Source: http://156.245.12.57:8000/999.html |
Avira URL Cloud: Label: malware |
Source: xxx.exe |
ReversingLabs: Detection: 60% |
Source: xxx.exe |
Virustotal: Detection: 69% |
Perma Link |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 99.6% probability |
Source: unknown |
Network traffic detected: HTTP traffic on port 49709 -> 8000 |
Source: global traffic |
TCP traffic: 192.168.2.6:49709 -> 156.245.12.57:8000 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.245.12.57 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.245.12.57 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.245.12.57 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.245.12.57 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.245.12.57 |
Source: global traffic |
HTTP traffic detected: GET /999.html HTTP/1.1User-Agent: Microsoft helloHost: 156.245.12.57:8000Cache-Control: no-cache |
Source: xxx.exe, 00000000.00000002.2373325221.0000000000749000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://156.245.12.57/ |
Source: xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://156.245.12.57/nes |
Source: xxx.exe, 00000000.00000002.2373325221.0000000000722000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://156.245.12.57:8000/999.html |
Source: xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://156.245.12.57:8000/999.html) |
Source: xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://156.245.12.57:8000/999.html: |
Source: xxx.exe |
Static PE information: Number of sections : 15 > 10 |
Source: classification engine |
Classification label: mal72.troj.evad.winEXE@2/0@0/1 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3160:120:WilError_03 |
Source: xxx.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\xxx.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: xxx.exe |
ReversingLabs: Detection: 60% |
Source: xxx.exe |
Virustotal: Detection: 69% |
Source: unknown |
Process created: C:\Users\user\Desktop\xxx.exe "C:\Users\user\Desktop\xxx.exe" |
Source: C:\Users\user\Desktop\xxx.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32 |
Jump to behavior |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_004017A0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,InternetConnectA,HttpOpenRequestA,malloc,InternetCloseHandle,FreeLibrary,malloc, |
0_2_004017A0 |
Source: xxx.exe |
Static PE information: section name: .xdata |
Source: xxx.exe |
Static PE information: section name: /4 |
Source: xxx.exe |
Static PE information: section name: /19 |
Source: xxx.exe |
Static PE information: section name: /31 |
Source: xxx.exe |
Static PE information: section name: /45 |
Source: xxx.exe |
Static PE information: section name: /57 |
Source: xxx.exe |
Static PE information: section name: /70 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49709 -> 8000 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: xxx.exe, 00000000.00000002.2373325221.000000000077F000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW1 |
Source: xxx.exe, 00000000.00000002.2373325221.000000000077F000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: xxx.exe, 00000000.00000002.2373325221.0000000000722000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAWPrx%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\xxx.exe |
Debugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_004017A0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,InternetConnectA,HttpOpenRequestA,malloc,InternetCloseHandle,FreeLibrary,malloc, |
0_2_004017A0 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,_initterm,GetStartupInfoA, |
0_2_00401180 |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_00401F50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort, |
0_2_00401F50 |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_004092D0 SetUnhandledExceptionFilter,VirtualAlloc, |
0_2_004092D0 |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_004033A2 SetUnhandledExceptionFilter, |
0_2_004033A2 |
Source: C:\Users\user\Desktop\xxx.exe |
Code function: 0_2_00401E70 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, |
0_2_00401E70 |