43C000.00000004.00000020.00020000.00000000.sdmp, NVIDIAWebHelper.exe, 00000000.00000002.1879721744.00000213EB439000.00000004.00000020.00020000.00000000.sdmp, ConDrv.0.dr |
String found in binary or memory: https://xmrig.com/wizard |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: https://xmrig.com/wizard%s |
Source: 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: Process Memory Space: NVIDIAWebHelper.exe PID: 5264, type: MEMORYSTR |
Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: NVIDIAWebHelper.exe |
Static PE information: Number of sections : 14 > 10 |
Source: NVIDIAWebHelper.exe, 00000000.00000002.1883596810.00007FF78B491000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamenode.exe, vs NVIDIAWebHelper.exe |
Source: NVIDIAWebHelper.exe |
Binary or memory string: OriginalFilenamenode.exe, vs NVIDIAWebHelper.exe |
Source: 00000000.00000002.1880188744.00007FF7896A0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: NVIDIAWebHelper.exe PID: 5264, type: MEMORYSTR |
Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: classification engine |
Classification label: mal100.evad.mine.winEXE@2/1@0/0 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5924:120:WilError_03 |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: NVIDIAWebHelper.exe |
Virustotal: Detection: 59% |
Source: NVIDIAWebHelper.exe |
ReversingLabs: Detection: 44% |
Source: unknown |
Process created: C:\Users\user\Desktop\NVIDIAWebHelper.exe "C:\Users\user\Desktop\NVIDIAWebHelper.exe" |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: NVIDIAWebHelper.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: NVIDIAWebHelper.exe |
Static PE information: Image base 0x140000000 > 0x60000000 |
Source: NVIDIAWebHelper.exe |
Static file information: File size 17680384 > 1048576 |
Source: NVIDIAWebHelper.exe |
Static PE information: Raw size of NVIDIAHE is bigger than: 0x100000 < 0x10b9800 |
Source: NVIDIAWebHelper.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: initial sample |
Static PE information: section where entry point is pointing to: NVIDIAHE |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: _RANDOMX |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: _SHA3_25 |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: _TEXT_CN |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: _TEXT_CN |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: _RDATA |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: NVIDIAHE |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: NVIDIAHE |
Source: NVIDIAWebHelper.exe |
Static PE information: section name: NVIDIAHE |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Memory written: PID: 5264 base: 7FFE22370008 value: E9 EB D9 E9 FF |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Memory written: PID: 5264 base: 7FFE2220D9F0 value: E9 20 26 16 00 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Memory written: PID: 5264 base: 7FFE2238000D value: E9 BB CB EB FF |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Memory written: PID: 5264 base: 7FFE2223CBC0 value: E9 5A 34 14 00 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
System information queried: FirmwareTableInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
System information queried: FirmwareTableInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Special instruction interceptor: First address: 7FF78AF7E9B8 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Special instruction interceptor: First address: 7FF78AF7E9C8 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
System information queried: CurrentTimeZoneInformation |
Jump to behavior |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
System information queried: ModuleInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process information queried: ProcessInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Handle closed: DEADC0DE |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
Process queried: DebugPort |
Jump to behavior |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AED2188 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQueryInformationProcess: Direct from: 0x7FF78A614166 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtSetInformationThread: Direct from: 0x7FF78A632E24 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Indirect: 0x7FF78A3B2159 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AF53F71 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtMapViewOfSection: Direct from: 0x7FF78A40A107 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQuerySystemInformation: Direct from: 0x7FF78AEFD202 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQueryInformationProcess: Direct from: 0x7FF78AEBE36B |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQuerySystemInformation: Direct from: 0x7FF78AF5B85C |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AF723D9 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AF6E941 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AF6E9FC |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQueryInformationProcess: Direct from: 0x7FF78A6C3F6D |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78A5A7F02 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AF506EE |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQuerySystemInformation: Direct from: 0x7FF78A3C9A53 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78A3D6C17 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AEFB32B |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtSetInformationThread: Direct from: 0x7FF78AF2F655 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtClose: Direct from: 0x7FF78AF0EC31 |
|
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78A5ECC5A |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQuerySystemInformation: Direct from: 0x7FF78AF03B06 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78A5ECC7A |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtQuerySystemInformation: Direct from: 0x7FF78A5C31AF |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtOpenFile: Direct from: 0x7FF78A40C14A |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtUnmapViewOfSection: Direct from: 0x7FF78AEF7F74 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78A641D77 |
Jump to behavior |
Source: C:\Users\user\Desktop\NVIDIAWebHelper.exe |
NtProtectVirtualMemory: Direct from: 0x7FF78AF4C5B4 |
Jump to behavior |