Windows Analysis Report
XMx8r7SLZr.exe

Overview

General Information

Sample name: XMx8r7SLZr.exe
renamed because original name is a hash value
Original sample name: win_graphical_proton_c7b01242d2e15c3da0f45b8adec4e6913e534849cde16a2a6c480045e03fbee4.exe
Analysis ID: 1431550
MD5: 484617c0e2a1d6f7e95f121717e11768
SHA1: 2127cb774c3516840db15de1304e1ed498fece36
SHA256: c7b01242d2e15c3da0f45b8adec4e6913e534849cde16a2a6c480045e03fbee4
Tags: apt29exegraphicalprotonunpacked
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Contains functionality to dynamically determine API calls
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

AV Detection

barindex
Source: XMx8r7SLZr.exe Avira: detected
Source: XMx8r7SLZr.exe ReversingLabs: Detection: 70%
Source: XMx8r7SLZr.exe Virustotal: Detection: 70% Perma Link
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: login.microsoftonline.com
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token.dllk
Source: XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token0
Source: XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenI
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenK
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenl
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenll
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenlll
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenllljbin(
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenllmL
Source: XMx8r7SLZr.exe, 00000000.00000003.1750823565.00000000004D6000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenmL
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokeny
Source: XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token~
Source: XMx8r7SLZr.exe, 00000000.00000003.1750823565.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2289385182.000000000049B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/error?code=70000
Source: XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/icates
Source: classification engine Classification label: mal60.evad.winEXE@2/0@1/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03
Source: XMx8r7SLZr.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: XMx8r7SLZr.exe ReversingLabs: Detection: 70%
Source: XMx8r7SLZr.exe Virustotal: Detection: 70%
Source: unknown Process created: C:\Users\user\Desktop\XMx8r7SLZr.exe "C:\Users\user\Desktop\XMx8r7SLZr.exe"
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: XMx8r7SLZr.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: XMx8r7SLZr.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: XMx8r7SLZr.exe Static file information: File size 1371136 > 1048576
Source: XMx8r7SLZr.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x10e800
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Code function: 0_2_00000001400EE11C LoadLibraryW,GetProcAddressForCaller, 0_2_00000001400EE11C
Source: XMx8r7SLZr.exe Static PE information: section name: .00cfg
Source: XMx8r7SLZr.exe Static PE information: section name: .gehcont
Source: XMx8r7SLZr.exe Static PE information: section name: _RDATA
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000492000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe Code function: 0_2_00000001400EE11C LoadLibraryW,GetProcAddressForCaller, 0_2_00000001400EE11C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x5D034F Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x5D03A3 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x2260379 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtDeviceIoControlFile: Direct from: 0x14005BC41 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x2240265 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x2260AE3 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x1400162C1 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x1400023FC Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtMapViewOfSection: Direct from: 0x1400160C6 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x7FFE221E4B5E Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x5D0379 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x226034F Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x22603A3 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x14005931A Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x1400013D1 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x1400597AA Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x2240379 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtSetSecurityObject: Direct from: 0x7FFE221C26A1 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x1400023A4 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x140058D8A Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtQueryInformationToken: Direct from: 0x140058A8C Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x140059085 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x14005852D Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x2240AE3 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x14001621A Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x224034F Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtAllocateVirtualMemory: Direct from: 0x22403A3 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtProtectVirtualMemory: Direct from: 0x5D0265 Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exe NtCreateFile: Direct from: 0x140016055 Jump to behavior
No contacted IP infos