Click to jump to signature section
Source: https://dddotx.shop/Bish2.exe: | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/DLLL.dll | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exe | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop | Avira URL Cloud: Label: malware |
Source: http://dddotx.shop | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/Bish2.exe | Avira URL Cloud: Label: malware |
Source: AJ5zYYsisA.exe | ReversingLabs: Detection: 57% |
Source: AJ5zYYsisA.exe | Virustotal: Detection: 70% | Perma Link |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.3% probability |
Source: AJ5zYYsisA.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: unknown | HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49702 version: TLS 1.2 |
Source: AJ5zYYsisA.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: Bish.pdbH source: AJ5zYYsisA.exe |
Source: | Binary string: Bish.pdb source: AJ5zYYsisA.exe |
Source: global traffic | HTTP traffic detected: GET /Bish2.exe HTTP/1.1Host: dddotx.shopConnection: Keep-Alive |
Source: Joe Sandbox View | IP Address: 188.114.96.3 188.114.96.3 |
Source: Joe Sandbox View | IP Address: 188.114.96.3 188.114.96.3 |
Source: Joe Sandbox View | JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: Network traffic | Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.7:49702 -> 188.114.96.3:443 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /Bish2.exe HTTP/1.1Host: dddotx.shopConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: dddotx.shop |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 02:35:00 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCache-Control: max-age=14400CF-Cache-Status: EXPIREDReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fuz5G1IHvIYKa3ZvgJDCAj%2BnzwVGGXWy3wDAJdvzNR0QyoD21js1xoESBMYGdTz%2FV4b12D0Y2VKNUtl3yPMNaqx83Jihz4gqbGdMH%2FpqtvOxu6433MNQFqW4p7MEFQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 900182cf7a5a429a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1870&min_rtt=1858&rtt_var=722&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2825&recv_bytes=684&delivery_rate=1489795&cwnd=237&unsent_bytes=0&cid=15301424f7eb13c0&ts=362&x=0" |
Source: AJ5zYYsisA.exe, 00000000.00000002.1271434884.0000000000837000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micros |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.00000000026E9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://dddotx.shop |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.00000000026E9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://dddotx.shopd |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.00000000026D2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.00000000026D2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.00000000026D2000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.1272484683.0000000002671000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop/Bish2.exe |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.0000000002709000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop/Bish2.exe: |
Source: AJ5zYYsisA.exe, 00000000.00000002.1272484683.00000000026D2000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.1272484683.0000000002671000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop/DLLL.dll |
Source: AJ5zYYsisA.exe | String found in binary or memory: https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exe |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown | HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49702 version: TLS 1.2 |
Source: AJ5zYYsisA.exe, 00000000.00000002.1271434884.000000000079E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe, 00000000.00000000.1260807942.000000000028A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameBish.exe* vs AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe | Binary or memory string: OriginalFilenameBish.exe* vs AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal72.winEXE@1/1@1/1 |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AJ5zYYsisA.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Mutant created: NULL |
Source: AJ5zYYsisA.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: AJ5zYYsisA.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: AJ5zYYsisA.exe | ReversingLabs: Detection: 57% |
Source: AJ5zYYsisA.exe | Virustotal: Detection: 70% |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: AJ5zYYsisA.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: AJ5zYYsisA.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: AJ5zYYsisA.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: Bish.pdbH source: AJ5zYYsisA.exe |
Source: | Binary string: Bish.pdb source: AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe | Static PE information: 0xEF72C5EC [Sat Apr 20 06:06:36 2097 UTC] |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: 8E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: 2670000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: 2460000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe TID: 4732 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe TID: 5104 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: AJ5zYYsisA.exe, 00000000.00000002.1271434884.00000000007D7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Queries volume information: C:\Users\user\Desktop\AJ5zYYsisA.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |