Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: 51FZ8pgLbe.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 51FZ8pgLbe.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0056A6C3 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW, |
0_2_0056A6C3 |
Source: Network traffic |
Suricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49730 -> 116.198.232.205:8888 |
Source: Network traffic |
Suricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49772 -> 116.198.232.205:6666 |
Source: global traffic |
TCP traffic: 192.168.2.4:49730 -> 116.198.232.205:8888 |
Source: Joe Sandbox View |
ASN Name: CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqian CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqian |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.198.232.205 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00533507 recv,SetLastError,WSASetLastError,GetLastError,WSAGetLastError, |
0_2_00533507 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0055C213 __EH_prolog3_GS,GetParent,GetParent,GetParent,UpdateWindow,SetCursor,GetAsyncKeyState,UpdateWindow,InflateRect,SetCapture,SetCursor,IsWindow,GetCursorPos,ScreenToClient,PtInRect,RedrawWindow,GetParent,GetParent,GetParent,RedrawWindow,RedrawWindow,GetParent,GetParent,GetParent,InvalidateRect,UpdateWindow,UpdateWindow,SetCapture,RedrawWindow, |
0_2_0055C213 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00598206 MessageBeep,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW, |
0_2_00598206 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0056C51E SendMessageW,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageW, |
0_2_0056C51E |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005E0863 GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer, |
0_2_005E0863 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0057688A IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen, |
0_2_0057688A |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005749CC IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen, |
0_2_005749CC |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B09E6 GetKeyState,GetKeyState,GetKeyState,GetKeyState, |
0_2_005B09E6 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00598DC6 GetParent,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,SendMessageW, |
0_2_00598DC6 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0056207D |
0_2_0056207D |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005CE67D |
0_2_005CE67D |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00644E6C |
0_2_00644E6C |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00636F6B |
0_2_00636F6B |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_006398A3 |
0_2_006398A3 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: String function: 00635E4B appears 208 times |
|
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: String function: 006363B0 appears 33 times |
|
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: String function: 00635EB4 appears 54 times |
|
Source: 51FZ8pgLbe.exe, 00000000.00000000.1676149608.0000000000823000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameMiniCADSee_X64.exe0 vs 51FZ8pgLbe.exe |
Source: 51FZ8pgLbe.exe |
Binary or memory string: OriginalFilenameMiniCADSee_X64.exe0 vs 51FZ8pgLbe.exe |
Source: 51FZ8pgLbe.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal60.evad.winEXE@1/0@0/1 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0054A66C CoInitialize,CoCreateInstance, |
0_2_0054A66C |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0053A4D3 FindResourceW,LoadResource,LockResource,FreeResource, |
0_2_0053A4D3 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Mutant created: \Sessions\1\BaseNamedObjects\MyUniqueMutexName |
Source: 51FZ8pgLbe.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 51FZ8pgLbe.exe |
Virustotal: Detection: 60% |
Source: 51FZ8pgLbe.exe |
ReversingLabs: Detection: 57% |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: msimg32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: oledlg.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: oleacc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: napinsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: pnrpnsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: wshbth.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: nlaapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: winrnr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: 51FZ8pgLbe.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: 51FZ8pgLbe.exe |
Static file information: File size 3218944 > 1048576 |
Source: 51FZ8pgLbe.exe |
Static PE information: Raw size of .text is bigger than: 0x100000 < 0x128a00 |
Source: 51FZ8pgLbe.exe |
Static PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x173a00 |
Source: 51FZ8pgLbe.exe |
Static PE information: More than 200 imports for USER32.dll |
Source: 51FZ8pgLbe.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: 51FZ8pgLbe.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: 51FZ8pgLbe.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: 51FZ8pgLbe.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: 51FZ8pgLbe.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: 51FZ8pgLbe.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005310BE __floor_pentium4,LoadLibraryW,GetProcAddress,VirtualAlloc,_memmove,VirtualFree, |
0_2_005310BE |
Source: 51FZ8pgLbe.exe |
Static PE information: real checksum: 0x314ee0 should be: 0x31a569 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_006363F5 push ecx; ret |
0_2_00636408 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00635F23 push ecx; ret |
0_2_00635F36 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00572018 IsIconic, |
0_2_00572018 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B22CB IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageW, |
0_2_005B22CB |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0055CC9C SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow, |
0_2_0055CC9C |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0056CD1F IsWindowVisible,IsIconic, |
0_2_0056CD1F |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B2E90 IsIconic,PostMessageW, |
0_2_005B2E90 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B0FB1 IsWindow,GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible, |
0_2_005B0FB1 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00535516 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,GetWindowRect,ScreenToClient,ScreenToClient,ScreenToClient,GetDC,SelectObject, |
0_2_00535516 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B1A40 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics, |
0_2_005B1A40 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B1A40 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics, |
0_2_005B1A40 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B1A40 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics, |
0_2_005B1A40 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005B1D40 IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect, |
0_2_005B1D40 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00587DE2 GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos, |
0_2_00587DE2 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00571F74 SetForegroundWindow,IsIconic, |
0_2_00571F74 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0054B770 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,GetSystemMetrics,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_0054B770 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Decision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec) |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Evasive API call chain: RegQueryValue,DecisionNodes,Sleep |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
API coverage: 4.8 % |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe TID: 6228 |
Thread sleep count: 6838 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe TID: 6228 |
Thread sleep time: -68380s >= -30000s |
Jump to behavior |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0056A6C3 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW, |
0_2_0056A6C3 |
Source: 51FZ8pgLbe.exe, 00000000.00000002.2914968247.0000000001140000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<@| |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_006347AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_006347AC |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_005310BE __floor_pentium4,LoadLibraryW,GetProcAddress,VirtualAlloc,_memmove,VirtualFree, |
0_2_005310BE |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_006347AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_006347AC |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0063BBA1 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0063BBA1 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW, |
0_2_00537502 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00638F59 GetSystemTimeAsFileTime,__aulldiv, |
0_2_00638F59 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_00642110 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte, |
0_2_00642110 |
Source: C:\Users\user\Desktop\51FZ8pgLbe.exe |
Code function: 0_2_0054B770 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,GetSystemMetrics,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_0054B770 |