Click to jump to signature section
Source: q2e132qweertgd.exe.bin.exe | Virustotal: Detection: 73% | Perma Link |
Source: q2e132qweertgd.exe.bin.exe | ReversingLabs: Detection: 84% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: q2e132qweertgd.exe.bin.exe | String decryptor: https://pastebin.com/raw/64jXYT6E |
Source: q2e132qweertgd.exe.bin.exe | String decryptor: <DaGang> |
Source: q2e132qweertgd.exe.bin.exe | String decryptor: <Xwormmm> |
Source: q2e132qweertgd.exe.bin.exe | String decryptor: Fake XWorm |
Source: q2e132qweertgd.exe.bin.exe | String decryptor: RWorm |
Source: q2e132qweertgd.exe.bin.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: unknown | HTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.4:49719 version: TLS 1.2 |
Source: q2e132qweertgd.exe.bin.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: global traffic | TCP traffic: 192.168.2.4:49721 -> 23.84.85.170:1738 |
Source: global traffic | HTTP traffic detected: GET /raw/64jXYT6E HTTP/1.1Host: pastebin.comConnection: Keep-Alive |
Source: Joe Sandbox View | IP Address: 104.20.4.235 104.20.4.235 |
Source: Joe Sandbox View | IP Address: 104.20.4.235 104.20.4.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.84.85.170 |
Source: global traffic | HTTP traffic detected: GET /raw/64jXYT6E HTTP/1.1Host: pastebin.comConnection: Keep-Alive |
Source: q2e132qweertgd.exe.bin.exe, 00000000.00000002.3632704623.0000000002A71000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: q2e132qweertgd.exe.bin.exe, 00000000.00000002.3632704623.0000000002A71000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/raw/64jXYT6E |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown | HTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.4:49719 version: TLS 1.2 |
Source: Yara match | File source: Process Memory Space: q2e132qweertgd.exe.bin.exe PID: 7960, type: MEMORYSTR |
Source: q2e132qweertgd.exe.bin.exe, type: SAMPLE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: q2e132qweertgd.exe.bin.exe, type: SAMPLE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0.0.q2e132qweertgd.exe.bin.exe.7e0000.0.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 0.0.q2e132qweertgd.exe.bin.exe.7e0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000000.1176313217.00000000007E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process Stats: CPU usage > 49% |
Source: q2e132qweertgd.exe.bin.exe, 00000000.00000000.1176328946.00000000007F0000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameq2e132qweertgd.exe4 vs q2e132qweertgd.exe.bin.exe |
Source: q2e132qweertgd.exe.bin.exe | Binary or memory string: OriginalFilenameq2e132qweertgd.exe4 vs q2e132qweertgd.exe.bin.exe |
Source: q2e132qweertgd.exe.bin.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: q2e132qweertgd.exe.bin.exe, type: SAMPLE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: q2e132qweertgd.exe.bin.exe, type: SAMPLE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.0.q2e132qweertgd.exe.bin.exe.7e0000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 0.0.q2e132qweertgd.exe.bin.exe.7e0000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000000.1176313217.00000000007E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: q2e132qweertgd.exe.bin.exe, cnxdFwAVfKrF7Hvf0aDVk5e3riNyq.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: q2e132qweertgd.exe.bin.exe, cnxdFwAVfKrF7Hvf0aDVk5e3riNyq.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: q2e132qweertgd.exe.bin.exe, YgHjhkKi6RVzc36c6c5iqx2CFhcU3.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: q2e132qweertgd.exe.bin.exe, Pwkis2CZC8X99oO2Hd4O0I9MACMFNO61I5Un3yqaHJAc.cs | Base64 encoded string: 'QKV0VkhGHfuJAdp2JLWyQry1L9B6afTeEUagVfbtDBdwOb3MIIqFYJ/kuN+ApRU3' |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@1/0@1/2 |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Mutant created: NULL |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Mutant created: \Sessions\1\BaseNamedObjects\PPyQuRJ1a1Vw1mmd |
Source: q2e132qweertgd.exe.bin.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: q2e132qweertgd.exe.bin.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80% |
Source: q2e132qweertgd.exe.bin.exe | Virustotal: Detection: 73% |
Source: q2e132qweertgd.exe.bin.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Section loaded: winmm.dll | Jump to behavior |
Source: q2e132qweertgd.exe.bin.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: q2e132qweertgd.exe.bin.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: q2e132qweertgd.exe.bin.exe, lJPpAODL7qmSBFy0BobhDeibAyXoZiwIy7HeDePFUk3Z.cs | .Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Pwkis2CZC8X99oO2Hd4O0I9MACMFNO61I5Un3yqaHJAc.UFWrGA1WC7NVKiyhS6QWWftkGnL3jxuKfR9PzlfwACll,Pwkis2CZC8X99oO2Hd4O0I9MACMFNO61I5Un3yqaHJAc._8JZ8tu3hmVGZeHEbszmEKqBF0BCzgKjtzXESxeN5vcBi,Pwkis2CZC8X99oO2Hd4O0I9MACMFNO61I5Un3yqaHJAc.QkILzP9He1AOzqiYhmPWelUQ8USYGxJl1txUseQ68iol,Pwkis2CZC8X99oO2Hd4O0I9MACMFNO61I5Un3yqaHJAc.MVwSC2bMVFzxj9vyGqsxs6ZhHFXIpR6oyLBULc0Z4NLl,cnxdFwAVfKrF7Hvf0aDVk5e3riNyq.b2A21cXYfJ6FXqKRc4akzcHiPDqPP()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: q2e132qweertgd.exe.bin.exe, lJPpAODL7qmSBFy0BobhDeibAyXoZiwIy7HeDePFUk3Z.cs | .Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{n7xcSA20P9ze9CwITRX8A0V10xcBo[2],cnxdFwAVfKrF7Hvf0aDVk5e3riNyq._0BBBs7BMu6BTatSAIpdjXw4xsxOhN(Convert.FromBase64String(n7xcSA20P9ze9CwITRX8A0V10xcBo[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: q2e132qweertgd.exe.bin.exe, lJPpAODL7qmSBFy0BobhDeibAyXoZiwIy7HeDePFUk3Z.cs | .Net Code: PDOloscPpnylKlwgL6mQICTjM1umQMxI29wZpuyMD3Ja System.AppDomain.Load(byte[]) |
Source: q2e132qweertgd.exe.bin.exe, lJPpAODL7qmSBFy0BobhDeibAyXoZiwIy7HeDePFUk3Z.cs | .Net Code: cJXDkHqD8eME6fCA5DmbNyNf6X4gzsxLTUHIqJY3FRZo System.AppDomain.Load(byte[]) |
Source: q2e132qweertgd.exe.bin.exe, lJPpAODL7qmSBFy0BobhDeibAyXoZiwIy7HeDePFUk3Z.cs | .Net Code: cJXDkHqD8eME6fCA5DmbNyNf6X4gzsxLTUHIqJY3FRZo |
Source: q2e132qweertgd.exe.bin.exe, hggqAOWGf0ubeXSjF3q8ph5lJ58Xr.cs | High entropy of concatenated method names: '_44JhhaBWG688ydBgEalDUGuoyoegY', 'NRSOcveXw9HnljpG2GqAjzVt7wo9R', 'kbFaoDPbIGHHZmpFyzQM6L9Zn47EC', '_2M04wVe7iC0m58eLlKIs12vwOvev2jz6a691fBu6QgKfgLZwdYmGNAOpYWrGPN', 'iZcCG6LRiDaqZsoq9GFc0Eu6D9VMMlCgLSUJALUfYbY94dkX02AXQN85eTxdPa', 'ZIrIArB5WVylG7FfihEmJLQxz1VGXg4WiqYwhBoQcSS2ffqjqnl3zsY8U1QZNs', 'amIW1m1ZKKmMeOu9QivBsZPQ6JyCsbKhacRSIquoYaZQy6aZlvpyPf7roHqgkf', 'QPGY99ifGW9xNOmWQQZOxQ57xIN0SWPyEhp90V2BdxeFPmSwUGX887f4N7Xd41', 'O0tpM7OWHfqgWORkr7Ou1sDvpqnee0L3vrx4lOx5vW5Py3Df9CpZeX9PKkk9uW', 'ZJZKdWwc4zTPwwjHSMvnf3B0OClBJCFao1jj0inwwCcJGOQd9uCV6zhbwfB5JU' |
Source: q2e132qweertgd.exe.bin.exe, Pwkis2CZC8X99oO2Hd4O0I9MACMFNO61I5Un3yqaHJAc.cs | High entropy of concatenated method names: 'cnHttKAmfMMGWjnGuJDgjWXcO7iDJ', 'nrZ1VvZUNfrFr08VU2KUedqFEsTh3', 'nohIDAc9KzMM8LzfCU1E8cEMxMKA9', 'uhhC8o5zegwHJUAQbLBe5kZfVoYwl' |
Source: q2e132qweertgd.exe.bin.exe, Q2xNmgxhe94L3GYlXs6exJL7bk5Rjv3vBlDReypf4GnT.cs | High entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'RpexKZhO2YGWggOQRqMNB8rurFKkY', '_4l3QehojsKsRTdu5qsYTj2rQp0yva', 'EUu8a4cHEvH8wojWQSg0FME8aP5bm', 'PKor1gpCXHEVuaZpT4krCTk8ZiZ89' |
Source: q2e132qweertgd.exe.bin.exe, hnqIWUzgRz5IT4Rgp7hICGoIRcjNA4LTvwhwAUIVhEVZ.cs | High entropy of concatenated method names: 'XpMnkDopCuZPfCxV5X7DxWdVKaBYGdIMhmjLPj7znTRw', '_6md3gt2YrSojuBIkhjKRLOLtjYfBvU1Yx1fwvVImTddI', 'Ok9QFmTHjB2l1eAL7GeS21f376NI4PE76NCie6u5tXNs', 'UEecbTkWmXuZs2VUfVKgHPKUfA0dqtl0BIx5WcLjPYHz', 'BB4pKQkyqMC618WJbe1xio8jQdEPM', '_7edwp8CtPSfGQH8L8VhjWfwiKuDJ2', '_9G5hqskwrESy3dVC2kAkAqjwNCLfq', 'GPfRqsh6Sq6bA7gnxN6xwMGW4REvK', 'PPXj71WPM1UVeG5YT2n0HeMwnjAv1', 'nmIUnYNugKpZU8txZWePP34EH6TFU' |
Source: q2e132qweertgd.exe.bin.exe, OuFmlCNtoCyAtZy2uWCKKjx6Och5KFaw9MGZeXceUQT8.cs | High entropy of concatenated method names: 'rXHK6T4Tf3h9iIGsW7Q40AtLwujPdwhBT50p5KtDYb4b', 'OaMHYlWZlFNKkLBsohrZwkA5khrRB8FR0wXJ0hCw1AfK', '_1aVpux1z0oENcWfPVRMWTLr8giZggUGmdfolcnag92nk', '_64FtEFD9ROTpaYX2kY3xHwdAIrOYf6uqThYb91ed2B1m', 'qW2t4m6gd5iVPKEd0b2H9aXVULPvGzglEPg1DkQAnBL8', '_1lTdcaiovI5bxUG6bUqQWPAy9dnpPjhubWjWXbVvIuln', 'aAn9BvGHthXx4Ilqfy7QqNYriHPhN4y3QGrFYia98TG6', '_7TD6WFSvHJ2TID1PoXgu8o9rWKK9x489E9v7SO76c4dj', 'k3DyDvFSvzVWxOzpc1bI8TUblhyXULp4dd24mPvkEEir', 'puXYen8WGcqaFej4U1eAiHWtRZ7T9kOA2MMJ1CAKxCam' |
Source: q2e132qweertgd.exe.bin.exe, cnxdFwAVfKrF7Hvf0aDVk5e3riNyq.cs | High entropy of concatenated method names: 'PuLbw4cm8ighGjhaorqLU3TynVzOz', '_2FSkw5Hdh1D6kWXSaM3rQF6qJEfic', 'sWHstpVufUBPGFGB450Gy10cJd3B4', 'cCug26JHZE5Ij2ciMEdWXhosgIghx', 'fCQjavzYsGljT0Udi4EkwNHPd3S2M', 'fzzq0K9GHsr5msCNtOi1SvDI9vImO', '_7MONbDFPowMLAJIqRBTF7j72bjFhI', 'dR7PRUY8OC0i2D52WbILTwUP9daAt', 'M3rdNNyRk4GQRyWIAs8m3o70jlP8G', 'eSPnsRGx7XfrnCJsN9PqFuotfmfJh' |
Source: q2e132qweertgd.exe.bin.exe, YgHjhkKi6RVzc36c6c5iqx2CFhcU3.cs | High entropy of concatenated method names: 'tjb487PUhxxWiekG4m6wR9JF4JV1j', '_6nK0HgzXcNI9dywSRRiPy5d2xxOy7', 'rsimUB9p2OHyhczQkWXvfbS6XamGo', 'keDWwWgxll90GSfe7IQ8VZPcMqYwU', 'DOvPWiCz9jAfHX1OpLA4ncbRCCpHw' |
Source: q2e132qweertgd.exe.bin.exe, lJPpAODL7qmSBFy0BobhDeibAyXoZiwIy7HeDePFUk3Z.cs | High entropy of concatenated method names: 'XLvBXaQBY0TTHNabfxZgQq1OKkK3kLPdqXAsm3KVkBdp', 'PDOloscPpnylKlwgL6mQICTjM1umQMxI29wZpuyMD3Ja', 'dGHi2jtlZbpbALsuyp67CHAZK7RVBAsCdYYTU9OVtwz7', 'GbGe47hs6u3Qm1uX3HpOuXBusADC6qDFxMknafmbrOQJ', 'zDdLxMoqJajeoYqA8e9FcNsOu7qcd61iH10ntfka2e4h', 'cTLXb6lTe1nS1Th2eGIMMJKVjyXlwNQBmYsnMmR4Rhdl', 'zReTLjBbP90O18NnMUEq3dZwtymv38sUTE9ratMevU8T', 'y8ehiNTBAyYHCcjCBSKHv6mBWzL9ePu3adzN78HhzC3E', 'yCYSbyZrK1qdjnUvCfU4AfKoEtFJLGAvZx88YApB0Cym', 's09pYEOuTP7IrXnlYAFCJWMTWE2HhjfMpYoHWQ4EKBju' |
Source: q2e132qweertgd.exe.bin.exe, cZuD9jCt7mV5j9U7k3g1z8mFd6GSw.cs | High entropy of concatenated method names: 'mgzk46hCEloXQMqckwtwSsbAaYKWf', 'nJQikQmbi2PoleZALlHNm9MkRYmD3', 'b2yWwKzjckO3twF1JeC7REEqGGtjU', 'q1SbCA0e727sLllYGEQs8HKHlDmxP', 'Fy4z4zhl9ClgdJdWQDlOCdjcC6l5U' |
Source: Yara match | File source: Process Memory Space: q2e132qweertgd.exe.bin.exe PID: 7960, type: MEMORYSTR |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Yara match | File source: Process Memory Space: q2e132qweertgd.exe.bin.exe PID: 7960, type: MEMORYSTR |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Memory allocated: 1030000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | Memory allocated: 1AA70000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe TID: 7192 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe TID: 7216 | Thread sleep count: 3514 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe TID: 7216 | Thread sleep count: 6333 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: q2e132qweertgd.exe.bin.exe, 00000000.00000002.3631748987.0000000000D52000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Yara match | File source: Process Memory Space: q2e132qweertgd.exe.bin.exe PID: 7960, type: MEMORYSTR |
Source: q2e132qweertgd.exe.bin.exe, 00000000.00000002.3634114597.000000001BB40000.00000004.00000020.00020000.00000000.sdmp, q2e132qweertgd.exe.bin.exe, 00000000.00000002.3634114597.000000001BB7E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\q2e132qweertgd.exe.bin.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: Yara match | File source: q2e132qweertgd.exe.bin.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.q2e132qweertgd.exe.bin.exe.7e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1176313217.00000000007E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: q2e132qweertgd.exe.bin.exe PID: 7960, type: MEMORYSTR |
Source: Yara match | File source: q2e132qweertgd.exe.bin.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.q2e132qweertgd.exe.bin.exe.7e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1176313217.00000000007E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: q2e132qweertgd.exe.bin.exe PID: 7960, type: MEMORYSTR |