Source: STRDY.exe |
Virustotal: Detection: 38% |
Perma Link |
Source: STRDY.exe |
ReversingLabs: Detection: 39% |
Source: 0.0.STRDY.exe.880000.0.unpack |
Avira: Label: TR/Dropper.MSIL.Gen |
Source: STRDY.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED |
Source: C:\Users\user\Desktop\STRDY.exe |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll |
Jump to behavior |
Source: STRDY.exe |
Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: STRDY.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED |
Source: STRDY.exe, 00000000.00000002.667867261.0000000000C79000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamemscorwks.dllT vs STRDY.exe |
Source: STRDY.exe, 00000000.00000002.667793557.000000000088E000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenametest.exe4 vs STRDY.exe |
Source: STRDY.exe |
Binary or memory string: OriginalFilenametest.exe4 vs STRDY.exe |
Source: C:\Users\user\Desktop\STRDY.exe |
Code function: 0_2_00007FFA35F308F2 |
0_2_00007FFA35F308F2 |
Source: C:\Users\user\Desktop\STRDY.exe |
Code function: 0_2_00007FFA35F3000A |
0_2_00007FFA35F3000A |
Source: STRDY.exe |
Virustotal: Detection: 38% |
Source: STRDY.exe |
ReversingLabs: Detection: 39% |
Source: STRDY.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\STRDY.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\STRDY.exe "C:\Users\user\Desktop\STRDY.exe" |
Source: C:\Users\user\Desktop\STRDY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6048:120:WilError_01 |
Source: C:\Users\user\Desktop\STRDY.exe |
File created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\STRDY.exe.log |
Jump to behavior |
Source: classification engine |
Classification label: mal68.evad.winEXE@2/1@0/0 |
Source: STRDY.exe, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 0.0.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: STRDY.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: C:\Users\user\Desktop\STRDY.exe |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll |
Jump to behavior |
Source: STRDY.exe |
Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: STRDY.exe, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0) |
Source: 0.2.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0) |
Source: 0.0.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0) |
Source: C:\Users\user\Desktop\STRDY.exe |
Code function: 0_2_00885E26 push 00000003h; ret |
0_2_00885E2C |
Source: STRDY.exe, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
High entropy of concatenated method names: '.cctor', 'sXrElhk7vmD8v', 'KoERPmWRW2', 'G3GRDa0qvt', 'gGSRSXbuCh', 'aP8RlNMxmU', 'TqPR9RrNBN', 'ajCRqNgqoA', 'HHqRZmDjky', 'i5cRgkNmqw' |
Source: STRDY.exe, projFUD/PA.cs |
High entropy of concatenated method names: 'Main', 'ReverseString', 'BinaryToString', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'Execute', '.cctor', 'QUIDDOLkKVFGth5pU2', 'pDmIUDtbAb40ykJ8os' |
Source: 0.2.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
High entropy of concatenated method names: '.cctor', 'sXrElhk7vmD8v', 'KoERPmWRW2', 'G3GRDa0qvt', 'gGSRSXbuCh', 'aP8RlNMxmU', 'TqPR9RrNBN', 'ajCRqNgqoA', 'HHqRZmDjky', 'i5cRgkNmqw' |
Source: 0.2.STRDY.exe.880000.0.unpack, projFUD/PA.cs |
High entropy of concatenated method names: 'Main', 'ReverseString', 'BinaryToString', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'Execute', '.cctor', 'QUIDDOLkKVFGth5pU2', 'pDmIUDtbAb40ykJ8os' |
Source: 0.0.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
High entropy of concatenated method names: '.cctor', 'sXrElhk7vmD8v', 'KoERPmWRW2', 'G3GRDa0qvt', 'gGSRSXbuCh', 'aP8RlNMxmU', 'TqPR9RrNBN', 'ajCRqNgqoA', 'HHqRZmDjky', 'i5cRgkNmqw' |
Source: 0.0.STRDY.exe.880000.0.unpack, projFUD/PA.cs |
High entropy of concatenated method names: 'Main', 'ReverseString', 'BinaryToString', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'Execute', '.cctor', 'QUIDDOLkKVFGth5pU2', 'pDmIUDtbAb40ykJ8os' |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe TID: 6148 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\STRDY.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\STRDY.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: STRDY.exe, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
Reference to suspicious API methods: ('gFwRs55Bjr', 'GetProcAddress@kernel32'), ('z4TRG2i3UQ', 'LoadLibrary@kernel32') |
Source: STRDY.exe, projFUD/PA.cs |
Reference to suspicious API methods: ('LoadLibraryA', 'LoadLibraryA@kernel32'), ('GetProcAddress', 'GetProcAddress@kernel32') |
Source: 0.2.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
Reference to suspicious API methods: ('gFwRs55Bjr', 'GetProcAddress@kernel32'), ('z4TRG2i3UQ', 'LoadLibrary@kernel32') |
Source: 0.2.STRDY.exe.880000.0.unpack, projFUD/PA.cs |
Reference to suspicious API methods: ('LoadLibraryA', 'LoadLibraryA@kernel32'), ('GetProcAddress', 'GetProcAddress@kernel32') |
Source: 0.0.STRDY.exe.880000.0.unpack, hsnLdkMtt9W3LiVovy/dlLFmbU8fZgjw22Fes.cs |
Reference to suspicious API methods: ('gFwRs55Bjr', 'GetProcAddress@kernel32'), ('z4TRG2i3UQ', 'LoadLibrary@kernel32') |
Source: 0.0.STRDY.exe.880000.0.unpack, projFUD/PA.cs |
Reference to suspicious API methods: ('LoadLibraryA', 'LoadLibraryA@kernel32'), ('GetProcAddress', 'GetProcAddress@kernel32') |