Click to jump to signature section
Source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack | Malware Configuration Extractor: GhostRat {"C2 url": "156.225.22.155"} |
Source: aQ7bSXduYp.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: z: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: x: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: v: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: t: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: r: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: p: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: n: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: l: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: j: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: h: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: f: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: b: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: y: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: w: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: u: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: s: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: q: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: o: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: m: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: k: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: i: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: g: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: e: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File opened: [: | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10001560 SHGetSpecialFolderPathA,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA, | 0_2_10001560 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 4x nop then push 00000014h | 0_2_0040149C |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 4x nop then mov eax, dword ptr [ebp-48h] | 0_2_00401EB4 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-18h] | 0_2_00401B9F |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 4x nop then inc eax | 0_2_004012C7 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 4x nop then mov edx, dword ptr [ebp-20h] | 0_2_00401D14 |
Source: Network traffic | Suricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49706 -> 156.225.22.155:8080 |
Source: Network traffic | Suricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49712 -> 156.225.22.155:8080 |
Source: Network traffic | Suricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49713 -> 156.225.22.155:8080 |
Source: Network traffic | Suricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49709 -> 156.225.22.155:8080 |
Source: Network traffic | Suricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49714 -> 156.225.22.155:8080 |
Source: Network traffic | Suricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49710 -> 156.225.22.155:8080 |
Source: global traffic | HTTP traffic detected: GET /1.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: x.vay.ccConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /1.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: x.vay.ccConnection: Keep-Alive |
Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://x.vay.cc/ |
Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000070E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546573333.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650696741.0000000000630000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://x.vay.cc/1.jpg |
Source: aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://x.vay.cc/1.jpg(M |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650696741.0000000000630000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://x.vay.cc/1.jpg: |
Source: aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://x.vay.cc/1.jpg:M. |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000070E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://x.vay.cc/1.jpgiy9 |
Source: aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10001A30 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_10001A30 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10001A30 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_10001A30 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100014C0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, | 0_2_100014C0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100026A0 GetKeyState,Sleep,lstrlenA,GetKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,lstrcatA,lstrlenA,lstrcatA,lstrcatA, | 0_2_100026A0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: lstrlenA,strstr,lstrcpyA,CreateProcessA, Applications\iexplore.exe\shell\open\command | 0_2_100035C0 |
Source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Nitol backdoor Author: ditekSHen |
Source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Nitol backdoor Author: ditekSHen |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100016D0: CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit, | 0_2_100016D0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10003CE0 Sleep,OpenSCManagerA,OpenServiceA,DeleteService,GetSystemDirectoryA,lstrcatA,DeleteFileA,exit,VirtualAlloc,VirtualAlloc,Sleep,Sleep,VirtualAlloc, | 0_2_10003CE0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10006880 LoadLibraryA,LoadLibraryA,GetProcAddress,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,LoadLibraryA,GetProcAddress,SetTokenInformation,CreateProcessAsUserA,CloseHandle,CloseHandle,CloseHandle,FreeLibrary, | 0_2_10006880 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100016D0 CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit, | 0_2_100016D0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10002DA0 ExitWindowsEx, | 0_2_10002DA0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_00407400 | 0_2_00407400 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_00402603 | 0_2_00402603 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_1000B460 | 0_2_1000B460 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10009899 | 0_2_10009899 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_1000A8B0 | 0_2_1000A8B0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10008EE0 | 0_2_10008EE0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_1000AD50 | 0_2_1000AD50 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_1000B1D0 | 0_2_1000B1D0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100095EE | 0_2_100095EE |
Source: aQ7bSXduYp.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: classification engine | Classification label: mal100.bank.troj.spyw.evad.winEXE@1/0@1/1 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100016D0 CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit, | 0_2_100016D0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_100059D0 lstrcpyA,lstrcpyA,lstrcpyA,getsockname,GetVersionExA,RegOpenKeyA,RegQueryValueExA,RegCloseKey,wsprintfA,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetLastInputInfo,GetTickCount,lstrcpyA, | 0_2_100059D0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: GetModuleFileNameA,ExpandEnvironmentStringsA,strncmp,wsprintfA,CopyFileA,SetFileAttributesA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlenA,RegSetValueExA, | 0_2_100076E0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10007070 LoadLibraryA,GetProcAddress,OutputDebugStringA,CreateToolhelp32Snapshot,Process32First,Process32Next, | 0_2_10007070 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10007BC0 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,GetModuleFileNameA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep, | 0_2_10007BC0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10007BC0 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,GetModuleFileNameA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep, | 0_2_10007BC0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10007200 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,OutputDebugStringA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,SHGetSpecialFolderPathA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep, | 0_2_10007200 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Mutant created: \Sessions\1\BaseNamedObjects\156.225.22.155:8080:Rsssqi yqeaiusa |
Source: aQ7bSXduYp.exe | Virustotal: Detection: 71% |
Source: aQ7bSXduYp.exe | ReversingLabs: Detection: 71% |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: devenum.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_0040149C LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualAlloc,VirtualAlloc,VirtualAlloc, | 0_2_0040149C |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10007BC0 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,GetModuleFileNameA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep, | 0_2_10007BC0 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10002E20 OpenEventLogA,ClearEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog, | 0_2_10002E20 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10001860 SetupDiGetClassDevsA,SetupDiEnumDeviceInfo,GetLastError,SetupDiGetDeviceRegistryPropertyA,SetupDiGetDeviceRegistryPropertyA,GetLastError,GetLastError,GetLastError,LocalFree,SetupDiGetDeviceRegistryPropertyA,GetLastError,_strcmpi,SetupDiSetClassInstallParamsA,GetLastError,SetupDiCallClassInstaller,GetLastError,SetupDiEnumDeviceInfo,GetLastError,SetupDiDestroyDeviceInfoList,SetLastError, | 0_2_10001860 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10001560 SHGetSpecialFolderPathA,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA, | 0_2_10001560 |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546573333.000000000072E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWX)y%SystemRoot%\system32\mswsock.dll] |
Source: aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000791000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000791000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000791000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000789000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWwk |
Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000789000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_0040149C LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualAlloc,VirtualAlloc,VirtualAlloc, | 0_2_0040149C |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10004620 VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualAlloc,VirtualAlloc, | 0_2_10004620 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_00404740 SetUnhandledExceptionFilter, | 0_2_00404740 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_00404760 SetUnhandledExceptionFilter, | 0_2_00404760 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: LoadLibraryA,OutputDebugStringA,GetProcAddress,OutputDebugStringA,CreateToolhelp32Snapshot,Process32First,_strcmpi,_strcmpi,Process32Next, explorer.exe | 0_2_10007120 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10001860 SetupDiGetClassDevsA,SetupDiEnumDeviceInfo,GetLastError,SetupDiGetDeviceRegistryPropertyA,SetupDiGetDeviceRegistryPropertyA,GetLastError,GetLastError,GetLastError,LocalFree,SetupDiGetDeviceRegistryPropertyA,GetLastError,_strcmpi,SetupDiSetClassInstallParamsA,GetLastError,SetupDiCallClassInstaller,GetLastError,SetupDiEnumDeviceInfo,GetLastError,SetupDiDestroyDeviceInfoList,SetLastError, | 0_2_10001860 |
Source: C:\Users\user\Desktop\aQ7bSXduYp.exe | Code function: 0_2_10005D90 GetVersionExA,wsprintfA,wsprintfA,GetLocalTime,wsprintfA,lstrlenA, | 0_2_10005D90 |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vsserv.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: avcenter.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: kxetray.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: cpf.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: avp.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: F-PROT.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: spidernt.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: F-PROT.EXE |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: rtvscan.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: nspupsvc.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: 360tray.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: ashDisp.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: TMBMSRV.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SBAMSvc.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: a2guard.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: avgwdsvc.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: AYAgent.aye |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vsmon.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: QUHLPSVC.EXE |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: RavMonD.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: MsMpEng.exe |
Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Mcshield.exe |
Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: K7TSecurity.exe |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: aQ7bSXduYp.exe PID: 7536, type: MEMORYSTR |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: aQ7bSXduYp.exe PID: 7536, type: MEMORYSTR |