Source: C:\Users\user\AppData\Local\Temp\42ZqUg._ |
Avira: detection malicious, Label: HEUR/AGEN.1300756 |
Source: C:\Users\user\AppData\Local\Temp\42ZqUg._ |
Virustotal: Detection: 25% |
Perma Link |
Source: C:\Users\user\AppData\Local\Temp\42ZqUg._ |
Joe Sandbox ML: detected |
Source: Kofc4rRZdp.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Kofc4rRZdp.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: |
Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: Kofc4rRZdp.exe |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00714D8A __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError, |
0_2_00714D8A |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00728590 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW, |
0_2_00728590 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_007386E8 FindFirstFileExA, |
0_2_007386E8 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A769C0 NtCreateThreadEx, |
1_2_04A769C0 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0071720F |
0_2_0071720F |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0071E3FB |
0_2_0071E3FB |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0071FBD3 |
0_2_0071FBD3 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0071837D |
0_2_0071837D |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072E430 |
0_2_0072E430 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00732578 |
0_2_00732578 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00712606 |
0_2_00712606 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_007327A7 |
0_2_007327A7 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00720870 |
0_2_00720870 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00718934 |
0_2_00718934 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0073AA50 |
0_2_0073AA50 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00718D89 |
0_2_00718D89 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0073EE32 |
0_2_0073EE32 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0073AEFE |
0_2_0073AEFE |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04951000 |
1_2_04951000 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_049549D0 |
1_2_049549D0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04952FB0 |
1_2_04952FB0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_049551F0 |
1_2_049551F0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04952AC4 |
1_2_04952AC4 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04953B80 |
1_2_04953B80 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A76CC0 |
1_2_04A76CC0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A769C0 |
1_2_04A769C0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A78910 |
1_2_04A78910 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A76140 |
1_2_04A76140 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A79040 |
1_2_04A79040 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A78DB0 |
1_2_04A78DB0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A79490 |
1_2_04A79490 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A75AE0 |
1_2_04A75AE0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A766E0 |
1_2_04A766E0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A78BC0 |
1_2_04A78BC0 |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Code function: 1_2_04A76430 |
1_2_04A76430 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: String function: 0072C468 appears 55 times |
|
Source: Kofc4rRZdp.exe, 00000000.00000002.2077209805.0000000000762000.00000004.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamelgpllibs.dll8 vs Kofc4rRZdp.exe |
Source: Kofc4rRZdp.exe, 00000000.00000002.2077529522.0000000002D84000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameREGSVR32.EXE.MUIj% vs Kofc4rRZdp.exe |
Source: Kofc4rRZdp.exe, 00000000.00000003.2076923027.0000000002D84000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameREGSVR32.EXE.MUIj% vs Kofc4rRZdp.exe |
Source: Kofc4rRZdp.exe, 00000000.00000003.2076820826.0000000002D84000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameREGSVR32.EXE.MUIj% vs Kofc4rRZdp.exe |
Source: Kofc4rRZdp.exe, 00000000.00000003.2077046352.0000000002D84000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameREGSVR32.EXE.MUIj% vs Kofc4rRZdp.exe |
Source: Kofc4rRZdp.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal72.winEXE@3/1@0/0 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00712E6F GetLastError,FormatMessageW,_wcslen,LocalFree, |
0_2_00712E6F |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00725C5C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree, |
0_2_00725C5C |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
File created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_3806687 |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Command line argument: ht |
0_2_0072B2FE |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Command line argument: sfxname |
0_2_0072B2FE |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Command line argument: sfxstime |
0_2_0072B2FE |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Command line argument: STARTDLG |
0_2_0072B2FE |
Source: Kofc4rRZdp.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: Kofc4rRZdp.exe |
Virustotal: Detection: 38% |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
File read: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\Kofc4rRZdp.exe "C:\Users\user\Desktop\Kofc4rRZdp.exe" |
|
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Process created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /u /s .\42ZQUg._ |
|
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Process created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /u /s .\42ZQUg._ |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: dxgidebug.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: riched20.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: usp10.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: msls31.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: pcacli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: aclayers.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: sfc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 |
Jump to behavior |
Source: Kofc4rRZdp.exe |
Static file information: File size 3049000 > 1048576 |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: Kofc4rRZdp.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: Kofc4rRZdp.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: Kofc4rRZdp.exe |
Source: Kofc4rRZdp.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: Kofc4rRZdp.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: Kofc4rRZdp.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: Kofc4rRZdp.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: Kofc4rRZdp.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
File created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_3806687 |
Jump to behavior |
Source: Kofc4rRZdp.exe |
Static PE information: section name: .didat |
Source: 42ZqUg._.0.dr |
Static PE information: section name: .qdata |
Source: 42ZqUg._.0.dr |
Static PE information: section name: 510OCR |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072C403 push ecx; ret |
0_2_0072C416 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072D4B0 push ecx; ret |
0_2_0072D4C3 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\42ZqUg._ |
Jump to dropped file |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00714D8A __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError, |
0_2_00714D8A |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00728590 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW, |
0_2_00728590 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_007386E8 FindFirstFileExA, |
0_2_007386E8 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072BC1D VirtualQuery,GetSystemInfo, |
0_2_0072BC1D |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072D242 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0072D242 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_007353C2 mov eax, dword ptr fs:[00000030h] |
0_2_007353C2 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_007393D0 GetProcessHeap, |
0_2_007393D0 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072D242 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0072D242 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_007312B4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_007312B4 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072D3E5 SetUnhandledExceptionFilter, |
0_2_0072D3E5 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072C69D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_0072C69D |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Process created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /u /s .\42ZQUg._ |
Jump to behavior |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072D05E cpuid |
0_2_0072D05E |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: GetLocaleInfoW,GetNumberFormatW, |
0_2_00726CF5 |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_0072B2FE GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle, |
0_2_0072B2FE |
Source: C:\Users\user\Desktop\Kofc4rRZdp.exe |
Code function: 0_2_00715032 GetVersionExW, |
0_2_00715032 |