Source: XMx8r7SLZr.exe |
ReversingLabs: Detection: 70% |
Source: XMx8r7SLZr.exe |
Virustotal: Detection: 70% |
Perma Link |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: login.microsoftonline.com |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/ |
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token |
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token.dllk |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token0 |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenI |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenK |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenl |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenll |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenlll |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenllljbin( |
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenllmL |
Source: XMx8r7SLZr.exe, 00000000.00000003.1750823565.00000000004D6000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenmL |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokeny |
Source: XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token~ |
Source: XMx8r7SLZr.exe, 00000000.00000003.1750823565.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2289385182.000000000049B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/error?code=70000 |
Source: XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.microsoftonline.com/icates |
Source: classification engine |
Classification label: mal60.evad.winEXE@2/0@1/0 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03 |
Source: XMx8r7SLZr.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: XMx8r7SLZr.exe |
ReversingLabs: Detection: 70% |
Source: XMx8r7SLZr.exe |
Virustotal: Detection: 70% |
Source: unknown |
Process created: C:\Users\user\Desktop\XMx8r7SLZr.exe "C:\Users\user\Desktop\XMx8r7SLZr.exe" |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 |
Jump to behavior |
Source: XMx8r7SLZr.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: XMx8r7SLZr.exe |
Static PE information: Image base 0x140000000 > 0x60000000 |
Source: XMx8r7SLZr.exe |
Static file information: File size 1371136 > 1048576 |
Source: XMx8r7SLZr.exe |
Static PE information: Raw size of .text is bigger than: 0x100000 < 0x10e800 |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Code function: 0_2_00000001400EE11C LoadLibraryW,GetProcAddressForCaller, |
0_2_00000001400EE11C |
Source: XMx8r7SLZr.exe |
Static PE information: section name: .00cfg |
Source: XMx8r7SLZr.exe |
Static PE information: section name: .gehcont |
Source: XMx8r7SLZr.exe |
Static PE information: section name: _RDATA |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000492000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW@ |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
Code function: 0_2_00000001400EE11C LoadLibraryW,GetProcAddressForCaller, |
0_2_00000001400EE11C |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x5D034F |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x5D03A3 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x2260379 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtDeviceIoControlFile: Direct from: 0x14005BC41 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x2240265 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x2260AE3 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x1400162C1 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x1400023FC |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtMapViewOfSection: Direct from: 0x1400160C6 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x7FFE221E4B5E |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x5D0379 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x226034F |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x22603A3 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x14005931A |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x1400013D1 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x1400597AA |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x2240379 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtSetSecurityObject: Direct from: 0x7FFE221C26A1 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x1400023A4 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x140058D8A |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtQueryInformationToken: Direct from: 0x140058A8C |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x140059085 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x14005852D |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x2240AE3 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x14001621A |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x224034F |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtAllocateVirtualMemory: Direct from: 0x22403A3 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtProtectVirtualMemory: Direct from: 0x5D0265 |
Jump to behavior |
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe |
NtCreateFile: Direct from: 0x140016055 |
Jump to behavior |