Windows Analysis Report
2qsdqACnX3.exe

Overview

General Information

Sample name: 2qsdqACnX3.exe
renamed because original name is a hash value
Original sample name: 73339cacdb37937c47ea7668ac3a1017.exe
Analysis ID: 1523193
MD5: 73339cacdb37937c47ea7668ac3a1017
SHA1: b32d273a752ad25173e26a110ae05acbabf3f15d
SHA256: d0abb0bd329f13afadfb0bbf6730f2233488b8c6c6f5e593d61d91b20fe8b772
Tags: exePonyuser-abuse_ch
Infos:

Detection

Pony
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Pony
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops / launches Pony Loader self-deletion script - malware possibly based on Pony Loader leaked source code
Machine Learning detection for sample
Pony trojan / infostealer detected
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
EvilPony, Ponyshe Privately modded version of the Pony stealer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.evilpony

AV Detection

barindex
Source: 2qsdqACnX3.exe Avira: detected
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack Malware Configuration Extractor: Pony {"C2 list": ["http://gunnylaumienphi2017.com/"]}
Source: 2qsdqACnX3.exe Virustotal: Detection: 77% Perma Link
Source: 2qsdqACnX3.exe ReversingLabs: Detection: 94%
Source: Yara match File source: 2qsdqACnX3.exe, type: SAMPLE
Source: Yara match File source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: 2qsdqACnX3.exe Joe Sandbox ML: detected
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040A2F4 lstrlenW,wsprintfA,wsprintfA,lstrlenW,CryptUnprotectData,LocalFree, 0_2_0040A2F4
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040CFA0 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmp,lstrcmp,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore, 0_2_0040CFA0
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040B818 CryptUnprotectData,LocalFree,lstrlen,StrCmpNIA,lstrlen,StrCmpNIA,lstrlen,StrCmpNIA, 0_2_0040B818
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040A54F CredEnumerateA,lstrlenW,CryptUnprotectData,LocalFree,CredFree, 0_2_0040A54F
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040A139 WideCharToMultiByte,lstrcmpiA,lstrcmpiA,lstrcmpiA,StrStrIA,CryptUnprotectData,LocalFree,CoTaskMemFree, 0_2_0040A139
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040CA1F lstrlen,CryptUnprotectData,LocalFree, 0_2_0040CA1F
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040A706 lstrlen,CryptUnprotectData,LocalFree, 0_2_0040A706
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00403FF9 CryptUnprotectData,LocalFree, 0_2_00403FF9
Source: 2qsdqACnX3.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00403DC3 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose, 0_2_00403DC3
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00404E00 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose, 0_2_00404E00
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_004086C7 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose, 0_2_004086C7
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00404A90 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose, 0_2_00404A90
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00409414 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlen,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose, 0_2_00409414
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00408543 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose, 0_2_00408543
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ Jump to behavior

Networking

barindex
Source: Malware configuration extractor URLs: http://gunnylaumienphi2017.com/
Source: 2qsdqACnX3.exe, 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp String found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: 2qsdqACnX3.exe String found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/abe2869f-9b47-4cd9-a358-c22904dba7f7Microsoft_WinInet_*ftp://Software\Adobe\CommonSiteServersSiteServer %d\HostSiteServer %d\WebUrlSiteServer %d\Remote DirectorySiteServer %d-UserSiteServer %d-User PW%s\KeychainSiteServer %d\SFTPDeluxeFTPsites.xmlWeb DataLogin DataSQLite format 3table() CONSTRAINTPRIMARYUNIQUECHECKFOREIGNloginsorigin_urlpassword_valueusername_valueftp://http://https://\Google\Chrome\Chromium\ChromePlusSoftware\ChromePlusInstall_Dir\Bromium\Nichrome\Comodo\RockMeltK-Meleon\K-Meleon\ProfilesEpic\Epic\EpicStaff-FTPsites.ini\Sites\Visicom Media.ftpSettings\Global DownloaderSM.archFreshFTP.SMFBlazeFtpsite.datLastPasswordLastAddressLastUserLastPortSoftware\FlashPeak\BlazeFtp\Settings\BlazeFtp.fplFTP++.Link\shell\open\commandGoFTPConnections.txt3D-FTPsites.ini\3D-FTP\SiteDesignerSOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32EasyFTP\NetSarang.xfp.rdpTERMSRV/*password 51:b:username:s:full address:s:.TERMSRV/FTP NowFTPNowsites.xmlSOFTWARE\Robo-FTP 3.7\ScriptsSOFTWARE\Robo-FTP 3.7\FTPServersFTP CountFTP File%dPasswordServerNameUserIDInitialDirectoryPortNumberServerType equals www.facebook.com (Facebook)
Source: 2qsdqACnX3.exe String found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: 2qsdqACnX3.exe String found in binary or memory: ftp://http://https://ftp.fireFTPsites.datSeaMonkey
Source: 2qsdqACnX3.exe String found in binary or memory: http://gunnylaumienphi2017.com/
Source: 2qsdqACnX3.exe String found in binary or memory: http://gunnylaumienphi2017.com/YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
Source: 2qsdqACnX3.exe String found in binary or memory: http://https://ftp://operawand.dat_Software
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: 2qsdqACnX3.exe, 00000000.00000002.2034670536.0000000000711000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: 2qsdqACnX3.exe, 00000000.00000002.2034670536.0000000000711000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
Source: 2qsdqACnX3.exe, 00000000.00000002.2034670536.0000000000711000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: 2qsdqACnX3.exe, 00000000.00000003.2012707709.0000000000766000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

