Click to jump to signature section
Source: Holiday#3021.exe | ReversingLabs: Detection: 42% |
Source: Holiday#3021.exe | Virustotal: Detection: 44% | Perma Link |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 92.8% probability |
Source: Holiday#3021.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Holiday#3021.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View | IP Address: 5.253.86.15 5.253.86.15 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: oshi.at |
Source: Holiday#3021.exe | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: Holiday#3021.exe | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: Holiday#3021.exe | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0 |
Source: Holiday#3021.exe | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: Holiday#3021.exe | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: Holiday#3021.exe | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: Holiday#3021.exe | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: Holiday#3021.exe | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://oshi.at |
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://oshi.atd |
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameX) |
Source: Holiday#3021.exe | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: Holiday#3021.exe | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: Holiday#3021.exe | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oshi.at |
Source: Holiday#3021.exe | String found in binary or memory: https://oshi.at/ypmZ |
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oshi.at/ypmZdn |
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CAE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oshi.atD |
Source: Holiday#3021.exe | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49982 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49981 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49980 |
Source: unknown | Network traffic detected: HTTP traffic on port 49982 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49981 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49980 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 49867 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49867 |
Source: Holiday#3021.exe | Static PE information: invalid certificate |
Source: Holiday#3021.exe, 00000000.00000002.3914242900.0000000000E2E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs Holiday#3021.exe |
Source: Holiday#3021.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal56.winEXE@1/0@1/1 |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Mutant created: NULL |
Source: Holiday#3021.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: Holiday#3021.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01% |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: Holiday#3021.exe | ReversingLabs: Detection: 42% |
Source: Holiday#3021.exe | Virustotal: Detection: 44% |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll | Jump to behavior |
Source: Holiday#3021.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: Holiday#3021.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Memory allocated: 1070000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Memory allocated: 2C20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Memory allocated: 11E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Window / User API: threadDelayed 550 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Window / User API: threadDelayed 726 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 3996 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 3996 | Thread sleep time: -100000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 4288 | Thread sleep count: 550 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 4288 | Thread sleep count: 726 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 3996 | Thread sleep time: -91453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Thread delayed: delay time: 91453 | Jump to behavior |
Source: Holiday#3021.exe, 00000000.00000002.3914242900.0000000000E9D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Queries volume information: C:\Users\user\Desktop\Holiday#3021.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Holiday#3021.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |