Source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp |
Malware Configuration Extractor: Njrat {"Host": "resilencia2023.duckdns.org", "Port": "2009", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "8abd92e56969"} |
Source: Yara match |
File source: xuI8pQHlxExL.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR |
Source: xuI8pQHlxExL.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll |
Jump to behavior |
Source: xuI8pQHlxExL.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Traffic |
Snort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49730 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49730 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.4:49730 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49730 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49736 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.4:49736 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49736 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49737 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49737 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.4:49737 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49737 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 179.14.8.182:2009 |
Source: Traffic |
Snort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49739 -> 179.14.8.182:2009 |
Source: Malware configuration extractor |
URLs: resilencia2023.duckdns.org |
Source: unknown |
DNS query: name: resilencia2023.duckdns.org |
Source: global traffic |
TCP traffic: 192.168.2.4:49730 -> 179.14.8.182:2009 |
Source: Joe Sandbox View |
ASN Name: ColombiaMovilCO ColombiaMovilCO |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
DNS traffic detected: queries for: resilencia2023.duckdns.org |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://go.microsoft. |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://go.microsoft.LinkId=42127 |
Source: xuI8pQHlxExL.exe, Keylogger.cs |
.Net Code: VKCodeToUnicode |
Source: Yara match |
File source: xuI8pQHlxExL.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Code function: 0_2_05171930 |
0_2_05171930 |
Source: xuI8pQHlxExL.exe, 00000000.00000000.1653958739.00000000009C8000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameClient22.exe4 vs xuI8pQHlxExL.exe |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000EAE000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamemscorwks.dllT vs xuI8pQHlxExL.exe |
Source: xuI8pQHlxExL.exe |
Binary or memory string: OriginalFilenameClient22.exe4 vs xuI8pQHlxExL.exe |
Source: xuI8pQHlxExL.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal100.troj.spyw.evad.winEXE@4/1@3/1 |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Code function: 0_2_052C339E AdjustTokenPrivileges, |
0_2_052C339E |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Code function: 0_2_052C3367 AdjustTokenPrivileges, |
0_2_052C3367 |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
File created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xuI8pQHlxExL.exe.log |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_03 |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Mutant created: \Sessions\1\BaseNamedObjects\8abd92e56969 |
Source: xuI8pQHlxExL.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: xuI8pQHlxExL.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79% |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\xuI8pQHlxExL.exe "C:\Users\user\Desktop\xuI8pQHlxExL.exe" |
|
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
File opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll |
Jump to behavior |
Source: xuI8pQHlxExL.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll |
Jump to behavior |
Source: xuI8pQHlxExL.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: xuI8pQHlxExL.exe, Program.cs |
.Net Code: Plugin System.Reflection.Assembly.Load(byte[]) |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Code function: 0_2_0577076B push 69E6C310h; ret |
0_2_05770782 |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Code function: 0_2_057709B8 push 69E6C3B0h; ret |
0_2_057709CE |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Code function: 0_2_05770890 push 69E6C360h; ret |
0_2_057708A6 |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe" |
|
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Memory allocated: 1360000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Memory allocated: 3020000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Memory allocated: 1360000 memory commit | memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Window / User API: threadDelayed 3650 |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Window / User API: threadDelayed 5234 |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Window / User API: foregroundWindowGot 1761 |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe TID: 7100 |
Thread sleep time: -196000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe TID: 7100 |
Thread sleep time: -5234000s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Process token adjusted: Debug |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: xuI8pQHlxExL.exe, Program.cs |
Reference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, cbName, ref lpszVer, 100) |
Source: xuI8pQHlxExL.exe, Keylogger.cs |
Reference to suspicious API methods: MapVirtualKey(a, 0u) |
Source: xuI8pQHlxExL.exe, Keylogger.cs |
Reference to suspicious API methods: GetAsyncKeyState(num2) |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2477580512.000000000358A000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.0000000003590000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.00000000030BE000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2477580512.0000000003590000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program ManagerX |
Source: xuI8pQHlxExL.exe, 00000000.00000002.2477580512.000000000358A000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.0000000003590000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.00000000030BE000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program Manager@9 |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: Yara match |
File source: xuI8pQHlxExL.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR |
Source: Yara match |
File source: xuI8pQHlxExL.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR |