Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Avira: detected |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Malware Configuration Extractor: Xworm {"C2 url": ["xworm1120.duckdns.org"], "Port": 1120, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V2.1"} |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
ReversingLabs: Detection: 84% |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Virustotal: Detection: 73% |
Perma Link |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Joe Sandbox ML: detected |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49738 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49738 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49732 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49732 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49730 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49730 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49739 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49739 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49815 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49815 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49783 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49783 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49747 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49747 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49915 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49915 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49850 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49850 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49978 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49978 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:50009 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:50009 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:50015 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:50015 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:50016 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:50016 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49880 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49880 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:50017 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:50017 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:50018 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:50018 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:49947 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49947 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852873 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 : 192.168.2.4:50019 -> 192.169.69.26:1120 |
Source: Network traffic |
Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:50019 -> 192.169.69.26:1120 |
Source: Malware configuration extractor |
URLs: xworm1120.duckdns.org |
Source: unknown |
DNS query: name: xworm1120.duckdns.org |
Source: Joe Sandbox View |
IP Address: 192.169.69.26 192.169.69.26 |
Source: Joe Sandbox View |
IP Address: 192.169.69.26 192.169.69.26 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: xworm1120.duckdns.org |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, 00000000.00000002.4123282927.0000000002521000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://exmple.com/Uploader.php |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, 00000000.00000002.4123282927.0000000002521000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Code function: 0_2_00007FFD9B875516 |
0_2_00007FFD9B875516 |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Code function: 0_2_00007FFD9B8762C2 |
0_2_00007FFD9B8762C2 |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, 00000000.00000000.1655301808.0000000000332000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamexworm1120.exe4 vs decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Binary or memory string: OriginalFilenamexworm1120.exe4 vs decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, Helper.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, Helper.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@1/0@4/1 |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Mutant created: NULL |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Mutant created: \Sessions\1\BaseNamedObjects\D0iCsL6PUuq7iVxc |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80% |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
ReversingLabs: Detection: 84% |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Virustotal: Detection: 73% |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 |
Jump to behavior |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, Helper.cs |
.Net Code: Plugin System.Reflection.Assembly.Load(byte[]) |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Memory allocated: A60000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Memory allocated: 1A520000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Window / User API: threadDelayed 2830 |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Window / User API: threadDelayed 7125 |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe TID: 6912 |
Thread sleep count: 2830 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe TID: 6912 |
Thread sleep time: -84900000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe TID: 6912 |
Thread sleep count: 7125 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe TID: 6912 |
Thread sleep time: -213750000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Thread delayed: delay time: 30000 |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Thread delayed: delay time: 30000 |
Jump to behavior |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, 00000000.00000002.4122482896.000000000080F000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Queries volume information: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, 00000000.00000002.4123643925.000000001ADF0000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: Yara match |
File source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe.330000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1655301808.0000000000332000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe PID: 6804, type: MEMORYSTR |
Source: Yara match |
File source: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe.330000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1655301808.0000000000332000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: decode_6ec70947443cc64628fe11013d0e752591680ef46c9a78ec1409313d6669bdf9.exe PID: 6804, type: MEMORYSTR |