Click to jump to signature section
Source: 7fqul5Zr8Y.exe | ReversingLabs: Detection: 55% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: 7fqul5Zr8Y.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: global traffic | TCP traffic: 192.168.2.8:49705 -> 147.185.221.24:58068 |
Source: Joe Sandbox View | IP Address: 147.185.221.24 147.185.221.24 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: coprophile.bounceme.net |
Source: global traffic | DNS traffic detected: DNS query: board-proceeding.gl.at.ply.gg |
Source: 7fqul5Zr8Y.exe, 00000000.00000002.2653812464.00000000036A6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 7fqul5Zr8Y.exe, Methods.cs | .Net Code: CaptureResizeReduceQuality |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2578E0 NtProtectVirtualMemory, | 0_2_00007FFB4B2578E0 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25ACD9 NtProtectVirtualMemory, | 0_2_00007FFB4B25ACD9 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2505D0 | 0_2_00007FFB4B2505D0 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25A450 | 0_2_00007FFB4B25A450 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2562A2 | 0_2_00007FFB4B2562A2 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2554F6 | 0_2_00007FFB4B2554F6 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2580E9 | 0_2_00007FFB4B2580E9 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B251750 | 0_2_00007FFB4B251750 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2589B6 | 0_2_00007FFB4B2589B6 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B253A14 | 0_2_00007FFB4B253A14 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25A43D | 0_2_00007FFB4B25A43D |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25B248 | 0_2_00007FFB4B25B248 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2594EE | 0_2_00007FFB4B2594EE |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25953D | 0_2_00007FFB4B25953D |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B251739 | 0_2_00007FFB4B251739 |
Source: 7fqul5Zr8Y.exe | Static PE information: No import functions for PE file found |
Source: 7fqul5Zr8Y.exe, 00000000.00000000.1405271512.0000000000358000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameClient.exe. vs 7fqul5Zr8Y.exe |
Source: 7fqul5Zr8Y.exe | Binary or memory string: OriginalFilenameClient.exe. vs 7fqul5Zr8Y.exe |
Source: 7fqul5Zr8Y.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 7fqul5Zr8Y.exe, Config.cs | Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 7fqul5Zr8Y.exe, Config.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 7fqul5Zr8Y.exe, SecrityHidden.cs | Security API names: File.GetAccessControl |
Source: 7fqul5Zr8Y.exe, SecrityHidden.cs | Security API names: File.SetAccessControl |
Source: 7fqul5Zr8Y.exe, SecrityHidden.cs | Security API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule) |
Source: classification engine | Classification label: mal76.spyw.evad.winEXE@1/0@2/1 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Mutant created: NULL |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Mutant created: \Sessions\1\BaseNamedObjects\NULL |
Source: 7fqul5Zr8Y.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 7fqul5Zr8Y.exe | Static file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88% |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: 7fqul5Zr8Y.exe | ReversingLabs: Detection: 55% |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 | Jump to behavior |
Source: 7fqul5Zr8Y.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: 7fqul5Zr8Y.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: 7fqul5Zr8Y.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: 7fqul5Zr8Y.exe, PluginLoader.cs | .Net Code: Load System.AppDomain.Load(byte[]) |
Source: 7fqul5Zr8Y.exe, PluginLoader.cs | .Net Code: Load |
Source: 7fqul5Zr8Y.exe, EncryptString.cs | .Net Code: MoveNext System.Reflection.Assembly.Load(byte[]) |
Source: 7fqul5Zr8Y.exe, AsmiAndETW.cs | .Net Code: AggresivAmsiActivate System.Reflection.Assembly.Load(byte[]) |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B2500BD pushad ; iretd | 0_2_00007FFB4B2500C1 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25B4FD push eax; retn 0040h | 0_2_00007FFB4B25B4FE |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Code function: 0_2_00007FFB4B25B505 push esp; retn 0040h | 0_2_00007FFB4B25B506 |
Source: 7fqul5Zr8Y.exe | Static PE information: section name: .text entropy: 7.41686521078192 |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE PNPClass = 'Camera' |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Memory allocated: C80000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Memory allocated: 1B690000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe TID: 3568 | Thread sleep count: 391 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe TID: 3568 | Thread sleep count: 91 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: 7fqul5Zr8Y.exe, 00000000.00000002.2653714619.0000000003180000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll # |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Queries volume information: C:\Users\user\Desktop\7fqul5Zr8Y.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: 7fqul5Zr8Y.exe, 00000000.00000002.2653357165.0000000000C54000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\7fqul5Zr8Y.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |