Click to jump to signature section
Source: LGvZDRRknR.exe | Malware Configuration Extractor: Rhadamanthys {"C2 url": "https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp"} |
Source: LGvZDRRknR.exe | Virustotal: Detection: 65% | Perma Link |
Source: LGvZDRRknR.exe | ReversingLabs: Detection: 31% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.8% probability |
Source: LGvZDRRknR.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: kernel32.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325BF40 FindFirstFileExW, | 0_2_00007FF65325BF40 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB5BC8 GetLogicalDriveStringsW,QueryDosDeviceW, | 0_3_0000019E4DBB5BC8 |
Source: Network traffic | Suricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 154.216.20.224:9773 -> 192.168.2.8:49706 |
Source: Malware configuration extractor | URLs: https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp |
Source: global traffic | TCP traffic: 192.168.2.8:49706 -> 154.216.20.224:9773 |
Source: Joe Sandbox View | ASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.224 |
Source: svchost.exe, 00000002.00000002.1503153583.0000000A0271B000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp |
Source: svchost.exe, 00000002.00000003.1490275504.00000166CD5A5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cloudflare-dns.com/dns-query |
Source: svchost.exe, 00000002.00000003.1490275504.00000166CD5A5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cloudflare-dns.com/dns-queryMachineGuidSOFTWARE |
Source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: DirectInput8Create | memstr_498be3ad-d |
Source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: GetRawInputData | memstr_7e4d83f0-5 |
Source: Yara match | File source: 0.3.LGvZDRRknR.exe.19e4fe70000.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.3.svchost.exe.166cf8a0000.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.3.svchost.exe.166cf8a0000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.LGvZDRRknR.exe.19e4fe70000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.LGvZDRRknR.exe.19e4fb90000.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.3.svchost.exe.166cf5c0000.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.LGvZDRRknR.exe.19e4fb90000.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.3.svchost.exe.166cf5c0000.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: LGvZDRRknR.exe PID: 4608, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 3428, type: MEMORYSTR |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB5FA0 NtQueryInformationProcess, | 0_3_0000019E4DBB5FA0 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB8AE0 NtQuerySystemInformation,malloc,NtQuerySystemInformation,K32GetProcessImageFileNameW, | 0_3_0000019E4DBB8AE0 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB64C0 NtQuerySystemInformation,NtQuerySystemInformation,GetTokenInformation,CloseHandle,CloseHandle, | 0_3_0000019E4DBB64C0 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D5FA0 NtQueryInformationProcess, | 2_2_00000166CD6D5FA0 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF653263908 | 0_3_00007FF653263908 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB51BC | 0_3_0000019E4DBB51BC |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB69D8 | 0_3_0000019E4DBB69D8 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB1500 | 0_3_0000019E4DBB1500 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB2F00 | 0_3_0000019E4DBB2F00 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBE4EA | 0_3_0000019E4DBBE4EA |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB9B4C | 0_3_0000019E4DBB9B4C |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB9E98 | 0_3_0000019E4DBB9E98 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB7FE8 | 0_3_0000019E4DBB7FE8 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBB43C | 0_3_0000019E4DBBB43C |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB442C | 0_3_0000019E4DBB442C |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBC5E8D | 0_3_0000019E4DBC5E8D |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325A4E0 | 0_2_00007FF65325A4E0 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653257528 | 0_2_00007FF653257528 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325BD34 | 0_2_00007FF65325BD34 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325773C | 0_2_00007FF65325773C |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325BF40 | 0_2_00007FF65325BF40 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653261F88 | 0_2_00007FF653261F88 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325FFD8 | 0_2_00007FF65325FFD8 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_3_00000166CD370998 | 2_3_00000166CD370998 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D69D8 | 2_2_00000166CD6D69D8 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D51BC | 2_2_00000166CD6D51BC |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D7FE8 | 2_2_00000166CD6D7FE8 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D9E98 | 2_2_00000166CD6D9E98 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D442C | 2_2_00000166CD6D442C |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6DB43C | 2_2_00000166CD6DB43C |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6DE4EA | 2_2_00000166CD6DE4EA |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D1500 | 2_2_00000166CD6D1500 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D2F00 | 2_2_00000166CD6D2F00 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6D9B4C | 2_2_00000166CD6D9B4C |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6E93F8 | 2_2_00000166CD6E93F8 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6E4A85 | 2_2_00000166CD6E4A85 |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6EA77E | 2_2_00000166CD6EA77E |
Source: LGvZDRRknR.exe | Binary or memory string: OriginalFilename vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FF06000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FD08000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamekernel32j% vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameKernelbase.dllj% vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E50105000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameKernelbase.dllj% vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000000.1449310718.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameCFF Explorer.exe: vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FD0B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamekernel32j% vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe | Binary or memory string: OriginalFilenameCFF Explorer.exe: vs LGvZDRRknR.exe |
Source: LGvZDRRknR.exe | Binary or memory string: FaI O k.h.o.vBP.tV.R.u_t_X_Pt G-~ qoUy_Wc_k_P v |
Source: LGvZDRRknR.exe | Binary or memory string: u.C.Ji.rDd_qU q q.q p d.L$_vX v_k: i_fMly.JPf.3 X_tFT.O_k_a_C H f<) F.yc: E_r_P.h P R_qY K.R.y w,v S q O L F j}.ZJ.b_J zF p.L7 KLJ.R_g_a.Q@.a_N.QAD NC nB k a< s_t w c_sQ_e z.i.Q.v.2.7.n[.t_rX.9_lqY/}V W a:F_l nYo R.k x_B Q W.M.b.S_wkM.9.7.s4 K{F_j_L- f_l0 J.SL5Y$_Q.U.s.RL f w.Q.HT.W.Tta0 t TTgz G sk f.9.Fh.K cIlA_Mx.e G.P_y_r_t.c t.a.6_u.FaI O k.h.o.vBP.tV.R.u_t_X_Pt G-~ qoUy_Wc_k_P v.1_q_w_J_xmbg<_r_p.Z`n.x |
Source: classification engine | Classification label: mal88.troj.evad.winEXE@3/0@0/1 |
Source: C:\Windows\System32\svchost.exe | Mutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-40bf6037-4e6f-965ae0-f901919f7387} |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: LGvZDRRknR.exe | Virustotal: Detection: 65% |
Source: LGvZDRRknR.exe | ReversingLabs: Detection: 31% |
Source: unknown | Process created: C:\Users\user\Desktop\LGvZDRRknR.exe "C:\Users\user\Desktop\LGvZDRRknR.exe" | |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wudfplatform.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: LGvZDRRknR.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: LGvZDRRknR.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: LGvZDRRknR.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: kernel32.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp |
Source: LGvZDRRknR.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: LGvZDRRknR.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: LGvZDRRknR.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: LGvZDRRknR.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: LGvZDRRknR.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: LGvZDRRknR.exe | Static PE information: section name: .textbss |
Source: LGvZDRRknR.exe | Static PE information: section name: _RDATA |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF653263864 push cs; ret | 0_3_00007FF6532638C3 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF653268250 pushad ; iretd | 0_3_00007FF653268256 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF65326815E push edi; ret | 0_3_00007FF653268164 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF65326833E push esi; ret | 0_3_00007FF653268345 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF65326853E push eax; retf | 0_3_00007FF653268541 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_00007FF653263822 push cs; ret | 0_3_00007FF6532638C3 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD19C push esi; retf | 0_3_0000019E4DBBD1A3 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD194 push esi; retf | 0_3_0000019E4DBBD19B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD18C push esi; retf | 0_3_0000019E4DBBD193 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD16C push ebp; retf | 0_3_0000019E4DBBD18B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD1DC push ebp; retf | 0_3_0000019E4DBBD1FB |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD1D4 push ebp; retf | 0_3_0000019E4DBBD1DB |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD1B4 push ebp; retf | 0_3_0000019E4DBBD1C3 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD1AC push esi; retf | 0_3_0000019E4DBBD1B3 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD1A4 push esi; retf | 0_3_0000019E4DBBD1AB |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD11C push ebp; retf | 0_3_0000019E4DBBD12B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD114 push ebp; retf | 0_3_0000019E4DBBD11B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD10C push ebp; retf | 0_3_0000019E4DBBD16B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD0E4 push ebp; retf | 0_3_0000019E4DBBD10B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD15C push ebp; retf | 0_3_0000019E4DBBD16B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD14C push esi; retf | 0_3_0000019E4DBBD15B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD144 push ebp; retf | 0_3_0000019E4DBBD14B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD12C push ebp; retf | 0_3_0000019E4DBBD13B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD09A push ebp; retf | 0_3_0000019E4DBBD09B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD084 push edi; retf | 0_3_0000019E4DBBD093 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBC0684 push ebp; retf | 0_3_0000019E4DBC068B |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD26C pushfd ; retf | 0_3_0000019E4DBBD2A2 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD264 pushfd ; retf | 0_3_0000019E4DBBD2CA |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD0DC push ebp; retf | 0_3_0000019E4DBBD0E3 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBBD0CC push esi; retf | 0_3_0000019E4DBBD0DB |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB3CC4 push E8000098h; ret | 0_3_0000019E4DBB3CC9 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Evasive API call chain: CreateMutex,DecisionNodes,ExitProcess | graph_2-4068 |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCMON.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNSC.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: LGvZDRRknR.exe | Binary or memory string: ORIGINALFILENAMECFF EXPLORER.EXE: |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: REGMON.EXE |
Source: LGvZDRRknR.exe | Binary or memory string: CFF EXPLORER.EXE |
Source: LGvZDRRknR.exe | Binary or memory string: INTERNALNAMECFF EXPLORER.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDBG.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNS.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PETOOLS.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: FIDDLER.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDUMP.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXP64.EXETCPVIEW.EXETCPVIEW64.EXEPROCMON.EXEPROCMON64.EXEVMMAP.EXEVMMAP64.EXEPORTMON.EXEPROCESSLASSO.EXEWIRESHARK.EXEFIDDLER EVERYWHERE.EXEFIDDLER.EXEIDA.EXEIDA64.EXEIMMUNITYDEBUGGER.EXEWINDUMP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEPROCESSHACKER.EXEIDAQ64.EXEAUTORUNS.EXEDUMPCAP.EXEDE4DOT.EXEHOOKEXPLORER.EXEILSPY.EXELORDPE.EXEDNSPY.EXEPETOOLS.EXEAUTORUNSC.EXERESOURCEHACKER.EXEFILEMON.EXEREGMON.EXEWINDANR.EXEWINDBG.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDANR.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Windows\System32\svchost.exe | Code function: 2_2_00000166CD6E711B sldt word ptr [esi] | 2_2_00000166CD6E711B |
Source: C:\Windows\System32\svchost.exe | Check user administrative privileges: GetTokenInformation,DecisionNodes | graph_2-4089 |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325BF40 FindFirstFileExW, | 0_2_00007FF65325BF40 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB5BC8 GetLogicalDriveStringsW,QueryDosDeviceW, | 0_3_0000019E4DBB5BC8 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_3_0000019E4DBB573C GetSystemInfo, | 0_3_0000019E4DBB573C |
Source: svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: DisableGuestVmNetworkConnectivity |
Source: svchost.exe, 00000002.00000002.1503548284.00000166CD413000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1503582315.00000166CD45D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: EnableGuestVmNetworkConnectivity |
Source: svchost.exe, 00000002.00000002.1503548284.00000166CD413000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW@ |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325B6E8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF65325B6E8 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653257108 GetProcessHeap,HeapAlloc,HeapFree,VirtualFree,HeapFree, | 0_2_00007FF653257108 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF6532580D8 SetUnhandledExceptionFilter, | 0_2_00007FF6532580D8 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653262520 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00007FF653262520 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF65325B6E8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF65325B6E8 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653257EF4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF653257EF4 |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653261DD0 cpuid | 0_2_00007FF653261DD0 |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\LGvZDRRknR.exe | Code function: 0_2_00007FF653257DCC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_00007FF653257DCC |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OllyDbg.exe |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tcpview.exe |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Wireshark.exe |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: lordpe.exe |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Procmon.exe |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: autoruns.exe |
Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: regmon.exe |
Source: Yara match | File source: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1459418313.0000019E4D980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.1464387974.00000166CD3B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1459418313.0000019E4D980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.1464387974.00000166CD3B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |