Windows Analysis Report
SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe

Overview

General Information

Sample name: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
Analysis ID: 1428461
MD5: a4d2a484e1f0bf11169fda433a385f7f
SHA1: 6733490679d6236a833d20390bc1e2d8ea88ed2e
SHA256: b2a55016c310fb3b6e38ea7dd08f6387c18c9eb2a4007947b43e6f1bb712c36e
Tags: exe
Infos:

Detection

Discord Token Stealer
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Discord Token Stealer
Found Tor onion address
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

AV Detection

barindex
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe ReversingLabs: Detection: 20%
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: unixxn--bitsNameTypeasn1cx16sse2false<nil>ErrorchdirwritechmodchowncloseMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthLocalOperaAmigoTorchGetDCBEGIN_auth_syncfile:1562578125int16int32int64uint8arrayslice and kind=defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]ntohs&amp;&#34;&#39;https:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFoundNRGBAparsexxxxxInts:Ptrs:GreekAdlamBamumBatakBuhidDograKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilsse41sse42ssse3matchrune tls: Earlyfilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nSHA-1P-224P-256P-384P-521ECDSA (at no IPClassStringFormat[]bytestringreadatremoveSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13minutesecondGOROOTChromeYandexKometaBitBltCOMMITNORMAL_mutexDOUBLE390625uint16uint32uint64structchan<-<-chan ValueGetACPsysmontimersefenceselect, not objectstatuslistensocketnumberactiveclosedsocks5CANCELGOAWAYPADDEDBasic CookieacceptcookieexpectoriginserverExpectPragmasocks LockedRGBA64Gray16, val CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidirdtscppopcntcmd/gonetdnsempty rune1 X25519%w%.0wAcceptServerdomaingophertelnet.localreturn.onionip+netheaderAnswerLengthSTREETavx512rdrandrdseedfloat32float64readdirwriteatconsoleTuesdayJanuaryOctoberMUI_StdMUI_DltAPPDATADiscordChrome1Chrome2Chrome3Chrome4Chrome5Orbitumsqlite3DEFAULT_txlock_vacuum_cslikeDECIMAL19531259765625invaliduintptrSwapperChanDir using , type= Value>ConvertforcegcallocmWcpuprofallocmRunknowngctraceIO waitUNKNOWN:eventsCopySidWSARecvWSASendconnectDefaultnumber UpgradeTrailerHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUG:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTNRGBA64nil keyFloats:AvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaavx512fos/execruntimeInstAltInstNopalt -> nop -> any -> derivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharset\\.\UNCSHA-224SHA-256SHA-384SHA-512Ed25519MD2-RSAMD5-RSAserial:::ffff:no portanswers2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsave#internGoStringtruncateFullPathThursdaySaturdayFebruaryNovemberDecember%!Month(ZONEINFOOpera GXDeleteDCROLLBACK_timeout_journal_locking48828125infinitystrconv.parsing ParseIntFuncTypestruct {nil PoolscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKno anodeCancelIoReadFileAcceptExWSAIoctlshutdownwsaioctlacceptex\Historybad insthijackedNO_ERRORPRIORITYSETTINGSLocation data=%q incr=%v ping=%qif-matchlocationhttp/1.1HTTP/2.0boundaryHTTP/1.1no-cacheContinueAcceptedConflictPaletted
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe String found in binary or memory: unixxn--bitsNameTypeasn1cx16sse2false<nil>ErrorchdirwritechmodchowncloseMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthLocalOperaAmigoTorchGetDCBEGIN_auth_syncfile:1562578125int16int32int64uint8arrayslice and kind=defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]ntohs&amp;&#34;&#39;https:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFoundNRGBAparsexxxxxInts:Ptrs:GreekAdlamBamumBatakBuhidDograKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilsse41sse42ssse3matchrune tls: Earlyfilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nSHA-1P-224P-256P-384P-521ECDSA (at no IPClassStringFormat[]bytestringreadatremoveSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13minutesecondGOROOTChromeYandexKometaBitBltCOMMITNORMAL_mutexDOUBLE390625uint16uint32uint64structchan<-<-chan ValueGetACPsysmontimersefenceselect, not objectstatuslistensocketnumberactiveclosedsocks5CANCELGOAWAYPADDEDBasic CookieacceptcookieexpectoriginserverExpectPragmasocks LockedRGBA64Gray16, val CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidirdtscppopcntcmd/gonetdnsempty rune1 X25519%w%.0wAcceptServerdomaingophertelnet.localreturn.onionip+netheaderAnswerLengthSTREETavx512rdrandrdseedfloat32float64readdirwriteatconsoleTuesdayJanuaryOctoberMUI_StdMUI_DltAPPDATADiscordChrome1Chrome2Chrome3Chrome4Chrome5Orbitumsqlite3DEFAULT_txlock_vacuum_cslikeDECIMAL19531259765625invaliduintptrSwapperChanDir using , type= Value>ConvertforcegcallocmWcpuprofallocmRunknowngctraceIO waitUNKNOWN:eventsCopySidWSARecvWSASendconnectDefaultnumber UpgradeTrailerHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUG:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTNRGBA64nil keyFloats:AvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaavx512fos/execruntimeInstAltInstNopalt -> nop -> any -> derivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharset\\.\UNCSHA-224SHA-256SHA-384SHA-512Ed25519MD2-RSAMD5-RSAserial:::ffff:no portanswers2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsave#internGoStringtruncateFullPathThursdaySaturdayFebruaryNovemberDecember%!Month(ZONEINFOOpera GXDeleteDCROLLBACK_timeout_journal_locking48828125infinitystrconv.parsing ParseIntFuncTypestruct {nil PoolscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKno anodeCancelIoReadFileAcceptExWSAIoctlshutdownwsaioctlacceptex\Historybad insthijackedNO_ERRORPRIORITYSETTINGSLocation data=%q incr=%v ping=%qif-matchlocationhttp/1.1HTTP/2.0boundaryHTTP/1.1no-cacheContinueAcceptedConflictPaletted
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe String found in binary or memory: https://discord.com/api/v9/users/
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C0000D4000.00000004.00001000.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr, history.json.0.dr String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677307275.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677378269.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C00008E000.00000004.00001000.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr, history.json.0.dr String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C00008E000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17C:
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677307275.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677378269.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://www.ecosia.org/newtab/
Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.dr String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

System Summary

barindex
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLE Matched rule: OlympicDestroyer Payload Author: kevoreilly
Source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE Matched rule: OlympicDestroyer Payload Author: kevoreilly
Source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE Matched rule: OlympicDestroyer Payload Author: kevoreilly
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: Number of sections : 11 > 10
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLE Matched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
Source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE Matched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
Source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE Matched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
Source: classification engine Classification label: mal72.troj.spyw.evad.winEXE@2/19@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File created: C:\Users\user\Desktop\discord.json Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7504:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Windows\system32\a65c24af649f2140c98023ea80f2c47f38ae2a60d7b9767b76fdb7de8fb981d2AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Jump to behavior
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Binary or memory string: SELECT tab_url, target_path FROM downloadslooking for beginning of object key stringmix of request and response pseudo headersPRIORITY frame payload size was %d; want 5http: multipart handled by MultipartReaderhttp: ContentLength=%d with Body length %d Rectang
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1676784459.0000024B5E2BE000.00000004.00000020.00020000.00000000.sdmp, Login DatapomdOhjfeW.0.dr Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe ReversingLabs: Detection: 20%
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe String found in binary or memory: bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: text offset out
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe String found in binary or memory: bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: text offset out
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe String found in binary or memory: ocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: sudog with non-nil wait
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe String found in binary or memory: ocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: sudog with non-nil wait
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Section loaded: cryptbase.dll Jump to behavior
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static file information: File size 7870976 > 1048576
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x40d400
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: Raw size of .rdata is bigger than: 0x100000 < 0x2f9800
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Static PE information: section name: .xdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1684978369.0000024B5E28E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformation Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLE
Source: Yara match File source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000000.1674596432.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe PID: 7496, type: MEMORYSTR
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataifXQjhqTfO Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryncVxcrHRZz Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 1 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesyonHaWuppH Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DatapomdOhjfeW Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 5 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 4 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistorymUUcKURTZn Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 3 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 2 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataFIHJDMqXHm Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DatamiROCwylnO Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryAWSFNvLGNr Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesPsjkPAcRus Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryqCoKrzsSGr Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior

Remote Access Functionality

barindex
Source: Yara match File source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLE
Source: Yara match File source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000000.1674596432.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe PID: 7496, type: MEMORYSTR
No contacted IP infos