Click to jump to signature section
Source: main.exe | Virustotal: Detection: 62% | Perma Link |
Source: main.exe | ReversingLabs: Detection: 26% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 94.5% probability |
Source: Yara match | File source: 00000000.00000002.2574859343.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2574313008.000000000336A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: main.exe PID: 8384, type: MEMORYSTR |
Source: main.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: main.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_hashlib.pdb source: main.exe, 00000000.00000003.1336636577.000000000369E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2575210716.0000000010089000.00000002.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\select.pdb source: main.exe, 00000000.00000002.2575274761.000000001D112000.00000002.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\python34.pdb source: main.exe, 00000000.00000002.2575498585.000000001E13C000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000002.2573448733.0000000000BC1000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_bz2.pdb source: main.exe, 00000000.00000002.2575327946.000000001D17B000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1334824069.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1334843105.00000000032C5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_ssl.pdb source: main.exe, 00000000.00000002.2574707564.0000000003756000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338364600.00000000038C1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_lzma.pdb source: main.exe, 00000000.00000003.1341830590.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1341830590.000000000342E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1341830590.000000000340E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574118063.0000000002C9B000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1343117396.000000000342E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_socket.pdb source: main.exe, 00000000.00000003.1335243352.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2573812589.0000000001087000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1335264303.00000000032C7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\unicodedata.pdb source: main.exe, 00000000.00000003.1339292813.0000000003858000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338978089.00000000037BF000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574938192.0000000003964000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338744463.00000000033C8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338744463.00000000033A8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338744463.00000000033B8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_ctypes.pdb source: main.exe, 00000000.00000002.2575380562.000000001D1AF000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1333755099.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1333959411.00000000032C1000.00000004.00000020.00020000.00000000.sdmp |
Source: Joe Sandbox View | IP Address: 151.101.2.49 151.101.2.49 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /ca/cacert.pem HTTP/1.1Accept-Encoding: identityUser-Agent: Python-urllib/3.4Connection: closeHost: curl.haxx.se |
Source: global traffic | DNS traffic detected: DNS query: curl.haxx.se |
Source: main.exe, 00000000.00000002.2574447787.00000000034C0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://curl.haxx.se/ca/cacert.pem |
Source: main.exe, 00000000.00000002.2574447787.00000000034C0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://curl.haxx.se/ca/cacert.peming |
Source: main.exe, 00000000.00000002.2574801989.0000000003830000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://curl.haxx.se/rfc/cookie_spec.html |
Source: main.exe, 00000000.00000002.2574774712.00000000037F0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://python-requests.org |
Source: main.exe, 00000000.00000002.2574774712.00000000037F0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://python-requests.org_.py |
Source: main.exe, 00000000.00000002.2573448733.0000000000BC1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://python.org/dev/peps/pep-0263/ |
Source: main.exe, 00000000.00000003.1336636577.000000000369E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574707564.0000000003756000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338145569.00000000037B0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2575210716.0000000010089000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338364600.00000000038C1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.openssl.org/support/faq.html |
Source: main.exe, 00000000.00000003.1336636577.000000000369E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574707564.0000000003756000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338145569.00000000037B0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2575210716.0000000010089000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338364600.00000000038C1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.openssl.org/support/faq.html.................... |
Source: main.exe, 00000000.00000003.1332951199.0000000003099000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332918989.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2573908337.00000000013D0000.00000004.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1333185461.0000000003099000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.python.org/dev/peps/pep-0205/ |
Source: main.exe, 00000000.00000003.1332468447.0000000003038000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332468447.000000000302D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332212328.000000000309B000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2573908337.00000000013D0000.00000004.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332468447.0000000003099000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332232505.000000000302D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332856398.0000000003099000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332856398.000000000305A000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332232505.0000000003038000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1332393654.000000000305A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.python.org/download/releases/2.3/mro/. |
Source: main.exe, 00000000.00000003.1348835271.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574859343.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574801989.0000000003830000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://curl.haxx.se/ca/cacert.pem |
Source: main.exe, 00000000.00000002.2574859343.00000000038B0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://curl.haxx.se/ca/cacert.pemm |
Source: main.exe, 00000000.00000002.2574475208.0000000003500000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://github.com/shazow/urllib3/issues/497 |
Source: main.exe, 00000000.00000002.2574859343.00000000038B0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://lapi-test.lostallods.me/ |
Source: main.exe, 00000000.00000002.2574313008.000000000336A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lapi-test.lostallods.me/N) |
Source: main.exe, 00000000.00000002.2574859343.00000000038B0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://lapi-test.lostallods.me/S |
Source: main.exe, 00000000.00000002.2574255025.0000000003240000.00000004.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574475208.0000000003500000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings |
Source: main.exe, 00000000.00000002.2574610659.0000000003640000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://urllib3.readthedocs.io/en/latest/contrib.html#socks-proxies |
Source: main.exe, 00000000.00000002.2574610659.0000000003640000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://urllib3.readthedocs.io/en/latest/contrib.html#socks-proxiesSS |
Source: unknown | Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: main.exe, 00000000.00000002.2573448733.0000000000E2D000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamepython34.dll. vs main.exe |
Source: main.exe, 00000000.00000002.2575646998.000000001E291000.00000002.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamepython34.dll. vs main.exe |
Source: main.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal68.mine.winEXE@1/0@1/1 |
Source: C:\Users\user\Desktop\main.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: main.exe | Virustotal: Detection: 62% |
Source: main.exe | ReversingLabs: Detection: 26% |
Source: C:\Users\user\Desktop\main.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: msvcr100.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\main.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: main.exe | Static file information: File size 9991211 > 1048576 |
Source: main.exe | Static PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x11ce00 |
Source: main.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_hashlib.pdb source: main.exe, 00000000.00000003.1336636577.000000000369E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2575210716.0000000010089000.00000002.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\select.pdb source: main.exe, 00000000.00000002.2575274761.000000001D112000.00000002.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\python34.pdb source: main.exe, 00000000.00000002.2575498585.000000001E13C000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000002.2573448733.0000000000BC1000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_bz2.pdb source: main.exe, 00000000.00000002.2575327946.000000001D17B000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1334824069.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1334843105.00000000032C5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_ssl.pdb source: main.exe, 00000000.00000002.2574707564.0000000003756000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338364600.00000000038C1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_lzma.pdb source: main.exe, 00000000.00000003.1341830590.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1341830590.000000000342E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1341830590.000000000340E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574118063.0000000002C9B000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1343117396.000000000342E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_socket.pdb source: main.exe, 00000000.00000003.1335243352.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2573812589.0000000001087000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1335264303.00000000032C7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\unicodedata.pdb source: main.exe, 00000000.00000003.1339292813.0000000003858000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338978089.00000000037BF000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000002.2574938192.0000000003964000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338744463.00000000033C8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338744463.00000000033A8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1338744463.00000000033B8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\martin\34\python\PCbuild\_ctypes.pdb source: main.exe, 00000000.00000002.2575380562.000000001D1AF000.00000002.00001000.00020000.00000000.sdmp, main.exe, 00000000.00000003.1333755099.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.1333959411.00000000032C1000.00000004.00000020.00020000.00000000.sdmp |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: main.exe, 00000000.00000002.2573840441.000000000109E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\main.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |