Click to jump to signature section
Source: Submited Sample | Integrated Neural Analysis Model: Matched 98.9% probability |
Source: word.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: word.exe | Static PE information: certificate valid |
Source: word.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00405FF5 FindFirstFileA,FindClose, | 0_2_00405FF5 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, | 0_2_004055B1 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00402645 FindFirstFileA, | 0_2_00402645 |
Source: word.exe | String found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q |
Source: word.exe | String found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0 |
Source: word.exe | String found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0 |
Source: word.exe | String found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0 |
Source: word.exe | String found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0 |
Source: word.exe | String found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0 |
Source: word.exe | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: word.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: word.exe | String found in binary or memory: http://ocsps.ssl.com0 |
Source: word.exe | String found in binary or memory: http://ocsps.ssl.com0? |
Source: word.exe | String found in binary or memory: http://ocsps.ssl.com0_ |
Source: word.exe | String found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0 |
Source: word.exe | String found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0 |
Source: word.exe | String found in binary or memory: https://www.ssl.com/repository0 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_0040511A GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_0040511A |
Source: C:\Users\user\Desktop\word.exe | Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 0_2_00403217 |
Source: C:\Users\user\Desktop\word.exe | File created: C:\Windows\resources\0809 | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00404959 | 0_2_00404959 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_004062CB | 0_2_004062CB |
Source: word.exe, 00000000.00000000.2108364899.0000000000447000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenametrichinization.exe4 vs word.exe |
Source: word.exe | Binary or memory string: OriginalFilenametrichinization.exe4 vs word.exe |
Source: word.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: classification engine | Classification label: mal68.troj.evad.winEXE@1/9@0/0 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_0040442A GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, | 0_2_0040442A |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar, | 0_2_00402036 |
Source: C:\Users\user\Desktop\word.exe | File created: C:\Users\user\spherosome | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | File created: C:\Users\user\AppData\Local\Temp\nsbD90F.tmp | Jump to behavior |
Source: word.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\word.exe | File read: C:\Users\desktop.ini | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | File read: C:\Users\user\Desktop\word.exe | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | File written: C:\Users\user\AppData\Local\Temp\Setup.ini | Jump to behavior |
Source: word.exe | Static PE information: certificate valid |
Source: word.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Yara match | File source: 00000000.00000002.4568994288.0000000006D40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4568994288.0000000003000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4568696784.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: C:\Users\user\spherosome\preadoption\preembodiment\Unending.die, type: DROPPED |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\nsbD910.tmp, type: DROPPED |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_0040601C GetModuleHandleA,LoadLibraryA,GetProcAddress, | 0_2_0040601C |
Source: System.dll.0.dr | Static PE information: real checksum: 0x0 should be: 0x1014f |
Source: word.exe | Static PE information: real checksum: 0xb3966 should be: 0xb47c4 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_10002D30 push eax; ret | 0_2_10002D5E |
Source: C:\Users\user\Desktop\word.exe | File created: C:\Users\user\AppData\Local\Temp\nsmDB24.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | RDTSC instruction interceptor: First address: 71C5171 second address: 71C5171 instructions: 0x00000000 rdtsc 0x00000002 cmp dx, C9B0h 0x00000007 cmp ax, cx 0x0000000a cmp ebx, ecx 0x0000000c jc 00007FCC747EDA8Ah 0x0000000e cmp dx, bx 0x00000011 test cx, dx 0x00000014 inc ebp 0x00000015 test edx, ebx 0x00000017 inc ebx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\word.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsmDB24.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00405FF5 FindFirstFileA,FindClose, | 0_2_00405FF5 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, | 0_2_004055B1 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00402645 FindFirstFileA, | 0_2_00402645 |
Source: C:\Users\user\Desktop\word.exe | API call chain: ExitProcess graph end node | graph_0-4275 |
Source: C:\Users\user\Desktop\word.exe | API call chain: ExitProcess graph end node | graph_0-4438 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_0040601C GetModuleHandleA,LoadLibraryA,GetProcAddress, | 0_2_0040601C |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00405D13 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA, | 0_2_00405D13 |