Click to jump to signature section
Source: 00000002.00000002.3707374193.0000000002F41000.00000004.00000800.00020000.00000000.sdmp | Malware Configuration Extractor: Xworm {"C2 url": ["147.185.221.25"], "Port": 64864, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"} |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String decryptor: 147.185.221.25 |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String decryptor: 64864 |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String decryptor: <123456789> |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String decryptor: <Xwormmm> |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String decryptor: XWorm V5.6 |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String decryptor: USB.exe |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.23.227.215 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.25 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D4C720 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,InternetReadFile,FreeLibrary, | 0_2_00D4C720 |
Source: global traffic | HTTP traffic detected: GET /riskwca/cscacxxxc/raw/57e36afd330b4a708818d89630815ebf6212928c/fgbdbdfgb HTTP/1.1Accept: */*User-Agent: Chrome/95.0.4638.54Host: bitbucket.org |
Source: global traffic | HTTP traffic detected: GET /r/gsr1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog |
Source: global traffic | HTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog |
Source: MSBuild.exe, 00000002.00000002.3707374193.0000000002F41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.0000000000847000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.000000000077E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.0000000000770000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.0000000000847000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/riskwca/cscacxxxc/raw/57e36afd330b4a708818d89630815ebf6212928c/fgbdbdfgb |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.0000000000847000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/riskwca/cscacxxxc/raw/57e36afd330b4a708818d89630815ebf6212928c/fgbdbdfgb-i |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.0000000000847000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/riskwca/cscacxxxc/raw/57e36afd330b4a708818d89630815ebf6212928c/fgbdbdfgbYi |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: unknown | Network traffic detected: HTTP traffic on port 49672 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49686 |
Source: unknown | Network traffic detected: HTTP traffic on port 49678 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49679 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49680 |
Source: unknown | Network traffic detected: HTTP traffic on port 49686 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49680 -> 443 |
Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.3002860.5.raw.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.3002860.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000002.00000002.3705551633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000002.3706961787.0000000002FB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D572C0 | 0_2_00D572C0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D66220 | 0_2_00D66220 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D66580 | 0_2_00D66580 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D6E9B4 | 0_2_00D6E9B4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D5B96B | 0_2_00D5B96B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D5ECC0 | 0_2_00D5ECC0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D55CB7 | 0_2_00D55CB7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D64D79 | 0_2_00D64D79 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_01284410 | 2_2_01284410 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_012813A1 | 2_2_012813A1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C2A450 | 2_2_05C2A450 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C2AD30 | 2_2_05C2AD30 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C21588 | 2_2_05C21588 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C2BC20 | 2_2_05C2BC20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C20980 | 2_2_05C20980 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_065D2598 | 2_2_065D2598 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_065D3FF8 | 2_2_065D3FF8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_070C1398 | 2_2_070C1398 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_070C1C68 | 2_2_070C1C68 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_070C3BA8 | 2_2_070C3BA8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_070C1050 | 2_2_070C1050 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: String function: 00C914C0 appears 894 times | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: String function: 00D56150 appears 51 times | |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamemarco.exe4 vs SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FB8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamemarco.exe4 vs SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe |
Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.3002860.5.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.3002860.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000002.00000002.3705551633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000002.3706961787.0000000002FB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Helper.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Helper.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, AlgorithmAES.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Virustotal: Detection: 39% |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | ReversingLabs: Detection: 33% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: winmm.dll | Jump to behavior |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Messages.cs | .Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Messages.cs | .Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Messages.cs | .Net Code: Plugin System.AppDomain.Load(byte[]) |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Messages.cs | .Net Code: Memory System.AppDomain.Load(byte[]) |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, Messages.cs | .Net Code: Memory |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D4C720 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,InternetReadFile,FreeLibrary, | 0_2_00D4C720 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D55FE4 push ecx; ret | 0_2_00D55FF7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C20588 pushad ; retf | 2_2_05C20769 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_05C2D42F push 8B000003h; iretd | 2_2_05C2D434 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_065D6010 push eax; retf | 2_2_065D6011 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_065D9FD8 push es; ret | 2_2_065D9FE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 2_2_070C3741 push es; ret | 2_2_070C3750 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D4CA40 _Smanip,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,FreeLibrary,FreeLibrary, | 0_2_00D4CA40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706961787.0000000002FB8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.0000000000865000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3706284689.00000000010E7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe, 00000000.00000002.3706010238.000000000077E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW( |
Source: MSBuild.exe, 00000002.00000002.3706284689.00000000010E7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D4C720 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,InternetReadFile,FreeLibrary, | 0_2_00D4C720 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D561BE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00D561BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D5634D SetUnhandledExceptionFilter, | 0_2_00D5634D |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D56515 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00D56515 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D59F43 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00D59F43 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: 0_2_00D4CA40 _Smanip,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,FreeLibrary,FreeLibrary, | 0_2_00D4CA40 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 40C000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 40E000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: D48008 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 0_2_00D6E012 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetACP,IsValidCodePage,GetLocaleInfoW, | 0_2_00D6D694 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: EnumSystemLocalesW, | 0_2_00D6D991 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: EnumSystemLocalesW, | 0_2_00D6D946 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 0_2_00D6DAB7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: EnumSystemLocalesW, | 0_2_00D6DA2C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: EnumSystemLocalesW, | 0_2_00D66B34 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetLocaleInfoW, | 0_2_00D6DD0B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_00D6DE30 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetLocaleInfoW, | 0_2_00D66F8F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe | Code function: GetLocaleInfoW, | 0_2_00D6DF36 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: MSBuild.exe, 00000002.00000002.3706284689.00000000010E7000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3709157751.0000000006784000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: Yara match | File source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.3002860.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000002.00000002.3705551633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3706961787.0000000002FB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe PID: 6488, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: MSBuild.exe PID: 5588, type: MEMORYSTR |
Source: Yara match | File source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.3002860.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe.2fbb300.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000002.00000002.3705551633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3706961787.0000000002FB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3706961787.0000000002FD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: SecuriteInfo.com.Win32.RATX-gen.23694.15705.exe PID: 6488, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: MSBuild.exe PID: 5588, type: MEMORYSTR |