Source: VALUESearch.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: unknown |
HTTPS traffic detected: 3.39.130.246:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: VALUESearch.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View |
JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 3.39.130.246:443 |
Source: Network traffic |
Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49705 |
Source: Network traffic |
Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:60823 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
HTTP traffic detected: GET /files/publish/xlllibver.txt HTTP/1.1Connection: Keep-AliveAccept: application/jsonAccept-Charset: utf-8Accept-Language: ko-KRUser-Agent: Zewus AgentHost: valuesearch.co.kr |
Source: global traffic |
DNS traffic detected: DNS query: valuesearch.co.kr |
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/8 |
Source: VALUESearch.exe |
String found in binary or memory: https://valuesearch.co.kr/files/publish/ |
Source: VALUESearch.exe |
String found in binary or memory: https://valuesearch.co.kr/files/publish/VALUESearchUpdater.exe |
Source: VALUESearch.exe |
String found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txt |
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000B25000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr:443/files/publish/xlllibver.txt |
Source: unknown |
Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown |
HTTPS traffic detected: 3.39.130.246:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: VALUESearch.exe |
Static PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant) |
Source: VALUESearch.exe |
Static PE information: Number of sections : 11 > 10 |
Source: VALUESearch.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: clean4.winEXE@1/0@1/1 |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Mutant created: \Sessions\1\BaseNamedObjects\VS |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: VALUESearch.exe |
String found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip |
Source: VALUESearch.exe |
String found in binary or memory: application/vnd.groove-help |
Source: VALUESearch.exe |
String found in binary or memory: "application/x-install-instructions |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: olepro32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Excel\AddIns\VALUESearch.XLL\ |
Jump to behavior |
Source: VALUESearch.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: VALUESearch.exe |
Static file information: File size 3837952 > 1048576 |
Source: VALUESearch.exe |
Static PE information: Raw size of .text is bigger than: 0x100000 < 0x2e0200 |
Source: VALUESearch.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: VALUESearch.exe |
Static PE information: section name: .didata |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000B25000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000AC7000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW0v |
Source: C:\Users\user\Desktop\VALUESearch.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |