Click to jump to signature section
Source: https://dddotx.shop | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/Bish2.exe: | Avira URL Cloud: Label: malware |
Source: http://dddotx.shop | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/DLLL.dll | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exe | Avira URL Cloud: Label: malware |
Source: https://dddotx.shop/Bish2.exe | Avira URL Cloud: Label: malware |
Source: AJ5zYYsisA.exe | ReversingLabs: Detection: 57% |
Source: AJ5zYYsisA.exe | Virustotal: Detection: 70% | Perma Link |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.5% probability |
Source: AJ5zYYsisA.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: unknown | HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: AJ5zYYsisA.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: Bish.pdbH source: AJ5zYYsisA.exe |
Source: | Binary string: Bish.pdb source: AJ5zYYsisA.exe |
Source: global traffic | HTTP traffic detected: GET /Bish2.exe HTTP/1.1Host: dddotx.shopConnection: Keep-Alive |
Source: Joe Sandbox View | IP Address: 188.114.97.3 188.114.97.3 |
Source: Joe Sandbox View | IP Address: 188.114.97.3 188.114.97.3 |
Source: Joe Sandbox View | JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: Network traffic | Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:49704 -> 188.114.97.3:443 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /Bish2.exe HTTP/1.1Host: dddotx.shopConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: dddotx.shop |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 02:39:40 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCache-Control: max-age=14400CF-Cache-Status: EXPIREDReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MLRzVkZxkBwlscSIHoKu7G3bKcMDiKHppTREQI9MbpXXy9Q7zHLzffJtsaFhsKqGumd0MHiR5pBUwZtiM16DJMH0TbcJIvP7DZk9vYR%2F1jeztHl6CZSLmLBpqrg9og%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 900189a24c707cff-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2092&min_rtt=2056&rtt_var=844&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2826&recv_bytes=684&delivery_rate=1243611&cwnd=222&unsent_bytes=0&cid=8afedfee9c1450a5&ts=345&x=0" |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BB9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://dddotx.shop |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BB9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://dddotx.shopd |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop/Bish2.exe |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BD9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop/Bish2.exe: |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dddotx.shop/DLLL.dll |
Source: AJ5zYYsisA.exe | String found in binary or memory: https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exe |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: AJ5zYYsisA.exe, 00000000.00000000.2096425331.000000000088A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameBish.exe* vs AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107246528.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe | Binary or memory string: OriginalFilenameBish.exe* vs AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal72.winEXE@1/1@1/1 |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AJ5zYYsisA.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Mutant created: NULL |
Source: AJ5zYYsisA.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: AJ5zYYsisA.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: AJ5zYYsisA.exe | ReversingLabs: Detection: 57% |
Source: AJ5zYYsisA.exe | Virustotal: Detection: 70% |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: AJ5zYYsisA.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: AJ5zYYsisA.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: AJ5zYYsisA.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: Bish.pdbH source: AJ5zYYsisA.exe |
Source: | Binary string: Bish.pdb source: AJ5zYYsisA.exe |
Source: AJ5zYYsisA.exe | Static PE information: 0xEF72C5EC [Sat Apr 20 06:06:36 2097 UTC] |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: FA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: 2B40000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: 4B40000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe TID: 3128 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe TID: 5844 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: AJ5zYYsisA.exe, 00000000.00000002.2107246528.0000000000D95000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllzz |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Queries volume information: C:\Users\user\Desktop\AJ5zYYsisA.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |