Source: j1gw88aHdL.exe |
Virustotal: Detection: 9% |
Perma Link |
Source: j1gw88aHdL.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF9280 FindFirstFileExW,FindClose, |
0_2_00007FF7D4BF9280 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C11874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, |
0_2_00007FF7D4C11874 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF83C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, |
0_2_00007FF7D4BF83C0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF1000 |
0_2_00007FF7D4BF1000 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C16964 |
0_2_00007FF7D4C16964 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C035A0 |
0_2_00007FF7D4C035A0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C0E570 |
0_2_00007FF7D4C0E570 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C05D30 |
0_2_00007FF7D4C05D30 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C01D54 |
0_2_00007FF7D4C01D54 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C0DEF0 |
0_2_00007FF7D4C0DEF0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C09EA0 |
0_2_00007FF7D4C09EA0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C15E7C |
0_2_00007FF7D4C15E7C |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF9800 |
0_2_00007FF7D4BF9800 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C01F60 |
0_2_00007FF7D4C01F60 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C08794 |
0_2_00007FF7D4C08794 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C19728 |
0_2_00007FF7D4C19728 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C01740 |
0_2_00007FF7D4C01740 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C080E4 |
0_2_00007FF7D4C080E4 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C140AC |
0_2_00007FF7D4C140AC |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C108C8 |
0_2_00007FF7D4C108C8 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C11874 |
0_2_00007FF7D4C11874 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF89E0 |
0_2_00007FF7D4BF89E0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C039A4 |
0_2_00007FF7D4C039A4 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C02164 |
0_2_00007FF7D4C02164 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C01944 |
0_2_00007FF7D4C01944 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFA2DB |
0_2_00007FF7D4BFA2DB |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C0DA5C |
0_2_00007FF7D4C0DA5C |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C13C10 |
0_2_00007FF7D4C13C10 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C02C10 |
0_2_00007FF7D4C02C10 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C15C00 |
0_2_00007FF7D4C15C00 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C01B50 |
0_2_00007FF7D4C01B50 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFACAD |
0_2_00007FF7D4BFACAD |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFA47B |
0_2_00007FF7D4BFA47B |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C16418 |
0_2_00007FF7D4C16418 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C108C8 |
0_2_00007FF7D4C108C8 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: String function: 00007FF7D4BF2710 appears 52 times |
|
Source: classification engine |
Classification label: mal48.winEXE@1/0@0/0 |
Source: j1gw88aHdL.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: j1gw88aHdL.exe |
Virustotal: Detection: 9% |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
File read: C:\Users\user\Desktop\j1gw88aHdL.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: j1gw88aHdL.exe |
Static PE information: Image base 0x140000000 > 0x60000000 |
Source: j1gw88aHdL.exe |
Static file information: File size 17226969 > 1048576 |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: j1gw88aHdL.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: j1gw88aHdL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: j1gw88aHdL.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: j1gw88aHdL.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: j1gw88aHdL.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: j1gw88aHdL.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: j1gw88aHdL.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF76C0 GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError, |
0_2_00007FF7D4BF76C0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Check user administrative privileges: GetTokenInformation,DecisionNodes |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
API coverage: 5.2 % |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF9280 FindFirstFileExW,FindClose, |
0_2_00007FF7D4BF9280 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C11874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, |
0_2_00007FF7D4C11874 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BF83C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, |
0_2_00007FF7D4BF83C0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C0A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00007FF7D4C0A614 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C13480 GetProcessHeap, |
0_2_00007FF7D4C13480 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C0A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00007FF7D4C0A614 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFC8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00007FF7D4BFC8A0 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFD12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00007FF7D4BFD12C |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFD30C SetUnhandledExceptionFilter, |
0_2_00007FF7D4BFD30C |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C19570 cpuid |
0_2_00007FF7D4C19570 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4BFD010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, |
0_2_00007FF7D4BFD010 |
Source: C:\Users\user\Desktop\j1gw88aHdL.exe |
Code function: 0_2_00007FF7D4C15E7C _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation, |
0_2_00007FF7D4C15E7C |