E-Banking Fraud

barindex
Source: Yara match File source: 2qsdqACnX3.exe, type: SAMPLE
Source: Yara match File source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR

System Summary

barindex
Source: 2qsdqACnX3.exe, type: SAMPLE Matched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
Source: 2qsdqACnX3.exe, type: SAMPLE Matched rule: Identify Pony Author: Brian Wallace @botnet_hunter
Source: 2qsdqACnX3.exe, type: SAMPLE Matched rule: Fareit Payload Author: kevoreilly
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Identify Pony Author: Brian Wallace @botnet_hunter
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Fareit Payload Author: kevoreilly
Source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
Source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Identify Pony Author: Brian Wallace @botnet_hunter
Source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Fareit Payload Author: kevoreilly
Source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
Source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Identify Pony Author: Brian Wallace @botnet_hunter
Source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
Source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Identify Pony Author: Brian Wallace @botnet_hunter
Source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR Matched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
Source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR Matched rule: Identify Pony Author: Brian Wallace @botnet_hunter
Source: Signatures Results : All Signatures
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_004104C9 0_2_004104C9
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00402CD2 0_2_00402CD2
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: String function: 00403F6E appears 51 times
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: String function: 00401B46 appears 139 times
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: String function: 0041016C appears 42 times
Source: 2qsdqACnX3.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 2qsdqACnX3.exe, type: SAMPLE Matched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
Source: 2qsdqACnX3.exe, type: SAMPLE Matched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
Source: 2qsdqACnX3.exe, type: SAMPLE Matched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
Source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
Source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
Source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
Source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
Source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
Source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
Source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
Source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
Source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR Matched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
Source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR Matched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
Source: classification engine Classification label: mal100.troj.spyw.winEXE@5/1@0/0
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040CFA0 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmp,lstrcmp,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore, 0_2_0040CFA0
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040273D LookupPrivilegeValueA,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle, 0_2_0040273D
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00402ABC WTSGetActiveConsoleSessionId,CreateToolhelp32Snapshot,Process32First,StrStrIA,ProcessIdToSessionId,OpenProcess,OpenProcessToken,ImpersonateLoggedOnUser,RegOpenCurrentUser,CloseHandle,CloseHandle,CloseHandle,Process32Next,CloseHandle, 0_2_00402ABC
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040A457 CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree, 0_2_0040A457
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5572:120:WilError_03
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File created: C:\Users\user\AppData\Local\Temp\5990015.bat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\5990015.bat" "C:\Users\user\Desktop\2qsdqACnX3.exe" "
Source: 2qsdqACnX3.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File read: C:\Windows\win.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 2qsdqACnX3.exe, 00000000.00000003.2013000324.0000000000753000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: 2qsdqACnX3.exe Virustotal: Detection: 77%
Source: 2qsdqACnX3.exe ReversingLabs: Detection: 94%
Source: unknown Process created: C:\Users\user\Desktop\2qsdqACnX3.exe "C:\Users\user\Desktop\2qsdqACnX3.exe"
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\5990015.bat" "C:\Users\user\Desktop\2qsdqACnX3.exe" "
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\5990015.bat" "C:\Users\user\Desktop\2qsdqACnX3.exe" " Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: msi.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: pstorec.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: samlib.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040F9DE GetTickCount,wsprintfA,GetModuleFileNameA,GetTempPathA,lstrcat,ExitProcess,CreateFileA,lstrcpy,StrRChrIA,lstrcpy,ExitProcess,lstrlen,CloseHandle,wsprintfA,LoadLibraryA,GetProcAddress,ShellExecuteA, 0_2_0040F9DE

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File dump: 5990015.bat.0.dr 3880EEB1C736D853EB13B44898B718AB Jump to dropped file
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00403DC3 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose, 0_2_00403DC3
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00404E00 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose, 0_2_00404E00
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_004086C7 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose, 0_2_004086C7
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00404A90 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose, 0_2_00404A90
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00409414 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlen,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose, 0_2_00409414
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_00408543 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose, 0_2_00408543
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040421A GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo, 0_2_0040421A
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ Jump to behavior
Source: 2qsdqACnX3.exe, 00000000.00000002.2034670536.0000000000711000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltt3d
Source: 2qsdqACnX3.exe, 00000000.00000002.2034670536.0000000000711000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: 2qsdqACnX3.exe, 00000000.00000002.2034670536.0000000000711000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: C:\Users\user\Desktop\2qsdqACnX3.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040F9DE GetTickCount,wsprintfA,GetModuleFileNameA,GetTempPathA,lstrcat,ExitProcess,CreateFileA,lstrcpy,StrRChrIA,lstrcpy,ExitProcess,lstrlen,CloseHandle,wsprintfA,LoadLibraryA,GetProcAddress,ShellExecuteA, 0_2_0040F9DE
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040F566 mov eax, dword ptr fs:[00000030h] 0_2_0040F566
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040FF45 SetUnhandledExceptionFilter,RevertToSelf, 0_2_0040FF45
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040FCA6 lstrcmpiA,LogonUserA,lstrlen,LCMapStringA,LogonUserA,LogonUserA,746D1B10,ImpersonateLoggedOnUser,RevertToSelf,746C5030,CloseHandle, 0_2_0040FCA6
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\5990015.bat" "C:\Users\user\Desktop\2qsdqACnX3.exe" " Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_004040EF AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_004040EF
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo, 0_2_0040421A
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040FE97 OleInitialize,GetUserNameA, 0_2_0040FE97
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: 0_2_0040421A GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo, 0_2_0040421A

Stealing of Sensitive Information

barindex
Source: Yara match File source: 2qsdqACnX3.exe, type: SAMPLE
Source: Yara match File source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Martin Prikryl Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journal Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\INSoftware\NovaFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Quick.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\SharedSettings.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\SiteDesigner\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FlashFXP\3\History.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Sites.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\SharedSettings_1_0_5.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\SmartFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\RhinoSoft.com\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\SharedSettings.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\TurboFTP Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\BlazeFtp\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\AceBIT Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\RhinoSoft.com\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\LeapWare\LeapFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\LeapWare\LeapFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GPSoftware\Directory Opus\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\AceBIT Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FlashFXP\4\Sites.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\NetSarang\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FTPInfo\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GHISLER\wcx_ftp.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FileZilla\filezilla.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GHISLER\wcx_ftp.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\CoffeeCup Software\SharedSettings.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\LeapWare\LeapFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\RhinoSoft.com\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\SharedSettings_1_0_5.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\SharedSettings.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GHISLER\wcx_ftp.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\BlazeFtp\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\ExpanDrive\drives.js Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FlashFXP\4\Sites.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\INSoftware\NovaFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FTP Explorer\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FTPGetter\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Quick.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FTPInfo\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FileZilla\sitemanager.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Sites.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FTP Explorer\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\TurboFTP Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\SmartFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224 Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\INSoftware\NovaFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\FTP Explorer\Profiles Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\Frigate3\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\MAS-Soft\FTPInfo\Setup Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FlashFXP\3\Quick.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FileZilla\sitemanager.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\CoffeeCup Software\SharedSettings.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\TurboFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\Frigate3\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FlashFXP\3\Sites.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FTPRush\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GPSoftware\Directory Opus\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GPSoftware\Directory Opus\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FTPGetter\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GlobalSCAPE\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FlashFXP\3\Quick.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\Estsoft\ALFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FTPRush\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\ExpanDrive\drives.js Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\ExpanDrive\drives.js Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FlashFXP\4\Quick.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\TurboFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\AceBIT\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\TurboFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\Estsoft\ALFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\BlazeFtp\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\SharedSettings.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FlashFXP\3\Sites.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FlashFXP\4\History.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\SharedSettings.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\AceBIT\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FlashFXP\3\History.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GlobalSCAPE\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\AceBIT\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\SharedSettings.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Windows\32BitFtp.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FTPGetter\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Estsoft\ALFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\wcx_ftp.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FlashFXP\4\Quick.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\NetSarang\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\3D-FTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FTP Explorer\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\NetSarang\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FileZilla\filezilla.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FTPRush\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.sqlite Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\FlashFXP\4\History.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FlashFXP\3\History.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\CuteFTP\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FTPInfo\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: HKEY_LOCAL_MACHINE\Software\TurboFTP Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\FlashFXP\4\History.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Local\Frigate3\ Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Windows\wcx_ftp.ini Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\sm.dat Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\filezilla.xml Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe File opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.ccs Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Jump to behavior
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, PopPassword 0_2_0040E785
Source: C:\Users\user\Desktop\2qsdqACnX3.exe Code function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, SmtpPassword 0_2_0040E785
Source: Yara match File source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 2qsdqACnX3.exe, type: SAMPLE
Source: Yara match File source: 0.2.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.0.2qsdqACnX3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2008897794.0000000000411000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2033191158.0000000000411000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 2qsdqACnX3.exe PID: 6632, type: MEMORYSTR
No contacted IP infos