Source: http://a46.bulehero.in/download.exe | Avira URL Cloud: Label: malware |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\download.exe.n8vbqd2.partial | Avira: Label: HEUR/AGEN.1011827 |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\download[1].exe | Avira: Label: HEUR/AGEN.1011827 |
Source: http://a46.bulehero.in/download.exe | virustotal: Detection: 21% | Perma Link |
Source: http://a46.bulehero.in/download.exe | virustotal: Detection: 21% | Perma Link |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\download[1].exe | virustotal: Detection: 78% | Perma Link |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\download.exe.n8vbqd2.partial | virustotal: Detection: 78% | Perma Link |
Source: global traffic | HTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/octet-streamLast-Modified: Mon, 17 Dec 2018 23:50:15 GMTAccept-Ranges: bytesETag: "80d5c5416396d41:0"Server: Microsoft-IIS/7.5Date: Wed, 09 Jan 2019 15:52:53 GMTContent-Length: 322560Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 2a 73 24 1c 6e 12 4a 4f 6e 12 4a 4f 6e 12 4a 4f 15 0e 46 4f 6d 12 4a 4f ed 0e 44 4f 45 12 4a 4f 58 34 40 4f a8 12 4a 4f 38 0d 59 4f 42 12 4a 4f 6e 12 4b 4f 08 10 4a 4f 0c 0d 59 4f 79 12 4a 4f 58 34 41 4f 30 12 4a 4f 86 0d 41 4f 3e 12 4a 4f 86 0d 40 4f 77 12 4a 4f 6e 12 4a 4f 27 12 4a 4f a9 14 4c 4f 6f 12 4a 4f 52 69 63 68 6e 12 4a 4f 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 37 36 1 |
Source: global traffic | TCP traffic: 192.168.2.5:49793 -> 139.162.85.79:80 |
Source: global traffic | HTTP traffic detected: GET /download.exe HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: a46.bulehero.inConnection: Keep-Alive |
Source: unknown | DNS traffic detected: queries for: a46.bulehero.in |
Source: download[1].exe.3.dr | Static PE information: Section: UPX1 ZLIB complexity 0.990717976238 |
Source: download.exe.n8vbqd2.partial.3.dr | Static PE information: Section: UPX1 ZLIB complexity 0.990717976238 |
Source: classification engine | Classification label: mal72.win@3/8@1/1 |
Source: C:\Program Files\internet explorer\iexplore.exe | File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | File created: C:\Users\user\AppData\Local\Temp\~DFB67EECB8242C8AF6.TMP | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | File read: C:\Users\desktop.ini | Jump to behavior |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2336 CREDAT:17410 /prefetch:2 | |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2336 CREDAT:17410 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files\internet explorer\iexplore.exe | Automated click: Run |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | File opened: C:\Program Files (x86)\Java\jre1.8.0_171\bin\msvcr100.dll | Jump to behavior |
Source: download[1].exe.3.dr | Static PE information: section name: UPX2 |
Source: download.exe.n8vbqd2.partial.3.dr | Static PE information: section name: UPX2 |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\download.exe.n8vbqd2.partial | Jump to dropped file |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\download[1].exe | Jump to dropped file |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.