Click to jump to signature section
Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Users\user\AppData\Local\Temp\chrome.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Users\user\AppData\Local\Temp\chrome.exe | ReversingLabs: Detection: 68% |
Source: 626wniisYq.exe | ReversingLabs: Detection: 55% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 81.6% probability |
Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Joe Sandbox ML: detected |
Source: C:\Users\user\AppData\Local\Temp\chrome.exe | Joe Sandbox ML: detected |
Source: Yara match | File source: 626wniisYq.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE |
Source: 626wniisYq.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\626wniisYq.exe | File opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dll | Jump to behavior |
Source: 626wniisYq.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: ntkrnlmp.pdbx, source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbd source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr |
Source: | Binary string: ntkrnlmp.pdbp source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbB source: 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdbkB source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbz source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr |
Source: | Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb} source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb} source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbx source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbU source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: 626wniisYq.exe, 00000000.00000002.4171354761.00000000035B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdbe source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbhD source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_008428D0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle, | 0_2_008428D0 |
Source: integrator.exe.0.dr | String found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte |
Source: VC_redist.x64.exe.0.dr | String found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor |
Source: integrator.exe.0.dr | String found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com |
Source: integrator.exe.0.dr | String found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed |
Source: integrator.exe.0.dr | Binary or memory string: RegisterRawInputDevices | memstr_69c59d54-1 |
Source: Yara match | File source: 626wniisYq.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE |
Source: Joe Sandbox View | Dropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4 |
Source: Joe Sandbox View | Dropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe 2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0 |
Source: Joe Sandbox View | Dropped File: C:\Users\user\AppData\Local\Temp\chrome.exe 0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4 |
Source: 626wniisYq.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal84.troj.evad.winEXE@1/3@0/0 |
Source: C:\Users\user\Desktop\626wniisYq.exe | Mutant created: \Sessions\1\BaseNamedObjects\6436646754 |
Source: C:\Users\user\Desktop\626wniisYq.exe | Command line argument: 6436646754 | 0_2_00841000 |
Source: 626wniisYq.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\626wniisYq.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: integrator.exe.0.dr | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: integrator.exe.0.dr | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: integrator.exe.0.dr | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: integrator.exe.0.dr | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: 626wniisYq.exe | ReversingLabs: Detection: 55% |
Source: C:\Users\user\Desktop\626wniisYq.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | File opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dll | Jump to behavior |
Source: 626wniisYq.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: ntkrnlmp.pdbx, source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbd source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr |
Source: | Binary string: ntkrnlmp.pdbp source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbB source: 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdbkB source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbz source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr |
Source: | Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb} source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb} source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbx source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbU source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: 626wniisYq.exe, 00000000.00000002.4171354761.00000000035B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdbe source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdbhD source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp |
Source: 626wniisYq.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: 626wniisYq.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: 626wniisYq.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: 626wniisYq.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: 626wniisYq.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: initial sample | Static PE information: section where entry point is pointing to: .zero |
Source: integrator.exe.0.dr | Static PE information: section name: .zero |
Source: VC_redist.x64.exe.0.dr | Static PE information: section name: .wixburn |
Source: VC_redist.x64.exe.0.dr | Static PE information: section name: .zero |
Source: chrome.exe.0.dr | Static PE information: section name: .zero |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_00843231 push ecx; ret | 0_2_00843244 |
Source: C:\Users\user\Desktop\626wniisYq.exe | File created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | File created: C:\Users\user\AppData\Local\Temp\chrome.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | File created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | File created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | File created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Window / User API: threadDelayed 1355 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Window / User API: threadDelayed 7963 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Dropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe | Dropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632 | Thread sleep count: 1355 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632 | Thread sleep time: -292680000000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632 | Thread sleep count: 7963 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632 | Thread sleep time: -1720008000000s >= -30000s | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\626wniisYq.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\626wniisYq.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_008428D0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle, | 0_2_008428D0 |
Source: C:\Users\user\Desktop\626wniisYq.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\626wniisYq.exe | Process Stats: CPU usage > 42% for more than 60s |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_00843368 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess, | 0_2_00843368 |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_00841D10 mov eax, dword ptr fs:[00000030h] | 0_2_00841D10 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_00843368 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess, | 0_2_00843368 |
Source: C:\Users\user\Desktop\626wniisYq.exe | Code function: 0_2_00843298 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, | 0_2_00843298 |
Source: Yara match | File source: 626wniisYq.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE |