Source: VALUESearchUpdater.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: unknown |
HTTPS traffic detected: 3.36.251.235:443 -> 192.168.2.7:49703 version: TLS 1.2 |
Source: VALUESearchUpdater.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View |
JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49704 -> 3.36.251.235:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49703 -> 3.36.251.235:443 |
Source: Network traffic |
Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.7:49959 |
Source: Network traffic |
Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.7:49746 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
HTTP traffic detected: GET /files/publish/xlllibver.txt HTTP/1.1Connection: Keep-AliveAccept: application/json, text/plain, */*Accept-Charset: utf-8Accept-Language: ko-KRUser-Agent: Zewus AgentHost: valuesearch.co.kr |
Source: global traffic |
HTTP traffic detected: GET /files/publish/valuesearchn.zip HTTP/1.1Connection: Keep-AliveAccept: application/json, text/plain, */*Accept-Charset: utf-8Accept-Language: ko-KRUser-Agent: Zewus AgentHost: valuesearch.co.kr |
Source: global traffic |
DNS traffic detected: DNS query: valuesearch.co.kr |
Source: global traffic |
HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 31 Oct 2024 18:46:02 GMTContent-Type: text/html; charset=utf-8Content-Length: 45Connection: closeServer: VALUESearch - 1.95.0.1581 |
Source: VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000CB8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/ |
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000CB8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/70 |
Source: VALUESearchUpdater.exe |
String found in binary or memory: https://valuesearch.co.kr/files/publish/ |
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298375804.000000000291B000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/files/publish/valuesearchn.zip |
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/files/publish/valuesearchn.zipGN |
Source: VALUESearchUpdater.exe |
String found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txt |
Source: VALUESearchUpdater.exe, 00000000.00000003.1262311074.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txtC |
Source: VALUESearchUpdater.exe, 00000000.00000003.1262311074.0000000000C81000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txttia |
Source: unknown |
Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown |
HTTPS traffic detected: 3.36.251.235:443 -> 192.168.2.7:49703 version: TLS 1.2 |
Source: VALUESearchUpdater.exe |
Static PE information: Number of sections : 11 > 10 |
Source: VALUESearchUpdater.exe, 00000000.00000003.1298375804.000000000293C000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs VALUESearchUpdater.exe |
Source: VALUESearchUpdater.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: clean3.winEXE@1/1@1/1 |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
File created: C:\Users\user\Desktop\valuesearchn.zip |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: VALUESearchUpdater.exe |
String found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip |
Source: VALUESearchUpdater.exe |
String found in binary or memory: application/vnd.groove-help |
Source: VALUESearchUpdater.exe |
String found in binary or memory: "application/x-install-instructions |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Excel\AddIns\VALUESearch.XLL\ |
Jump to behavior |
Source: VALUESearchUpdater.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: VALUESearchUpdater.exe |
Static file information: File size 3151872 > 1048576 |
Source: VALUESearchUpdater.exe |
Static PE information: Raw size of .text is bigger than: 0x100000 < 0x290400 |
Source: VALUESearchUpdater.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: VALUESearchUpdater.exe |
Static PE information: section name: .didata |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe TID: 7484 |
Thread sleep time: -30000s >= -30000s |
Jump to behavior |
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299182990.0000000000C62000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000C9E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |