Windows Analysis Report
REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe

Overview

General Information

Sample name: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe
Analysis ID: 1527850
MD5: e34eb26af335bd435c40f82b3f8b48d0
SHA1: e4b7b90c3cdb4e3db62544d0117454def485964c
SHA256: 92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471
Tags: exeVenomRATuser-adrian__luca
Infos:

Detection

AsyncRAT, StormKitty, VenomRAT
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected BrowserPasswordDump
Yara detected StormKitty Stealer
Yara detected VenomRAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
AsyncRAT AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
Name Description Attribution Blogpost URLs Link
Cameleon, StormKitty PWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon

AV Detection

barindex
Source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: VenomRAT {"Server": "72.11.142.133", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber v6.0.3", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "bqVDnhhGfGvMpWbEN1YbQaKARWqpElTx", "Mutex": "orkxnmmqoswplswmucl", "Certificate": "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", "ServerSignature": "GzGasbOjKU7WJFPiyLCsHK1uv7QlCRJQdBKdorfjTOokGzWuz1tV8GwFF3wkQwDX6C4DBOFFIjfY7WkTf4VRBj5btV2+p+qkSUYxN/5hyqV4I8ggzyPIOpGcxBypMHIDlRl16SGRV2tCF0K2ZMZhhkMlysp5Il5nqV4Mqfy3IQ4=", "BDOS": "null"}
Source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: AsyncRAT {"Server": "72.11.142.133", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber v6.0.3", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "bqVDnhhGfGvMpWbEN1YbQaKARWqpElTx", "Mutex": "orkxnmmqoswplswmucl", "Certificate": "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", "ServerSignature": "GzGasbOjKU7WJFPiyLCsHK1uv7QlCRJQdBKdorfjTOokGzWuz1tV8GwFF3wkQwDX6C4DBOFFIjfY7WkTf4VRBj5btV2+p+qkSUYxN/5hyqV4I8ggzyPIOpGcxBypMHIDlRl16SGRV2tCF0K2ZMZhhkMlysp5Il5nqV4Mqfy3IQ4=", "BDOS": "null", "External_config_on_Pastebin": "true"}
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe ReversingLabs: Detection: 36%
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Virustotal: Detection: 37% Perma Link
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Virustotal: Detection: 37% Perma Link
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe ReversingLabs: Detection: 36%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Joe Sandbox ML: detected
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Joe Sandbox ML: detected
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: C:\Users\fastf\Desktop\Venom RAT + HVNC New Update\NNProject\Binaries\Release\Plugins\Recovery.pdb source: RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: wntdll.pdbUGP source: bankrupture.exe, 00000002.00000003.2079432135.0000000004120000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000002.00000003.2078819169.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194873153.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194511707.0000000004180000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: bankrupture.exe, 00000002.00000003.2079432135.0000000004120000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000002.00000003.2078819169.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194873153.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194511707.0000000004180000.00000004.00001000.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, 0_2_00452126
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, 0_2_0045C999
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, 0_2_00436ADE
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00434BEE
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0045DD7C FindFirstFileW,FindClose, 0_2_0045DD7C
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, 0_2_0044BD29
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, 0_2_00436D2D
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00442E1F
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_00475FE5
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_0044BF8D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, 2_2_00452126
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, 2_2_0045C999
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, 2_2_00436ADE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00434BEE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0045DD7C FindFirstFileW,FindClose, 2_2_0045DD7C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, 2_2_0044BD29
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, 2_2_00436D2D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00442E1F
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 2_2_00475FE5
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, 2_2_0044BF8D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, 5_2_00452126
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, 5_2_0045C999
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, 5_2_00436ADE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 5_2_00434BEE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0045DD7C FindFirstFileW,FindClose, 5_2_0045DD7C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, 5_2_0044BD29
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, 5_2_00436D2D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 5_2_00442E1F
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 5_2_00475FE5
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, 5_2_0044BF8D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 4x nop then inc dword ptr [ebp-30h] 3_2_06FC0040
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 4x nop then jmp 07001CD9h 3_2_07001A08
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 4x nop then jmp 07001CD9h 3_2_07001A08
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 4x nop then jmp 072ED78Bh 3_2_072ED600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 4x nop then inc dword ptr [ebp-30h] 3_2_072ECCF0

Networking

barindex
Source: Network traffic Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 72.11.142.133:4449 -> 192.168.2.5:49706
Source: Network traffic Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 72.11.142.133:4449 -> 192.168.2.5:49704
Source: Network traffic Suricata IDS: 2052265 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (VenomRAT) : 72.11.142.133:4449 -> 192.168.2.5:49704
Source: Network traffic Suricata IDS: 2052267 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (VenomRAT) : 72.11.142.133:4449 -> 192.168.2.5:49704
Source: global traffic TCP traffic: 192.168.2.5:49704 -> 72.11.142.133:4449
Source: Joe Sandbox View ASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: unknown TCP traffic detected without corresponding DNS query: 72.11.142.133
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile, 0_2_0044289D
Source: RegSvcs.exe, 00000003.00000002.4491447304.0000000005138000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: RegSvcs.exe, 00000003.00000002.4491190786.0000000005060000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.3.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: http://james.newtonking.com/projects/json
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: https://github.com/LimerBoy/StormKitty
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/LimerBoy/StormKitty0&eq
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://support.mozilla.org
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
Source: RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: https://urn.to/r/sds_see
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://www.ecosia.org/newtab/
Source: RegSvcs.exe, 00000003.00000002.4488029672.0000000003B5A000.00000004.00000800.00020000.00000000.sdmp, tmp9B0.tmp.dat.3.dr, tmp920.tmp.dat.3.dr String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4493632299.0000000006274000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
Source: places.raw.3.dr, tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
Source: tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: places.raw.3.dr, tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
Source: places.raw.3.dr, tmpA6E.tmp.dat.3.dr String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.newtonsoft.com/jsonschema
Source: RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.RegSvcs.exe.1e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 3452, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 5044, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5640, type: MEMORYSTR
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, Keylogger.cs .Net Code: KeyboardLayout
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, Keylogger.cs .Net Code: KeyboardLayout
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard, 0_2_0046C5D0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_00459FFF
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 2_2_00459FFF
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 5_2_00459FFF
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard, 0_2_0046C5D0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW, 0_2_00456354
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_0047C08E
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 2_2_0047C08E
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 5_2_0047C08E

Operating System Destruction

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: 01 00 00 00 Jump to behavior

System Summary

barindex
Source: 5.2.bankrupture.exe.3640000.1.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 6.2.RegSvcs.exe.1e0000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 2.2.bankrupture.exe.3f40000.1.unpack, type: UNPACKEDPE Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: C:\Windows\System32\wscript.exe COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_029732C8 NtProtectVirtualMemory, 3_2_029732C8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_02972E73 NtProtectVirtualMemory, 3_2_02972E73
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 6_2_048B32D0 NtProtectVirtualMemory, 6_2_048B32D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 6_2_048B2E80 NtProtectVirtualMemory, 6_2_048B2E80
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle, 0_2_00434D50
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_004461ED
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, 0_2_004364AA
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, 2_2_004364AA
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, 5_2_004364AA
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00409A40 0_2_00409A40
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00412038 0_2_00412038
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00427161 0_2_00427161
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0047E1FA 0_2_0047E1FA
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004212BE 0_2_004212BE
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00443390 0_2_00443390
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00443391 0_2_00443391
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0041A46B 0_2_0041A46B
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0041240C 0_2_0041240C
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00446566 0_2_00446566
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004045E0 0_2_004045E0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0041D750 0_2_0041D750
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004037E0 0_2_004037E0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00427859 0_2_00427859
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00412818 0_2_00412818
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040F890 0_2_0040F890
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0042397B 0_2_0042397B
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00411B63 0_2_00411B63
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0047CBF0 0_2_0047CBF0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044EBBC 0_2_0044EBBC
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00412C38 0_2_00412C38
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044ED9A 0_2_0044ED9A
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00423EBF 0_2_00423EBF
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00424F70 0_2_00424F70
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0041AF0D 0_2_0041AF0D
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_03D33FB0 0_2_03D33FB0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00409A40 2_2_00409A40
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00412038 2_2_00412038
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00427161 2_2_00427161
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0047E1FA 2_2_0047E1FA
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004212BE 2_2_004212BE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00443390 2_2_00443390
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00443391 2_2_00443391
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0041A46B 2_2_0041A46B
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0041240C 2_2_0041240C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00446566 2_2_00446566
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004045E0 2_2_004045E0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0041D750 2_2_0041D750
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004037E0 2_2_004037E0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00427859 2_2_00427859
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00412818 2_2_00412818
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0040F890 2_2_0040F890
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0042397B 2_2_0042397B
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00411B63 2_2_00411B63
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0047CBF0 2_2_0047CBF0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0044EBBC 2_2_0044EBBC
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00412C38 2_2_00412C38
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0044ED9A 2_2_0044ED9A
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00423EBF 2_2_00423EBF
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00424F70 2_2_00424F70
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0041AF0D 2_2_0041AF0D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_03BF2FB0 2_2_03BF2FB0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_029726F8 3_2_029726F8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_029726E7 3_2_029726E7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_02972E73 3_2_02972E73
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FCF4A8 3_2_06FCF4A8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FCC598 3_2_06FCC598
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FC0589 3_2_06FC0589
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FCB510 3_2_06FCB510
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FCC589 3_2_06FCC589
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FC0040 3_2_06FC0040
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FC0035 3_2_06FC0035
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FF6748 3_2_06FF6748
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FF2D38 3_2_06FF2D38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FF3A80 3_2_06FF3A80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FFA000 3_2_06FFA000
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FF96F8 3_2_06FF96F8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FF9FF1 3_2_06FF9FF1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FFD548 3_2_06FFD548
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FFD538 3_2_06FFD538
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072EEF10 3_2_072EEF10
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072E98A8 3_2_072E98A8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072E5748 3_2_072E5748
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072E5741 3_2_072E5741
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072EAD32 3_2_072EAD32
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072ECCF0 3_2_072ECCF0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072E987F 3_2_072E987F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_072E78D8 3_2_072E78D8
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00409A40 5_2_00409A40
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00412038 5_2_00412038
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00427161 5_2_00427161
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0047E1FA 5_2_0047E1FA
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004212BE 5_2_004212BE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00443390 5_2_00443390
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00443391 5_2_00443391
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0041A46B 5_2_0041A46B
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0041240C 5_2_0041240C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00446566 5_2_00446566
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004045E0 5_2_004045E0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0041D750 5_2_0041D750
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004037E0 5_2_004037E0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00427859 5_2_00427859
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00412818 5_2_00412818
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0040F890 5_2_0040F890
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0042397B 5_2_0042397B
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00411B63 5_2_00411B63
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0047CBF0 5_2_0047CBF0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0044EBBC 5_2_0044EBBC
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00412C38 5_2_00412C38
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0044ED9A 5_2_0044ED9A
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00423EBF 5_2_00423EBF
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00424F70 5_2_00424F70
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0041AF0D 5_2_0041AF0D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_03C91FB8 5_2_03C91FB8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 6_2_048B2700 6_2_048B2700
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 6_2_048B2E80 6_2_048B2E80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 6_2_048B26F0 6_2_048B26F0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: String function: 00445975 appears 65 times
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: String function: 0041171A appears 37 times
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: String function: 0041718C appears 45 times
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: String function: 0040E6D0 appears 35 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 00425210 appears 58 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 00445975 appears 130 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 0041171A appears 74 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 0041832D appears 52 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 004136BC appears 36 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 004092C0 appears 50 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 0041718C appears 90 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 00401B70 appears 46 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 0040E6D0 appears 70 times
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: String function: 0043362D appears 38 times
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: 5.2.bankrupture.exe.3640000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 6.2.RegSvcs.exe.1e0000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 2.2.bankrupture.exe.3f40000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, Settings.cs Base64 encoded string: 'yueyueiybEl/DDJjs//zIc7cjh50rJvvsgt+JX5YX1P2/2ehmgKTToSM3Re+6DoIvSk9nvyrk71DPSkZ/fNGkQ==', 'o1gRUa5jIUtrpbwmVMgS4RMY/e/ioOpciaShQVAeQKn89JckfE5cTq9ethghdbEVefZwREgUgPllGUlGnzLpqZxIIGNmjr1517evCHXWsJI=', '+LghagZvpzfiubVLn1yxNZwMDX7YeHAX5MSDelGjQ5nBlQkYOVocTlEF2oZ+rpZsC5etw6BaZkO/brF2P3GmfV9f5S0QpHBCLsWXi9EYwbPckv82KmYR3GxKd+bw/AoiZMHPeU5TjI5d7WawUBrZfSjYH99v/ZLztYJPDFtFauopaVrzomywlrs+uFSl1Q0qogZrAiZkm7rVooOPdDFTZUeyWtYMPmJRa2+X25+jNP0NjaJmIShVpRkYd0TEZM75gKdF4FW+tSh3FSocLaowlXQYV9SuHF80jqCCtZuSKZ1dKO7179snuJ4eyOM4TzkFg/3n6Uo0aWciyGMfRzqNhN89HzfvrMMook59pXgLvoPzrQIWmNbx6Hx89Sok5mEibv5b8MeZY9sqy+OLTnJ63CETFYhcHtwpWmbeIiz5q+tfk9v98sZoV/jM7pJu2Df0jJj1rSsQnxz3TeHopHj5gWyqKMgmKvvXc/664M69y5D/ZgV4F7eHqpJcXZDgm2kx/3aV7XGhgBow3cxLKSJwUvTMynKQ1sEEyMwcLOiGK6sPUHvdue2DxlZzyd6SPu3LSDEQaaGqS0ziVAbWk3fg/Ujfi1YTEdAowguZLpNkQDROt4D7oyhzK/3VecpMj/QISdcRP96Ogb+QACrRgdW67/1/OyyDdCqi9i7IP+GTbjDVD9PvI3gP5Ou/4UuVjCOKoDERbSYzZfCZo6BnlqPi4bk5dLW8TAS92qrXlkjD5qQGeGS4sEFPPY9l/7gjxOthukIg/6quTKD9s0+g+ZIQ03qSMyTpt3VQ6lL+2P1uiUDMR99q9H+b2pjIDuwZy4Puuu+IOlRBcMN0JwbE6earTW1idjH0e0tCMcTR7OulEp6k1cpMgnYApfy6gnIKONct1yzr3Gie2dviCuQ/J6axiII+Em/ekFLpTM51Lv4lJLqoQMpiRH8+Vk/NnQL87SsKQ20PACwagMGYPbxrbfpY49zU1v+JkK1/3naZMue3SL5UaBnqSxlO/zL8Zsqd+D9Oo0PbD2MjurkxpFU+PPfbFaab74pjGYpQtU7pU/Ita3yZm4lTGB9Jxpmu0DCkwE9Q', 'g479xHp/Gx6c7CjQmZ/5XnIJ52P6QGv2j/pfMTaM7Z3m/oMUOTIZ7KF5FKBdQhM4RXSQm766N/IJ5N5FJU8IPg==', 'LV2tuWGQbBcZtWRk4s40vzot3Mztlcs+eQoJxqlJltdI58Utee3Q0WaRumE7i4chVbjJdkutByPFZUDAYzmfcg==', 'mUTaku5JHPqg/hqYWE6TJQgVtwdhxyIv+KKSHefb7X4XgpLd1MsAAfU4Qnx32TZ4JX9BniBWZGnfqzHkRSglfw=='
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, Settings.cs Base64 encoded string: 'yueyueiybEl/DDJjs//zIc7cjh50rJvvsgt+JX5YX1P2/2ehmgKTToSM3Re+6DoIvSk9nvyrk71DPSkZ/fNGkQ==', 'o1gRUa5jIUtrpbwmVMgS4RMY/e/ioOpciaShQVAeQKn89JckfE5cTq9ethghdbEVefZwREgUgPllGUlGnzLpqZxIIGNmjr1517evCHXWsJI=', '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', 'g479xHp/Gx6c7CjQmZ/5XnIJ52P6QGv2j/pfMTaM7Z3m/oMUOTIZ7KF5FKBdQhM4RXSQm766N/IJ5N5FJU8IPg==', 'LV2tuWGQbBcZtWRk4s40vzot3Mztlcs+eQoJxqlJltdI58Utee3Q0WaRumE7i4chVbjJdkutByPFZUDAYzmfcg==', 'mUTaku5JHPqg/hqYWE6TJQgVtwdhxyIv+KKSHefb7X4XgpLd1MsAAfU4Qnx32TZ4JX9BniBWZGnfqzHkRSglfw=='
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, Methods.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, Methods.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, Methods.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, Methods.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: classification engine Classification label: mal100.troj.spyw.expl.evad.winEXE@10/19@0/1
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044AF5C GetLastError,FormatMessageW, 0_2_0044AF5C
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle, 0_2_00464422
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, 0_2_004364AA
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle, 2_2_00464422
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, 2_2_004364AA
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle, 5_2_00464422
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, 5_2_004364AA
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode, 0_2_0045D517
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle, 0_2_0043701F
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket, 0_2_0047A999
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx, 0_2_0043614F
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe File created: C:\Users\user\AppData\Local\overfertility Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Mutant created: NULL
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Mutant created: \Sessions\1\BaseNamedObjects\orkxnmmqoswplswmucl
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe File created: C:\Users\user\AppData\Local\Temp\Lymnaeidae Jump to behavior
Source: unknown Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs"
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002C15000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002FB5000.00000004.00000800.00020000.00000000.sdmp, tmp930.tmp.dat.3.dr, tmpB3C.tmp.dat.3.dr Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Virustotal: Detection: 37%
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe ReversingLabs: Detection: 36%
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe File read: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe "C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe"
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Process created: C:\Users\user\AppData\Local\overfertility\bankrupture.exe "C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe"
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe"
Source: unknown Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs"
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\overfertility\bankrupture.exe "C:\Users\user\AppData\Local\overfertility\bankrupture.exe"
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\overfertility\bankrupture.exe"
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Process created: C:\Users\user\AppData\Local\overfertility\bankrupture.exe "C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe" Jump to behavior
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\overfertility\bankrupture.exe "C:\Users\user\AppData\Local\overfertility\bankrupture.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\overfertility\bankrupture.exe" Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: iconcodecservice.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: iconcodecservice.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: vbscript.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: iconcodecservice.dll Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: Binary string: C:\Users\fastf\Desktop\Venom RAT + HVNC New Update\NNProject\Binaries\Release\Plugins\Recovery.pdb source: RegSvcs.exe, 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: wntdll.pdbUGP source: bankrupture.exe, 00000002.00000003.2079432135.0000000004120000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000002.00000003.2078819169.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194873153.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194511707.0000000004180000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: bankrupture.exe, 00000002.00000003.2079432135.0000000004120000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000002.00000003.2078819169.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194873153.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000003.2194511707.0000000004180000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, ClientSocket.cs .Net Code: Invoke System.AppDomain.Load(byte[])
Source: 5.2.bankrupture.exe.3640000.1.raw.unpack, ClientSocket.cs .Net Code: Invoke System.AppDomain.Load(byte[])
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040EB70 LoadLibraryA,GetProcAddress, 0_2_0040EB70
Source: bankrupture.exe.0.dr Static PE information: real checksum: 0xa2135 should be: 0xd2186
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Static PE information: real checksum: 0xa2135 should be: 0xd2186
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004171D1 push ecx; ret 0_2_004171E4
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004171D1 push ecx; ret 2_2_004171E4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_02973AD9 push ebx; retf 3_2_02973ADA
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FCA7A0 pushad ; retf 3_2_06FCA7A1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FCD1F0 pushfd ; ret 3_2_06FCD1FD
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_06FF6719 push es; ret 3_2_06FF6724
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_07100BCA push eax; ret 3_2_07100BCD
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004171D1 push ecx; ret 5_2_004171E4
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe File created: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Jump to dropped file

Boot Survival

barindex
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.RegSvcs.exe.1e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 3452, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 5044, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5640, type: MEMORYSTR
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs Jump to dropped file
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_004772DE
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_004375B0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 2_2_004772DE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput, 2_2_004375B0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 5_2_004772DE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput, 5_2_004375B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.RegSvcs.exe.1e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 3452, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 5044, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5640, type: MEMORYSTR
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00444078 0_2_00444078
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00444078 2_2_00444078
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00444078 5_2_00444078
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe API/Special instruction interceptor: Address: 3BF2BD4
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe API/Special instruction interceptor: Address: 3C91BDC
Source: bankrupture.exe, 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp Binary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Window / User API: threadDelayed 2304 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Window / User API: threadDelayed 7546 Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe API coverage: 3.1 %
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe API coverage: 3.4 %
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe API coverage: 3.2 %
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, 0_2_00452126
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, 0_2_0045C999
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, 0_2_00436ADE
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00434BEE
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0045DD7C FindFirstFileW,FindClose, 0_2_0045DD7C
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, 0_2_0044BD29
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, 0_2_00436D2D
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00442E1F
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_00475FE5
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_0044BF8D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, 2_2_00452126
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, 2_2_0045C999
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, 2_2_00436ADE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00434BEE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0045DD7C FindFirstFileW,FindClose, 2_2_0045DD7C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, 2_2_0044BD29
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, 2_2_00436D2D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 2_2_00442E1F
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 2_2_00475FE5
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, 2_2_0044BF8D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, 5_2_00452126
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, 5_2_0045C999
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, 5_2_00436ADE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 5_2_00434BEE
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0045DD7C FindFirstFileW,FindClose, 5_2_0045DD7C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, 5_2_0044BD29
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, 5_2_00436D2D
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 5_2_00442E1F
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 5_2_00475FE5
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, 5_2_0044BF8D
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0040E470
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Canara Transaction PasswordVMware20,11696428655x
Source: RegSvcs.exe, 00000003.00000002.4491190786.0000000005060000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWx
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: discord.comVMware20,11696428655f
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: interactivebrokers.co.inVMware20,11696428655d
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: global block list test formVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Canara Transaction PasswordVMware20,11696428655}
Source: RegSvcs.exe, 00000003.00000002.4491447304.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4491848841.0000000005156000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: account.microsoft.com/profileVMware20,11696428655u
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: www.interactivebrokers.comVMware20,11696428655}
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: outlook.office365.comVMware20,11696428655t
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x
Source: bankrupture.exe, 00000002.00000002.2080270686.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: -94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}w
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: outlook.office.comVMware20,11696428655s
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: ms.portal.azure.comVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: AMC password management pageVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: tasks.office.comVMware20,11696428655o
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: turbotax.intuit.comVMware20,11696428655t
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: interactivebrokers.comVMware20,11696428655
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe, 00000000.00000002.2059171524.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\,,
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: dev.azure.comVMware20,11696428655j
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: netportal.hdfcbank.comVMware20,11696428655
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Interactive Brokers - HKVMware20,11696428655]
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: bankofamerica.comVMware20,11696428655x
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h
Source: tmpB2B.tmp.dat.3.dr Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Code function: 3_2_0297F808 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk, 3_2_0297F808
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0045A259 BlockInput, 0_2_0045A259
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW, 0_2_0040D6D0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040EB70 LoadLibraryA,GetProcAddress, 0_2_0040EB70
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_03D32800 mov eax, dword ptr fs:[00000030h] 0_2_03D32800
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_03D33EA0 mov eax, dword ptr fs:[00000030h] 0_2_03D33EA0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_03D33E40 mov eax, dword ptr fs:[00000030h] 0_2_03D33E40
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_03BF1800 mov eax, dword ptr fs:[00000030h] 2_2_03BF1800
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_03BF2EA0 mov eax, dword ptr fs:[00000030h] 2_2_03BF2EA0
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_03BF2E40 mov eax, dword ptr fs:[00000030h] 2_2_03BF2E40
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_03C90808 mov eax, dword ptr fs:[00000030h] 5_2_03C90808
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_03C91EA8 mov eax, dword ptr fs:[00000030h] 5_2_03C91EA8
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_03C91E48 mov eax, dword ptr fs:[00000030h] 5_2_03C91E48
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock, 0_2_00426DA1
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0042202E SetUnhandledExceptionFilter, 0_2_0042202E
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_004230F5
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00417D93
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00421FA7
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0042202E SetUnhandledExceptionFilter, 2_2_0042202E
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_004230F5
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_00417D93
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_00421FA7
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0042202E SetUnhandledExceptionFilter, 5_2_0042202E
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_004230F5
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 5_2_00417D93
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 5_2_00421FA7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, Keylogger.cs Reference to suspicious API methods: MapVirtualKey(vkCode, 0u)
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, DInvokeCore.cs Reference to suspicious API methods: DynamicAPIInvoke("ntdll.dll", "NtProtectVirtualMemory", typeof(Delegates.NtProtectVirtualMemory), ref Parameters)
Source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, AntiProcess.cs Reference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Section loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BED008 Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 2F3008 Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0043916A LogonUserW, 0_2_0043916A
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW, 0_2_0040D6D0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_004375B0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event, 0_2_00436431
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe" Jump to behavior
Source: C:\Windows\System32\wscript.exe Process created: C:\Users\user\AppData\Local\overfertility\bankrupture.exe "C:\Users\user\AppData\Local\overfertility\bankrupture.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\overfertility\bankrupture.exe" Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_00445DD3
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002B89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002CE3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager@\]q
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002B89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002CE3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager
Source: bankrupture.exe Binary or memory string: Shell_TrayWnd
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002CE3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]qXc
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002CE3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]q8e
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002B89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4485595301.0000000002CE3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager@\]q&
Source: REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe, bankrupture.exe.0.dr Binary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]qT
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]q4
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B90000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]qp
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B90000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]qP
Source: RegSvcs.exe, 00000003.00000002.4485595301.0000000002B89000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerTe]q
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_00410D10 cpuid 0_2_00410D10
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_004223BC
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004711D2 GetUserNameW, 0_2_004711D2
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0040E470
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.RegSvcs.exe.1e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.bankrupture.exe.3640000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.bankrupture.exe.3f40000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 3452, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: bankrupture.exe PID: 5044, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5640, type: MEMORYSTR
Source: bankrupture.exe, 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp Binary or memory string: MSASCui.exe
Source: bankrupture.exe, 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp Binary or memory string: procexp.exe
Source: bankrupture.exe, 00000002.00000002.2081576290.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, bankrupture.exe, 00000005.00000002.2199992872.0000000003640000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2223813736.00000000001E2000.00000040.80000000.00040000.00000000.sdmp Binary or memory string: MsMpEng.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5896, type: MEMORYSTR
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4485595301.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4485595301.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5896, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: bankrupture.exe.0.dr Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
Source: bankrupture.exe Binary or memory string: WIN_XP
Source: bankrupture.exe Binary or memory string: WIN_XPe
Source: bankrupture.exe Binary or memory string: WIN_VISTA
Source: bankrupture.exe Binary or memory string: WIN_7
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4485595301.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4485595301.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5896, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5896, type: MEMORYSTR
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.RegSvcs.exe.7190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4485595301.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4485595301.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4497072356.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegSvcs.exe PID: 5896, type: MEMORYSTR
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_004741BB
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket, 0_2_0046483C
Source: C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe Code function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject, 0_2_0047AD92
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 2_2_004741BB
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket, 2_2_0046483C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 2_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject, 2_2_0047AD92
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 5_2_004741BB
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket, 5_2_0046483C
Source: C:\Users\user\AppData\Local\overfertility\bankrupture.exe Code function: 5_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject, 5_2_0047AD92
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs