Source: bxUX6ztvg2.exe |
Malware Configuration Extractor: AsyncRAT {"Server": "hicham157484.ddns.net", "Ports": "1995", "Version": "1.0.7 - modded by last", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "mxbtbWYTMLYT1fyOHeb8VPGWw24p2JuE", "Mutex": "885HDG564F5FGFG5DF400", "Certificate": "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", "ServerSignature": "Fi3dO3pXNbOSE8h9j6/HpDnw2ziCNp4GNtDWb2Tev2Y5YnJ5IMpzSjIOY3+smBIHBYCI1/i+AhUSAN9Py4zAGSwnxv7YlmLWjm+5izg9UsDpYKwuOg54erRyhEfpBQOI52FxX7VNjKyo5Ta2n2dKYqdQYBS48XHbSr2ar5bF7bo=", "BDOS": "null", "External_config_on_Pastebin": "false"} |
Source: bxUX6ztvg2.exe |
ReversingLabs: Detection: 78% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: bxUX6ztvg2.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor |
URLs: hicham157484.ddns.net |
Source: unknown |
DNS query: name: hicham157484.ddns.net |
Source: global traffic |
TCP traffic: 192.168.2.7:49701 -> 45.74.34.32:1995 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: hicham157484.ddns.net |
Source: bxUX6ztvg2.exe, 00000000.00000002.2498713896.00000248A247E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Yara match |
File source: bxUX6ztvg2.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Source: bxUX6ztvg2.exe, type: SAMPLE |
Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: bxUX6ztvg2.exe, type: SAMPLE |
Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: 00000000.00000002.2497616285.00000248A0505000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000000.00000002.2498713896.00000248A20C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Code function: 0_2_00007FFAACCC343E NtProtectVirtualMemory, |
0_2_00007FFAACCC343E |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Code function: 0_2_00007FFAACCC343E |
0_2_00007FFAACCC343E |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Code function: 0_2_00007FFAACCC0620 |
0_2_00007FFAACCC0620 |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Code function: 0_2_00007FFAACCC3CD1 |
0_2_00007FFAACCC3CD1 |
Source: bxUX6ztvg2.exe, 00000000.00000000.1242314850.00000248A0392000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameClient.exe" vs bxUX6ztvg2.exe |
Source: bxUX6ztvg2.exe |
Binary or memory string: OriginalFilenameClient.exe" vs bxUX6ztvg2.exe |
Source: bxUX6ztvg2.exe, type: SAMPLE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: bxUX6ztvg2.exe, type: SAMPLE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: 00000000.00000002.2497616285.00000248A0505000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000000.00000002.2498713896.00000248A20C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: bxUX6ztvg2.exe, Settings.cs |
Base64 encoded string: 'TjRkU67/d5wQS1SHsZR/2Lcd6N7XQau7sVhMZfzEb3ycrHELLaDZ/9X5q+GROsRKNaM1ixvmwMHytSNW+cvgqrrfuQxButJOv5Pi7OJldHQ=', 'yLg0Q4qOKjhXk6gl/4ajeIfC0eJLa91CiYczmqtP7VtqsxkMS6zVPdrMmg3I+/c+VGXIPLbJtE19UxKzUEx4nc/1wxj+aAOTCAQPtyWp7vw=', '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', 'oqKJ3LBuMSNHAejwL0Dr+12Hc/ZAPq0J+BILzPTsusaPG/uS2J4bsC6aIGxElK2evmU+K3Uf6krZi2vRosPuKg==', 'nQv63h7eULfx8FNgHK+iktpU1TqvVgMNecJrQfOZ0oeBgFlaKgDQlMCR0sidoUYFECcOoVEVYrbrznOi5lhR/w==', 'W6pZ/lSbhWe6OX7HayDUI0ODDKDFuH4cF9XjBeFxLhbzr1NrsW/EILOXNY6e0NJkTpIRjHHmQIdH11JaoaEB3Q==' |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@1/0@3/1 |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Mutant created: NULL |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Mutant created: \Sessions\1\BaseNamedObjects\885HDG564F5FGFG5DF400 |
Source: bxUX6ztvg2.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: bxUX6ztvg2.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80% |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: bxUX6ztvg2.exe |
ReversingLabs: Detection: 78% |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: bxUX6ztvg2.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: bxUX6ztvg2.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Code function: 0_2_00007FFAACCC1DE2 push ecx; iretd |
0_2_00007FFAACCC1DF4 |
Source: Yara match |
File source: bxUX6ztvg2.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: Yara match |
File source: bxUX6ztvg2.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Source: bxUX6ztvg2.exe |
Binary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Memory allocated: 248A06C0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Memory allocated: 248BA0C0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe TID: 7104 |
Thread sleep time: -90000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: bxUX6ztvg2.exe, 00000000.00000002.2498606049.00000248A1F90000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Process token adjusted: Debug |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Queries volume information: C:\Users\user\Desktop\bxUX6ztvg2.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\bxUX6ztvg2.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: Yara match |
File source: bxUX6ztvg2.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Source: bxUX6ztvg2.exe, 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: MSASCui.exe |
Source: bxUX6ztvg2.exe, 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: procexp.exe |
Source: bxUX6ztvg2.exe, 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: MsMpEng.exe |
Source: Yara match |
File source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR |