Source: Yara match | File source: conn.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.900577885.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: conn.exe PID: 7148, type: MEMORY |
Source: Yara match | File source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: freegeoip.net |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: api.ipify.org |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: api.ipify.org |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: api.ipify.org |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: api.ipify.org |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: api.ipify.org |
Source: C:\Users\user\Desktop\conn.exe | DNS query: name: api.ipify.org |
Source: global traffic | HTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: telize.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.netConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /shutdown HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.net |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: api.ipify.orgConnection: Keep-Alive |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 139.196.56.98 |
Source: global traffic | HTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: telize.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.netConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /shutdown HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.net |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: api.ipify.orgConnection: Keep-Alive |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://api.ipify.org |
Source: conn.exe | String found in binary or memory: http://api.ipify.org/ |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://api.ipify.org46k |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://elb097307-934924932.us-east-1.elb.amazonaws.com |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://freegeoip.net |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://freegeoip.net/shutdown |
Source: conn.exe | String found in binary or memory: http://freegeoip.net/xml/ |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://freegeoip.net46k |
Source: conn.exe, 00000000.00000002.901221628.00000000028DA000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: conn.exe, 00000000.00000002.901221628.00000000028DA000.00000004.00000001.sdmp | String found in binary or memory: http://telize.com |
Source: conn.exe | String found in binary or memory: http://telize.com/geoip |
Source: conn.exe, 00000000.00000002.901221628.00000000028DA000.00000004.00000001.sdmp | String found in binary or memory: http://telize.com46k |
Source: conn.exe, 00000000.00000002.901243141.0000000002903000.00000004.00000001.sdmp | String found in binary or memory: http://www.telize.com |
Source: conn.exe, 00000000.00000002.901235346.00000000028ED000.00000004.00000001.sdmp | String found in binary or memory: http://www.telize.com/geoip |
Source: conn.exe, 00000000.00000002.901235346.00000000028ED000.00000004.00000001.sdmp | String found in binary or memory: http://www.telize.com46kPI |
Source: Yara match | File source: conn.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.900577885.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: conn.exe PID: 7148, type: MEMORY |
Source: Yara match | File source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: conn.exe, type: SAMPLE | Matched rule: Detects Vermin Keylogger Author: Florian Roth |
Source: conn.exe, type: SAMPLE | Matched rule: Detects Patchwork malware Author: Florian Roth |
Source: conn.exe, type: SAMPLE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: conn.exe, type: SAMPLE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: conn.exe, type: SAMPLE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp, type: MEMORY | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 00000000.00000002.900577885.0000000000452000.00000002.00020000.sdmp, type: MEMORY | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Vermin Keylogger Author: Florian Roth |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Patchwork malware Author: Florian Roth |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Vermin Keylogger Author: Florian Roth |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Patchwork malware Author: Florian Roth |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: conn.exe | Binary or memory string: OriginalFilename vs conn.exe |
Source: conn.exe, 00000000.00000002.901695641.0000000005B20000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs conn.exe |
Source: conn.exe, 00000000.00000002.900651387.00000000008F9000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameUNKNOWN_FILET vs conn.exe |
Source: conn.exe, 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp | Binary or memory string: OriginalFilename4 vs conn.exe |
Source: conn.exe | Binary or memory string: OriginalFilename4 vs conn.exe |
Source: conn.exe, type: SAMPLE | Matched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: conn.exe, type: SAMPLE | Matched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: conn.exe, type: SAMPLE | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: conn.exe, type: SAMPLE | Matched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740 |
Source: conn.exe, type: SAMPLE | Matched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp, type: MEMORY | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.900577885.0000000000452000.00000002.00020000.sdmp, type: MEMORY | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740 |
Source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740 |
Source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE | Matched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: conn.exe, ???????u0afa??uee22ued94??u28a9?????.cs | Base64 encoded string: 'RrkItsYIo01Eval3oghDHLkgz+OJKZtJqaLZqCovNfm0L3cyulJ9MBtdWC08PPL1' |
Source: 0.0.conn.exe.450000.0.unpack, ???????u0afa??uee22ued94??u28a9?????.cs | Base64 encoded string: 'RrkItsYIo01Eval3oghDHLkgz+OJKZtJqaLZqCovNfm0L3cyulJ9MBtdWC08PPL1' |
Source: 0.2.conn.exe.450000.0.unpack, ???????u0afa??uee22ued94??u28a9?????.cs | Base64 encoded string: 'RrkItsYIo01Eval3oghDHLkgz+OJKZtJqaLZqCovNfm0L3cyulJ9MBtdWC08PPL1' |
Source: 0.2.conn.exe.450000.0.unpack, uaaf1??????u24c6????????????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 0.2.conn.exe.450000.0.unpack, uaaf1??????u24c6????????????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 0.0.conn.exe.450000.0.unpack, uaaf1??????u24c6????????????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 0.0.conn.exe.450000.0.unpack, uaaf1??????u24c6????????????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: conn.exe, uaaf1??????u24c6????????????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: conn.exe, uaaf1??????u24c6????????????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: conn.exe, 00000000.00000002.901695641.0000000005B20000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: conn.exe, 00000000.00000002.901695641.0000000005B20000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: conn.exe, 00000000.00000002.901695641.0000000005B20000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: conn.exe, 00000000.00000002.901695641.0000000005B20000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: conn.exe, ?u3213???????uf8b1?????u24d5?ufffd??.cs | Reference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('????????????????????', 'GetProcAddress@kernel32.dll') |
Source: conn.exe, ?u248euecb2???u0f2c?????u1aaa??????ue030.cs | Reference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll') |
Source: 0.0.conn.exe.450000.0.unpack, ?u248euecb2???u0f2c?????u1aaa??????ue030.cs | Reference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll') |
Source: 0.0.conn.exe.450000.0.unpack, ?u3213???????uf8b1?????u24d5?ufffd??.cs | Reference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('????????????????????', 'GetProcAddress@kernel32.dll') |
Source: 0.2.conn.exe.450000.0.unpack, ?u3213???????uf8b1?????u24d5?ufffd??.cs | Reference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('????????????????????', 'GetProcAddress@kernel32.dll') |
Source: 0.2.conn.exe.450000.0.unpack, ?u248euecb2???u0f2c?????u1aaa??????ue030.cs | Reference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll') |
Source: conn.exe, 00000000.00000002.901011178.0000000001300000.00000002.00000001.sdmp | Binary or memory string: Program Manager |
Source: conn.exe, 00000000.00000002.901011178.0000000001300000.00000002.00000001.sdmp | Binary or memory string: Shell_TrayWnd |
Source: conn.exe, 00000000.00000002.901011178.0000000001300000.00000002.00000001.sdmp | Binary or memory string: Progman |
Source: conn.exe, 00000000.00000002.901011178.0000000001300000.00000002.00000001.sdmp | Binary or memory string: Progmanlock |
Source: C:\Users\user\Desktop\conn.exe | Queries volume information: C:\Users\user\Desktop\conn.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\conn.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: conn.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.900577885.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: conn.exe PID: 7148, type: MEMORY |
Source: Yara match | File source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: conn.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.636242521.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.900577885.0000000000452000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: conn.exe PID: 7148, type: MEMORY |
Source: Yara match | File source: 0.2.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.conn.exe.450000.0.unpack, type: UNPACKEDPE |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.