Click to jump to signature section
Source: gfehgfwveg.exe | ReversingLabs: Detection: 55% |
Source: Yara match | File source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 98.5% probability |
Source: gfehgfwveg.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_0302E190 FindFirstFileW,FindClose, | 0_2_0302E190 |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_0302DBC4 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW, | 0_2_0302DBC4 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49830 -> 34.34.145.103:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49831 -> 34.169.99.17:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49838 -> 35.195.45.98:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49835 -> 34.83.67.185:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49981 -> 34.34.145.103:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49988 -> 34.83.67.185:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49991 -> 35.195.45.98:443 |
Source: Network traffic | Suricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49985 -> 34.169.99.17:443 |
Source: Joe Sandbox View | ASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS |
Source: Joe Sandbox View | ASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.169.99.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.83.67.185 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 35.195.45.98 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: unknown | TCP traffic detected without corresponding DNS query: 34.34.145.103 |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://.css |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://.jpg |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: gfehgfwveg.exe, 00000000.00000002.3889930307.000000006E66F000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063469000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2080229872.000000007EB1A000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2075649868.000000007EB44000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.openssl.org/V |
Source: gfehgfwveg.exe, 00000000.00000003.2074901686.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063281000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.openssl.org/support/faq.html |
Source: gfehgfwveg.exe, 00000000.00000003.2074901686.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063281000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.openssl.org/support/faq.htmlRAND |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49843 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49985 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49841 |
Source: unknown | Network traffic detected: HTTP traffic on port 49838 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49840 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49981 |
Source: unknown | Network traffic detected: HTTP traffic on port 49840 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49831 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49839 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49838 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49835 |
Source: unknown | Network traffic detected: HTTP traffic on port 49841 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49831 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49830 |
Source: unknown | Network traffic detected: HTTP traffic on port 49839 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49843 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49991 |
Source: unknown | Network traffic detected: HTTP traffic on port 49835 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49988 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49985 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49981 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49830 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 49991 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49988 |
Source: Yara match | File source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_034E525C LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory, | 0_2_034E525C |
Source: gfehgfwveg.exe | Static PE information: Number of sections : 11 > 10 |
Source: gfehgfwveg.exe, 00000000.00000002.3889930307.000000006E66F000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamessleay32.dllH vs gfehgfwveg.exe |
Source: gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063469000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamelibeay32.dllH vs gfehgfwveg.exe |
Source: gfehgfwveg.exe, 00000000.00000003.2080229872.000000007EB1A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamessleay32.dllH vs gfehgfwveg.exe |
Source: gfehgfwveg.exe, 00000000.00000002.3881473973.00000000025D8000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamekernel32j% vs gfehgfwveg.exe |
Source: gfehgfwveg.exe, 00000000.00000003.2075649868.000000007EB44000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamelibeay32.dllH vs gfehgfwveg.exe |
Source: gfehgfwveg.exe, 00000000.00000002.3886606090.0000000003824000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamekernel32j% vs gfehgfwveg.exe |
Source: gfehgfwveg.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
Source: classification engine | Classification label: mal88.troj.evad.winEXE@6/0@0/4 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2876:120:WilError_03 |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: gfehgfwveg.exe | ReversingLabs: Detection: 55% |
Source: unknown | Process created: C:\Users\user\Desktop\gfehgfwveg.exe "C:\Users\user\Desktop\gfehgfwveg.exe" | |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: ksuser.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: audioses.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: midimap.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: avifil32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: cryptui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: version.dll | Jump to behavior |
Source: gfehgfwveg.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: gfehgfwveg.exe | Static file information: File size 4276224 > 1048576 |
Source: gfehgfwveg.exe | Static PE information: Raw size of .text is bigger than: 0x100000 < 0x3ec600 |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_034E525C LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory, | 0_2_034E525C |
Source: gfehgfwveg.exe | Static PE information: section name: .didata |
Source: gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2071863727.000000007E870000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: torConnect |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_DiskDrive WHERE DeviceID=\'c:\' |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_DiskDrive WHERE DeviceID=\'c:\' |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | System information queried: CurrentTimeZoneInformation | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | System information queried: CurrentTimeZoneInformation | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | System information queried: CurrentTimeZoneInformation | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | System information queried: CurrentTimeZoneInformation | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_0302E190 FindFirstFileW,FindClose, | 0_2_0302E190 |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_0302DBC4 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW, | 0_2_0302DBC4 |
Source: gfehgfwveg.exe, 00000000.00000003.2082354644.0000000000AB4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: gfehgfwveg.exe, 00000000.00000002.3880702296.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_034E525C LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory, | 0_2_034E525C |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | Jump to behavior |
Source: gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2071863727.000000007E870000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Shell_TrayWndTrayNotifyWndSysPagerToolbarWindow32U |
Source: gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2071863727.000000007E870000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: explorer.exeShell_TrayWnd |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: GetUserDefaultUILanguage,GetLocaleInfoW, | 0_2_0302E2C8 |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 0_2_0302D768 |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | Jump to behavior |
Source: C:\Users\user\Desktop\gfehgfwveg.exe | Code function: 0_2_034E583C GetVersionExW,GetVersionExW,LoadLibraryW, | 0_2_034E583C |
Source: Yara match | File source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR |