Click to jump to signature section
Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Users\user\AppData\Local\Temp\chrome.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Users\user\AppData\Local\Temp\chrome.exe | ReversingLabs: Detection: 68% |
Source: myTOrYevLI.exe | ReversingLabs: Detection: 44% |
Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Joe Sandbox ML: detected |
Source: C:\Users\user\AppData\Local\Temp\chrome.exe | Joe Sandbox ML: detected |
Source: Yara match | File source: myTOrYevLI.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE |
Source: myTOrYevLI.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dll | Jump to behavior |
Source: myTOrYevLI.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: ntkrnlmp.pdbx, source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BC6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B07000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C281000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B04000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr |
Source: | Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr |
Source: | Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2, source: myTOrYevLI.exe, 00000000.00000002.4122786977.0000000002B15000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D2980 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle, | 0_2_004D2980 |
Source: integrator.exe.0.dr | String found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte |
Source: VC_redist.x64.exe.0.dr | String found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor |
Source: integrator.exe.0.dr | String found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com |
Source: integrator.exe.0.dr | String found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed |
Source: integrator.exe.0.dr | Binary or memory string: RegisterRawInputDevices | memstr_8a2edf16-6 |
Source: Yara match | File source: myTOrYevLI.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE |
Source: Joe Sandbox View | Dropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4 |
Source: Joe Sandbox View | Dropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe 2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0 |
Source: myTOrYevLI.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal84.troj.evad.winEXE@1/3@0/0 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File created: C:\Users\user\AppData\Roaming\windrx.txt | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Mutant created: \Sessions\1\BaseNamedObjects\6436646754 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Command line argument: 6436646754 | 0_2_004D1090 |
Source: myTOrYevLI.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: integrator.exe.0.dr | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: integrator.exe.0.dr | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: integrator.exe.0.dr | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: integrator.exe.0.dr | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: myTOrYevLI.exe | ReversingLabs: Detection: 44% |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dll | Jump to behavior |
Source: myTOrYevLI.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: ntkrnlmp.pdbx, source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BC6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B07000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C281000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B04000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr |
Source: | Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr |
Source: | Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr |
Source: | Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2, source: myTOrYevLI.exe, 00000000.00000002.4122786977.0000000002B15000.00000004.00000020.00020000.00000000.sdmp |
Source: myTOrYevLI.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: myTOrYevLI.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: myTOrYevLI.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: myTOrYevLI.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: myTOrYevLI.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: initial sample | Static PE information: section where entry point is pointing to: .zero |
Source: integrator.exe.0.dr | Static PE information: section name: .zero |
Source: VC_redist.x64.exe.0.dr | Static PE information: section name: .wixburn |
Source: VC_redist.x64.exe.0.dr | Static PE information: section name: .zero |
Source: chrome.exe.0.dr | Static PE information: section name: .zero |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D32E1 push ecx; ret | 0_2_004D32F4 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File created: C:\Users\user\AppData\Local\Temp\chrome.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | File created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Evasive API call chain: CreateMutex,DecisionNodes,Sleep | graph_0-558 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Evasive API call chain: CreateMutex,DecisionNodes,ExitProcess | graph_0-558 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Window / User API: threadDelayed 1445 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Window / User API: threadDelayed 8134 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Dropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Dropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248 | Thread sleep count: 1445 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248 | Thread sleep time: -312120000000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248 | Thread sleep count: 8134 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248 | Thread sleep time: -1756944000000s >= -30000s | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D2980 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle, | 0_2_004D2980 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Thread delayed: delay time: 216000000 | Jump to behavior |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Process Stats: CPU usage > 42% for more than 60s |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D3418 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess, | 0_2_004D3418 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D1DC0 mov eax, dword ptr fs:[00000030h] | 0_2_004D1DC0 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D301D SetUnhandledExceptionFilter, | 0_2_004D301D |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D3418 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess, | 0_2_004D3418 |
Source: C:\Users\user\Desktop\myTOrYevLI.exe | Code function: 0_2_004D3348 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, | 0_2_004D3348 |
Source: Yara match | File source: myTOrYevLI.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE |