Windows Analysis Report
file.exe

Overview

General Information

Sample name: file.exe
Analysis ID: 1546257
MD5: 87514bcfa421057dc1575ec1630d78ff
SHA1: 012029171ff901f1cb5495059da47143d193923c
SHA256: 50c263fc02412062ca239e7419880678f797408a243d0a2140bc7bbb96a716c1
Tags: exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score: 84
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

AV Detection

barindex
Source: C:\Users\Public\Netstat\bild.exe ReversingLabs: Detection: 28%
Source: C:\Users\Public\Netstat\remcmdstub.exe ReversingLabs: Detection: 13%
Source: file.exe ReversingLabs: Detection: 52%
Source: Submited Sample Integrated Neural Analysis Model: Matched 99.6% probability
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary, 1_2_110AD570
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\Public\Netstat\msvcr100.dll Jump to behavior
Source: file.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: msvcr100.i386.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132472852.000000006D081000.00000020.00000001.01000000.0000000C.sdmp, msvcr100.dll.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.4132684538.0000000073AF2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: TCCTL32.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.4132607275.000000006E545000.00000002.00000001.01000000.0000000D.sdmp, pcicapi.dll.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: TCCTL32.DLL.0.dr
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482040BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF7482040BC
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74821B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF74821B190
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74822FCA0 FindFirstFileExA, 0_2_00007FF74822FCA0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess, 1_2_1102D330
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA, 1_2_11065890
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError, 1_2_1106A0A0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle, 1_2_111266E0

Networking

barindex
Source: Network traffic Suricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49736 -> 172.86.117.97:443
Source: global traffic HTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox View IP Address: 104.26.1.231 104.26.1.231
Source: Joe Sandbox View ASN Name: QUICKPACKETUS QUICKPACKETUS
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 13.89.179.12:443
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49739
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49738
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.117.97
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.117.97
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.117.97
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
Source: global traffic DNS traffic detected: DNS query: geo.netsupportsoftware.com
Source: unknown HTTP traffic detected: POST http://172.86.117.97/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 172.86.117.97Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
Source: bild.exe, bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr String found in binary or memory: http://%s/fakeurl.htm
Source: bild.exe, bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr String found in binary or memory: http://%s/testpage.htm
Source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr String found in binary or memory: http://%s/testpage.htmwininet.dll
Source: bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://127.0.0.1
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://127.0.0.1RESUMEPRINTING
Source: remcmdstub.exe.0.dr String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: remcmdstub.exe.0.dr String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: remcmdstub.exe.0.dr String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
Source: remcmdstub.exe.0.dr String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: remcmdstub.exe.0.dr String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
Source: bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspXL-
Source: bild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asphM
Source: bild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspx
Source: remcmdstub.exe.0.dr String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: remcmdstub.exe.0.dr String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: remcmdstub.exe.0.dr String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: remcmdstub.exe.0.dr String found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: remcmdstub.exe.0.dr String found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://s2.symcb.com0
Source: remcmdstub.exe.0.dr String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: remcmdstub.exe.0.dr String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: remcmdstub.exe.0.dr String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: remcmdstub.exe.0.dr String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://sv.symcb.com/sv.crl0f
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://sv.symcb.com/sv.crt0
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://sv.symcd.com0&
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://www.pci.co.uk/support
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr String found in binary or memory: http://www.pci.co.uk/supportsupport
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://www.symauth.com/cps0(
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: http://www.symauth.com/rpa00
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: https://d.symcb.com/cps0%
Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.dr String found in binary or memory: https://d.symcb.com/rpa0
Source: remcmdstub.exe.0.dr String found in binary or memory: https://www.globalsign.com/repository/0
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard, 1_2_1101F6B0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard, 1_2_1101F6B0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree, 1_2_110321E0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor, 1_2_110076F0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState, 1_2_11113880
Source: Yara match File source: 0.3.file.exe.28755e7b820.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7444, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: bild.exe PID: 7544, type: MEMORYSTR
Source: Yara match File source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA, 1_2_111158B0
Source: C:\Users\Public\Netstat\bild.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481FC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF7481FC2F0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec, 1_2_1115DB40
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess, 1_2_1102D330
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481FF930 0_2_00007FF7481FF930
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748204928 0_2_00007FF748204928
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481F5E24 0_2_00007FF7481F5E24
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74821CE88 0_2_00007FF74821CE88
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748211F20 0_2_00007FF748211F20
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74821B190 0_2_00007FF74821B190
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748213484 0_2_00007FF748213484
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820A4AC 0_2_00007FF74820A4AC
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748220754 0_2_00007FF748220754
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820C96C 0_2_00007FF74820C96C
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748213964 0_2_00007FF748213964
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482289A0 0_2_00007FF7482289A0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748201A48 0_2_00007FF748201A48
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74822FA94 0_2_00007FF74822FA94
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481F1AA4 0_2_00007FF7481F1AA4
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748212AB0 0_2_00007FF748212AB0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748235AF8 0_2_00007FF748235AF8
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820BB90 0_2_00007FF74820BB90
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748205B60 0_2_00007FF748205B60
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748214B98 0_2_00007FF748214B98
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748228C1C 0_2_00007FF748228C1C
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748212D58 0_2_00007FF748212D58
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748218DF4 0_2_00007FF748218DF4
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748220754 0_2_00007FF748220754
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820AF18 0_2_00007FF74820AF18
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748232080 0_2_00007FF748232080
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820F180 0_2_00007FF74820F180
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482121D0 0_2_00007FF7482121D0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481F7288 0_2_00007FF7481F7288
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820126C 0_2_00007FF74820126C
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481FA310 0_2_00007FF7481FA310
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481FC2F0 0_2_00007FF7481FC2F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482153F0 0_2_00007FF7482153F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748232550 0_2_00007FF748232550
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820B534 0_2_00007FF74820B534
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481F76C0 0_2_00007FF7481F76C0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481F4840 0_2_00007FF7481F4840
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74822C838 0_2_00007FF74822C838
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110733B0 1_2_110733B0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11029590 1_2_11029590
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11061C90 1_2_11061C90
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11033010 1_2_11033010
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11163220 1_2_11163220
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11167485 1_2_11167485
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110454F0 1_2_110454F0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1101B760 1_2_1101B760
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_111258B0 1_2_111258B0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1101BBA0 1_2_1101BBA0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11087C60 1_2_11087C60
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11070090 1_2_11070090
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11080480 1_2_11080480
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1115E980 1_2_1115E980
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1101C9C0 1_2_1101C9C0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110088AB 1_2_110088AB
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11050D80 1_2_11050D80
Source: C:\Users\Public\Netstat\bild.exe Process token adjusted: Security Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 11146450 appears 577 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 110278E0 appears 47 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 1116F010 appears 36 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 11029450 appears 916 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 111603E3 appears 40 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 1105DD10 appears 286 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 11081BB0 appears 42 times
Source: C:\Users\Public\Netstat\bild.exe Code function: String function: 11164010 appears 32 times
Source: file.exe, 00000000.00000003.1674930174.0000028755FE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs file.exe
Source: classification engine Classification label: mal84.rans.evad.winEXE@3/12@1/2
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7481FB6D8 GetLastError,FormatMessageW,LocalFree, 0_2_00007FF7481FB6D8
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges, 1_2_1109D440
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1109D4D0 AdjustTokenPrivileges,CloseHandle, 1_2_1109D4D0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize, 1_2_11115B70
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748218624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree, 0_2_00007FF748218624
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError, 1_2_11127E10
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Mutant created: NULL
Source: file.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exe File read: C:\Windows\win.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: file.exe ReversingLabs: Detection: 52%
Source: C:\Users\user\Desktop\file.exe File read: C:\Users\user\Desktop\file.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dxgidebug.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: riched20.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: usp10.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: pcicl32.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: pcichek.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: pcicapi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: msvcr100.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: dbghelp.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: dbgcore.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: nsmtrace.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: nslsp.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: pcihooks.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: riched32.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: riched20.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: usp10.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: pciinv.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: firewallapi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: fwbase.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: fwpolicyiomgr.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\file.exe File written: C:\Users\Public\Netstat\client32.ini Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe File opened: C:\Windows\SysWOW64\riched32.dll Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: file.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: file.exe Static file information: File size 2283549 > 1048576
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\Public\Netstat\msvcr100.dll Jump to behavior
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: msvcr100.i386.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132472852.000000006D081000.00000020.00000001.01000000.0000000C.sdmp, msvcr100.dll.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.4132684538.0000000073AF2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: TCCTL32.DLL.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.4132607275.000000006E545000.00000002.00000001.01000000.0000000D.sdmp, pcicapi.dll.0.dr
Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: TCCTL32.DLL.0.dr
Source: file.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary, 1_2_11029590
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\__tmp_rar_sfx_access_check_4657734 Jump to behavior
Source: file.exe Static PE information: section name: .didat
Source: file.exe Static PE information: section name: _RDATA
Source: PCICL32.DLL.0.dr Static PE information: section name: .hhshare
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748235156 push rsi; retf 0_2_00007FF748235157
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748235166 push rsi; retf 0_2_00007FF748235167
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1116F055 push ecx; ret 1_2_1116F068
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11169F49 push ecx; ret 1_2_11169F5C
Source: msvcr100.dll.0.dr Static PE information: section name: .text entropy: 6.909044922675825
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\TCCTL32.DLL Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\msvcr100.dll Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\pcicapi.dll Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\remcmdstub.exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\bild.exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\HTCTL32.DLL Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\PCICHEK.DLL Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\Public\Netstat\PCICL32.DLL Jump to dropped file
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError, 1_2_11127E10
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary, 1_2_11139090
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows, 1_2_1115B1D0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt, 1_2_11113290
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos, 1_2_110CB2B0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos, 1_2_110CB2B0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer, 1_2_110254A0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId, 1_2_110258F0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer, 1_2_11023BA0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId, 1_2_11024280
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11112670 IsIconic,GetTickCount, 1_2_11112670
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA, 1_2_111229D0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA, 1_2_111229D0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId, 1_2_110C0BB0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop, 1_2_1115ADD0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop, 1_2_1115ADD0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 1_2_11143570
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110B8200 Sleep,ExitProcess, 1_2_110B8200
Source: C:\Users\Public\Netstat\bild.exe Window / User API: threadDelayed 430 Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Window / User API: threadDelayed 7976 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Dropped PE file which has not been started: C:\Users\Public\Netstat\TCCTL32.DLL Jump to dropped file
Source: C:\Users\user\Desktop\file.exe Dropped PE file which has not been started: C:\Users\Public\Netstat\remcmdstub.exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe Dropped PE file which has not been started: C:\Users\Public\Netstat\HTCTL32.DLL Jump to dropped file
Source: C:\Users\Public\Netstat\bild.exe Evaded block: after key decision
Source: C:\Users\Public\Netstat\bild.exe Evaded block: after key decision
Source: C:\Users\Public\Netstat\bild.exe Evaded block: after key decision
Source: C:\Users\Public\Netstat\bild.exe Evaded block: after key decision
Source: C:\Users\Public\Netstat\bild.exe Evasive API call chain: GetLocalTime,DecisionNodes
Source: C:\Users\Public\Netstat\bild.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\Public\Netstat\bild.exe API coverage: 5.9 %
Source: C:\Users\Public\Netstat\bild.exe TID: 7572 Thread sleep time: -73500s >= -30000s Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe TID: 7576 Thread sleep time: -43000s >= -30000s Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe TID: 7572 Thread sleep time: -1994000s >= -30000s Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Users\Public\Netstat\bild.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482040BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF7482040BC
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74821B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF74821B190
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74822FCA0 FindFirstFileExA, 0_2_00007FF74822FCA0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess, 1_2_1102D330
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA, 1_2_11065890
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError, 1_2_1106A0A0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle, 1_2_111266E0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482216A4 VirtualQuery,GetSystemInfo, 0_2_00007FF7482216A4
Source: HTCTL32.DLL.0.dr Binary or memory string: VMware
Source: bild.exe, 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW7
Source: HTCTL32.DLL.0.dr Binary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
Source: TCCTL32.DLL.0.dr Binary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
Source: bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4130928430.000000000089E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: HTCTL32.DLL.0.dr Binary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
Source: TCCTL32.DLL.0.dr Binary or memory string: VMWare
Source: C:\Users\Public\Netstat\bild.exe API call chain: ExitProcess graph end node
Source: C:\Users\Public\Netstat\bild.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748223170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF748223170
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState, 1_2_11147750
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary, 1_2_11029590
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748230D20 GetProcessHeap, 0_2_00007FF748230D20
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748223170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF748223170
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748223354 SetUnhandledExceptionFilter, 0_2_00007FF748223354
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748222510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00007FF748222510
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF7482276D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7482276D8
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle, 1_2_11093080
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter, 1_2_110310C0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 1_2_11161D01
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 1_2_1116DD89
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError, 1_2_110F4560
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74821B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF74821B190
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event, 1_2_1111FCA0
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe" Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent, 1_2_1109E190
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid, 1_2_1109E910
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr Binary or memory string: Shell_TrayWndunhandled plugin data, id=%d
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr Binary or memory string: Shell_TrayWnd
Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr Binary or memory string: Progman
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF74820DC70 cpuid 0_2_00007FF74820DC70
Source: C:\Users\user\Desktop\file.exe Code function: GetLocaleInfoW,GetNumberFormatW, 0_2_00007FF74821A2CC
Source: C:\Users\Public\Netstat\bild.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 1_2_11173A35
Source: C:\Users\Public\Netstat\bild.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 1_2_11173D69
Source: C:\Users\Public\Netstat\bild.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 1_2_11173CC6
Source: C:\Users\Public\Netstat\bild.exe Code function: GetLocaleInfoA, 1_2_1116B38E
Source: C:\Users\Public\Netstat\bild.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 1_2_11173933
Source: C:\Users\Public\Netstat\bild.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 1_2_111739DA
Source: C:\Users\Public\Netstat\bild.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 1_2_1117383E
Source: C:\Users\Public\Netstat\bild.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 1_2_11173D2D
Source: C:\Users\Public\Netstat\bild.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 1_2_11173C06
Source: C:\Users\Public\Netstat\bild.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree, 1_2_110F33F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748220754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, 0_2_00007FF748220754
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA, 1_2_1103B160
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte, 1_2_11174AE9
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00007FF748204EB0 GetVersionExW, 0_2_00007FF748204EB0
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep, 1_2_11070090
Source: C:\Users\Public\Netstat\bild.exe Code function: 1_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError, 1_2_110D8200
Source: Yara match File source: 1.0.bild.exe.c40000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.c40000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.73af0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.6e540000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.file.exe.28755e7b820.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.6ce90000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 7444, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: bild.exe PID: 7544, type: MEMORYSTR
Source: Yara match File source: C:\Users\Public\Netstat\PCICHEK.DLL, type: DROPPED
Source: Yara match File source: C:\Users\Public\Netstat\pcicapi.dll, type: DROPPED
Source: Yara match File source: C:\Users\Public\Netstat\bild.exe, type: DROPPED
Source: Yara match File source: C:\Users\Public\Netstat\HTCTL32.DLL, type: DROPPED
Source: Yara match File source: C:\Users\Public\Netstat\TCCTL32.DLL, type: DROPPED
Source: Yara match File source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs