Click to jump to signature section
Source: Service.exe | Virustotal: Detection: 25% | Perma Link |
Source: Service.exe | ReversingLabs: Detection: 31% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.9% probability |
Source: Service.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: \LoaderV2\ClientLoader\x64\Release\ClientLoader.pdb) source: Service.exe |
Source: | Binary string: \LoaderV2\ClientLoader\x64\Release\ClientLoader.pdb source: Service.exe |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620823160 FindFirstFileExW, | 0_2_00007FF620823160 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF6208020B0 InternetOpenA,GetLastError,InternetOpenUrlA,GetLastError,InternetCloseHandle,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_invalid_parameter_noinfo_noreturn, http://api.ipify.org | 0_2_00007FF6208020B0 |
Source: global traffic | TCP traffic: 192.168.2.7:49681 -> 89.208.104.175:5000 |
Source: unknown | DNS query: name: api.ipify.org |
Source: unknown | DNS query: name: api.ipify.org |
Source: unknown | TCP traffic detected without corresponding DNS query: 89.208.104.175 |
Source: unknown | TCP traffic detected without corresponding DNS query: 89.208.104.175 |
Source: unknown | TCP traffic detected without corresponding DNS query: 89.208.104.175 |
Source: unknown | TCP traffic detected without corresponding DNS query: 89.208.104.175 |
Source: unknown | TCP traffic detected without corresponding DNS query: 89.208.104.175 |
Source: unknown | TCP traffic detected without corresponding DNS query: 89.208.104.175 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620802820 CreateProcessA,GetLastError,WaitForSingleObject,GetExitCodeProcess,GetLastError,CloseHandle,CloseHandle,CloseHandle,CloseHandle,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,recv,SHGetFolderPathA,send,CreateDirectoryA,GetLastError,send,ShellExecuteA,send,send,send,send,recv,WSAGetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF620802820 |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: IPRetrieverHost: api.ipify.orgCache-Control: no-cache |
Source: global traffic | DNS traffic detected: DNS query: api.ipify.org |
Source: Service.exe | String found in binary or memory: http://api.ipify.org |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C11000.00000004.00000020.00020000.00000000.sdmp, Service.exe, 00000000.00000002.2104089865.00000297D3C29000.00000004.00000020.00020000.00000000.sdmp, Service.exe, 00000000.00000002.2104089865.00000297D3C3B000.00000004.00000020.00020000.00000000.sdmp, Service.exe, 00000000.00000002.2104089865.00000297D3BBB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/ |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/6f |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C29000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/Fv |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C29000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/HF |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C29000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/pF |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org8f |
Source: Service.exe | String found in binary or memory: http://api.ipify.orgInternetOpenUrl |
Source: Service.exe, 00000000.00000002.2103680091.000000A37BD49000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://api.pifk |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620802820 | 0_2_00007FF620802820 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF6208038F0 | 0_2_00007FF6208038F0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF6208020B0 | 0_2_00007FF6208020B0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62081A1C8 | 0_2_00007FF62081A1C8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620823160 | 0_2_00007FF620823160 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620813AD4 | 0_2_00007FF620813AD4 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62081FAB0 | 0_2_00007FF62081FAB0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620826404 | 0_2_00007FF620826404 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620802390 | 0_2_00007FF620802390 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620812B7C | 0_2_00007FF620812B7C |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62081DBAC | 0_2_00007FF62081DBAC |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF6208135C8 | 0_2_00007FF6208135C8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620827DE8 | 0_2_00007FF620827DE8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620816DE0 | 0_2_00007FF620816DE0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620829D68 | 0_2_00007FF620829D68 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62081655C | 0_2_00007FF62081655C |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620812D80 | 0_2_00007FF620812D80 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF6208296CC | 0_2_00007FF6208296CC |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62081E6C0 | 0_2_00007FF62081E6C0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620824EF4 | 0_2_00007FF620824EF4 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620805E40 | 0_2_00007FF620805E40 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620818E80 | 0_2_00007FF620818E80 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620822004 | 0_2_00007FF620822004 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620815F90 | 0_2_00007FF620815F90 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620812F84 | 0_2_00007FF620812F84 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62081E040 | 0_2_00007FF62081E040 |
Source: C:\Users\user\Desktop\Service.exe | Code function: String function: 00007FF620808400 appears 31 times | |
Source: classification engine | Classification label: mal56.winEXE@1/1@1/2 |
Source: C:\Users\user\Desktop\Service.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\H2M3G1OR.txt | Jump to behavior |
Source: Service.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Service.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: Service.exe | Virustotal: Detection: 25% |
Source: Service.exe | ReversingLabs: Detection: 31% |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 | Jump to behavior |
Source: Service.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: Service.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Service.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: \LoaderV2\ClientLoader\x64\Release\ClientLoader.pdb) source: Service.exe |
Source: | Binary string: \LoaderV2\ClientLoader\x64\Release\ClientLoader.pdb source: Service.exe |
Source: Service.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: Service.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: Service.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: Service.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: Service.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\Service.exe TID: 7080 | Thread sleep time: -90000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\Service.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620823160 FindFirstFileExW, | 0_2_00007FF620823160 |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C3B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWq2/ |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3C3B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Service.exe, 00000000.00000002.2104089865.00000297D3BBB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW d |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620815AA8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF620815AA8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF6208276F4 GetProcessHeap, | 0_2_00007FF6208276F4 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF620815AA8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF620815AA8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62080CAAC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF62080CAAC |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62080CC50 SetUnhandledExceptionFilter, | 0_2_00007FF62080CC50 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62080C028 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00007FF62080C028 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62082CBC0 cpuid | 0_2_00007FF62082CBC0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_00007FF6208271F8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW, | 0_2_00007FF620826994 |
Source: C:\Users\user\Desktop\Service.exe | Code function: GetLocaleInfoW, | 0_2_00007FF6208272A8 |
Source: C:\Users\user\Desktop\Service.exe | Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 0_2_00007FF6208273DC |
Source: C:\Users\user\Desktop\Service.exe | Code function: GetLocaleInfoW, | 0_2_00007FF62081D3E4 |
Source: C:\Users\user\Desktop\Service.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF620826CF0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF620826DC0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF62081CF0C |
Source: C:\Users\user\Desktop\Service.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 0_2_00007FF620826E58 |
Source: C:\Users\user\Desktop\Service.exe | Code function: GetLocaleInfoW, | 0_2_00007FF6208270A0 |
Source: C:\Users\user\Desktop\Service.exe | Code function: 0_2_00007FF62080C9A0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_00007FF62080C9A0 |