Windows Analysis Report
H1pXo79CPd

Overview

General Information

Sample name: H1pXo79CPd
renamed because original name is a hash value
Original sample name: 21716bb1c51f01b8ed87151fe565c1d20e837a7a2121567db7915d7f8f6e633d
Analysis ID: 1524372
MD5: cfdf53f247859f70b66c15ad037463d6
SHA1: bf644a6a32b9eb6dda2e55119af2692d51421e57
SHA256: 21716bb1c51f01b8ed87151fe565c1d20e837a7a2121567db7915d7f8f6e633d
Infos:

Detection

GhostRat
Score: 84
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GhostRat
Allocates memory in foreign processes
Drops executables to the windows directory (C:\Windows) and starts them
Writes to foreign memory regions
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates COM task schedule object (often to register a task for autostart)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Installs a global mouse hook
One or more processes crash
Queries information about the installed CPU (vendor, model number etc)
Uses 32bit PE files

Classification

AV Detection

barindex
Source: C:\Recovery\nw_elf.dll Avira: detection malicious, Label: TR/Crypt.Agent.tfakp
Source: C:\Recovery\nw_elf.dll Avira: detection malicious, Label: TR/Crypt.Agent.avqrq
Source: C:\Recovery\nw_elf.dll Avira: detection malicious, Label: TR/Crypt.Agent.tfakp
Source: C:\Recovery\nw_elf.dll Avira: detection malicious, Label: TR/Crypt.Agent.avqrq
Source: C:\Recovery\nw_elf.dll ReversingLabs: Detection: 37%
Source: C:\Windows\nw_elf.dll ReversingLabs: Detection: 58%
Source: H1pXo79CPd ReversingLabs: Detection: 75%
Source: H1pXo79CPd Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: H1pXo79CPd Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\ClientDaemon.exe File opened: z:
Source: C:\Windows\ClientDaemon.exe File opened: x:
Source: C:\Windows\ClientDaemon.exe File opened: v:
Source: C:\Windows\ClientDaemon.exe File opened: t:
Source: C:\Windows\ClientDaemon.exe File opened: r:
Source: C:\Windows\ClientDaemon.exe File opened: p:
Source: C:\Windows\ClientDaemon.exe File opened: n:
Source: C:\Windows\ClientDaemon.exe File opened: l:
Source: C:\Windows\ClientDaemon.exe File opened: j:
Source: C:\Windows\ClientDaemon.exe File opened: h:
Source: C:\Windows\ClientDaemon.exe File opened: f:
Source: C:\Windows\ClientDaemon.exe File opened: b:
Source: C:\Windows\ClientDaemon.exe File opened: y:
Source: C:\Windows\ClientDaemon.exe File opened: w:
Source: C:\Windows\ClientDaemon.exe File opened: u:
Source: C:\Windows\ClientDaemon.exe File opened: s:
Source: C:\Windows\ClientDaemon.exe File opened: q:
Source: C:\Windows\ClientDaemon.exe File opened: o:
Source: C:\Windows\ClientDaemon.exe File opened: m:
Source: C:\Windows\ClientDaemon.exe File opened: k:
Source: C:\Windows\ClientDaemon.exe File opened: i:
Source: C:\Windows\ClientDaemon.exe File opened: g:
Source: C:\Windows\ClientDaemon.exe File opened: e:
Source: C:\Windows\SysWOW64\WerFault.exe File opened: c:
Source: C:\Windows\ClientDaemon.exe File opened: [:
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 111.67.195.167:8085
Source: global traffic TCP traffic: 192.168.2.16:49711 -> 103.118.253.78:8099
Source: unknown TCP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown TCP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown TCP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown TCP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown UDP traffic detected without corresponding DNS query: 111.67.195.167
Source: unknown TCP traffic detected without corresponding DNS query: 103.118.253.78
Source: unknown TCP traffic detected without corresponding DNS query: 103.118.253.78
Source: unknown TCP traffic detected without corresponding DNS query: 103.118.253.78
Source: C:\Recovery\ClientDaemon.exe Windows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dll
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: c:\windows\ClientDaemon.exe
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: c:\windows\nw_elf.dll
Source: C:\Recovery\ClientDaemon.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7068 -s 1220
Source: H1pXo79CPd Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal84.troj.evad.win@6/11@0/39
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6372
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7068
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\44fdfb13-a9b5-418e-873b-1d695687a27c
Source: H1pXo79CPd Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: H1pXo79CPd ReversingLabs: Detection: 75%
Source: unknown Process created: C:\Users\user\Desktop\H1pXo79CPd.exe "C:\Users\user\Desktop\H1pXo79CPd.exe"
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Process created: C:\Recovery\ClientDaemon.exe C:\recovery\ClientDaemon.exe
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Process created: C:\Recovery\ClientDaemon.exe C:\recovery\ClientDaemon.exe
Source: C:\Recovery\ClientDaemon.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7068 -s 1220
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Process created: C:\Windows\ClientDaemon.exe C:\windows\ClientDaemon.exe
Source: C:\Windows\ClientDaemon.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 1196
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Section loaded: apphelp.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: nw_elf.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: winmm.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: version.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: cryptbase.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: dinput8.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: inputhost.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: coremessaging.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: propsys.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: wintypes.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: coreuicomponents.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: ntmarta.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: kernel.appcore.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: kernel.appcore.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: netapi32.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: mswsock.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: napinsp.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: pnrpnsp.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: wshbth.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: nlaapi.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: iphlpapi.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: dnsapi.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: winrnr.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: fwpuclnt.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: rasadhlp.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: uxtheme.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: ddraw.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: dxgi.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: dciman32.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: d3d10warp.dll
Source: C:\Recovery\ClientDaemon.exe Section loaded: dxcore.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: nw_elf.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: winmm.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: version.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: cryptbase.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: dinput8.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: inputhost.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: coremessaging.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: propsys.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: wintypes.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: coreuicomponents.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: ntmarta.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: netapi32.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: mswsock.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: napinsp.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: pnrpnsp.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: wshbth.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: nlaapi.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: iphlpapi.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: dnsapi.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: winrnr.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: rasadhlp.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: uxtheme.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: ddraw.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: dxgi.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: dciman32.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: d3d10warp.dll
Source: C:\Windows\ClientDaemon.exe Section loaded: dxcore.dll
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Section loaded: taskschd.dll
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Section loaded: sspicli.dll
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Section loaded: xmllite.dll
Source: C:\Recovery\ClientDaemon.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7B70EE0-4340-11CF-B063-0020AFC2CD35}\InprocServer32
Source: H1pXo79CPd Static file information: File size 5196288 > 1048576
Source: H1pXo79CPd Static PE information: section name: RT_CURSOR
Source: H1pXo79CPd Static PE information: section name: RT_BITMAP
Source: H1pXo79CPd Static PE information: section name: RT_ICON
Source: H1pXo79CPd Static PE information: section name: RT_MENU
Source: H1pXo79CPd Static PE information: section name: RT_DIALOG
Source: H1pXo79CPd Static PE information: section name: RT_STRING
Source: H1pXo79CPd Static PE information: section name: RT_ACCELERATOR
Source: H1pXo79CPd Static PE information: section name: RT_GROUP_ICON
Source: H1pXo79CPd Static PE information: Raw size of .data is bigger than: 0x100000 < 0x2fba00
Source: H1pXo79CPd Static PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x1aee00
Source: H1pXo79CPd Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: H1pXo79CPd Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: H1pXo79CPd Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: H1pXo79CPd Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: H1pXo79CPd Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: H1pXo79CPd Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Executable created and started: c:\windows\ClientDaemon.exe
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: C:\Windows\ClientDaemon.exe Jump to dropped file
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: C:\Recovery\nw_elf.dll Jump to dropped file
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: C:\Windows\nw_elf.dll Jump to dropped file
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: C:\Windows\ClientDaemon.exe Jump to dropped file
Source: C:\Users\user\Desktop\H1pXo79CPd.exe File created: C:\Windows\nw_elf.dll Jump to dropped file
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\ClientDaemon.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Recovery\ClientDaemon.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Windows\ClientDaemon.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Process information queried: ProcessInformation
Source: C:\Recovery\ClientDaemon.exe Process queried: DebugPort
Source: C:\Windows\ClientDaemon.exe Process queried: DebugPort

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Memory allocated: C:\Windows\ClientDaemon.exe base: 47B0000 protect: page read and write
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Memory written: C:\Windows\ClientDaemon.exe base: 47B0000
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Memory written: C:\Windows\ClientDaemon.exe base: 480E2D8
Source: C:\Users\user\Desktop\H1pXo79CPd.exe Memory written: C:\Windows\ClientDaemon.exe base: 480F1E8
Source: C:\Recovery\ClientDaemon.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Windows\ClientDaemon.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000003.00000002.1411391226.0000000006480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: 00000003.00000002.1411391226.0000000006480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs