Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
12ss323fcw8gsd4bvd.exe

Overview

General Information

Sample name:12ss323fcw8gsd4bvd.exe
Analysis ID:1639740
MD5:e601c2b74b5310c0ca14d51e7f280e31
SHA1:964380d913023be7f01024ec1e1ad0a12b8ce09d
SHA256:f2a1a5c3caed37986a16eca229a0f4a8a84f124a056c8af296beb4c218f55eb7
Tags:bookingbraindemics-orgclickfixexefakecaptchaspam-itauser-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Adds a directory exclusion to Windows Defender
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Powershell Defender Exclusion

Classification

  • System is w10x64
  • 12ss323fcw8gsd4bvd.exe (PID: 7844 cmdline: "C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe" MD5: E601C2B74B5310C0CA14D51E7F280E31)
    • powershell.exe (PID: 8136 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8076 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • VTP1Ibi1ak.exe (PID: 772 cmdline: "C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe" MD5: 7994502ED5C8FFE9FC84E164B440124E)
  • VTP1Ibi1ak.exe (PID: 1908 cmdline: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe MD5: 7994502ED5C8FFE9FC84E164B440124E)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe", ParentImage: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe, ParentProcessId: 7844, ParentProcessName: 12ss323fcw8gsd4bvd.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", ProcessId: 8136, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe", ParentImage: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe, ParentProcessId: 7844, ParentProcessName: 12ss323fcw8gsd4bvd.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", ProcessId: 8136, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe", ParentImage: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe, ParentProcessId: 7844, ParentProcessName: 12ss323fcw8gsd4bvd.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", ProcessId: 8136, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe", ParentImage: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe, ParentProcessId: 7844, ParentProcessName: 12ss323fcw8gsd4bvd.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'", ProcessId: 8136, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: 12ss323fcw8gsd4bvd.exe, 00000003.00000002.2521955465.00007FF7ACC9E000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_5d495bdf-1
Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49723 version: TLS 1.2
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Proj\MegaCrypt\MonsterCrypt\out\build\x64-release\MonsterCrypt.pdb source: 12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.dr
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: global trafficTCP traffic: 192.168.2.5:49720 -> 46.4.119.125:7712
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
Source: VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
Source: VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/August:S
Source: VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/r:March:
Source: VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgy:Feb:Feb
Source: 12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.drString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: 12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.drString found in binary or memory: https://curl.se/docs/hsts.html
Source: 12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.drString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49723 version: TLS 1.2
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeProcess token adjusted: SecurityJump to behavior
Source: classification engineClassification label: mal60.evad.winEXE@8/6@1/3
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5736:120:WilError_03
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeFile created: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\Jump to behavior
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 12ss323fcw8gsd4bvd.exe, 00000003.00000002.2521955465.00007FF7AC1C7000.00000002.00000001.01000000.00000004.sdmp, 12ss323fcw8gsd4bvd.exe, 00000003.00000000.1274101733.00007FF7AC1C7000.00000002.00000001.01000000.00000004.sdmp, 12ss323fcw8gsd4bvd.exe, 00000003.00000002.2520774301.00000257C9F64000.00000004.00000020.00020000.00000000.sdmp, VTP1Ibi1ak.exe, 00000009.00000000.1281079166.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe, 00000009.00000002.2521051633.000002681CCF3000.00000004.00000020.00020000.00000000.sdmp, VTP1Ibi1ak.exe, 00000009.00000002.2522005948.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe, 0000000A.00000002.1310837494.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe, 0000000A.00000002.1309240478.0000024234A8B000.00000004.00000020.00020000.00000000.sdmp, VTP1Ibi1ak.exe, 0000000A.00000000.1304908077.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe.3.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: 12ss323fcw8gsd4bvd.exe, 00000003.00000002.2521955465.00007FF7AC1C7000.00000002.00000001.01000000.00000004.sdmp, 12ss323fcw8gsd4bvd.exe, 00000003.00000000.1274101733.00007FF7AC1C7000.00000002.00000001.01000000.00000004.sdmp, 12ss323fcw8gsd4bvd.exe, 00000003.00000002.2520774301.00000257C9F64000.00000004.00000020.00020000.00000000.sdmp, VTP1Ibi1ak.exe, 00000009.00000000.1281079166.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe, 00000009.00000002.2521051633.000002681CCF3000.00000004.00000020.00020000.00000000.sdmp, VTP1Ibi1ak.exe, 00000009.00000002.2522005948.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe, 0000000A.00000002.1310837494.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe, 0000000A.00000002.1309240478.0000024234A8B000.00000004.00000020.00020000.00000000.sdmp, VTP1Ibi1ak.exe, 0000000A.00000000.1304908077.00007FF69A976000.00000002.00000001.01000000.00000005.sdmp, VTP1Ibi1ak.exe.3.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: Accept-Additions
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: List-Help
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: MMHS-Exempted-Address
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: Originator-Return-Address
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: id-cmc-addExtensions
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: set-addPolicy
Source: 12ss323fcw8gsd4bvd.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectorycw-outbodyheadercw_out, wrote %zu %s bytes -> %zuWrite callback asked for PAUSE when not supportedcw_out, PAUSE requested by clientclient returned ERROR on write of %zu bytesFailure writing output to destination, passed %zu returned %zd notcw-out is%spausedcw-out done--:--:--%2lld:%02lld:%02lld%3lldd %02lldh%7lldd%5lld%4lldk%2lld.%0lldM%4lldM%2lld.%0lldG%4lldG%4lldT%4lldP** Resuming transfer from byte position %lld
Source: unknownProcess created: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe "C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe"
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeProcess created: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe "C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'"Jump to behavior
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeProcess created: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe "C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe"Jump to behavior
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 12ss323fcw8gsd4bvd.exeStatic file information: File size 15707648 > 1048576
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x135600
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xdb1000
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Proj\MegaCrypt\MonsterCrypt\out\build\x64-release\MonsterCrypt.pdb source: 12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.dr
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 12ss323fcw8gsd4bvd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeFile created: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6207Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3464Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8080Thread sleep count: 6207 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8148Thread sleep count: 3464 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2080Thread sleep time: -7378697629483816s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6
Source: VTP1Ibi1ak.exe, 0000000A.00000002.1309150073.000002423308F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeProcess token adjusted: DebugJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'"
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exeCode function: 3_2_00007FF7AC14D1C4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00007FF7AC14D1C4
Source: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Scheduled Task/Job
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Scheduled Task/Job
21
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1639740 Sample: 12ss323fcw8gsd4bvd.exe Startdate: 16/03/2025 Architecture: WINDOWS Score: 60 32 api.ipify.org 2->32 34 Joe Sandbox ML detected suspicious sample 2->34 36 Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet 2->36 38 Sigma detected: Suspicious Script Execution From Temp Folder 2->38 8 12ss323fcw8gsd4bvd.exe 2 2->8         started        12 VTP1Ibi1ak.exe 2->12         started        signatures3 process4 file5 24 C:\Users\user\AppData\...\VTP1Ibi1ak.exe, PE32+ 8->24 dropped 40 Adds a directory exclusion to Windows Defender 8->40 14 powershell.exe 23 8->14         started        17 VTP1Ibi1ak.exe 8->17         started        signatures6 process7 dnsIp8 42 Loading BitLocker PowerShell Module 14->42 20 WmiPrvSE.exe 14->20         started        22 conhost.exe 14->22         started        26 46.4.119.125, 49720, 7712 HETZNER-ASDE Germany 17->26 28 api.ipify.org 104.26.12.205, 443, 49723 CLOUDFLARENETUS United States 17->28 30 127.0.0.1 unknown unknown 17->30 signatures9 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
12ss323fcw8gsd4bvd.exe5%VirustotalBrowse
12ss323fcw8gsd4bvd.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.ipify.orgy:Feb:Feb0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
104.26.12.205
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.ipify.org/VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://api.ipify.org/r:March:VTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://curl.se/docs/hsts.html12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.drfalse
          high
          https://api.ipify.orgVTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://curl.se/docs/alt-svc.html12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.drfalse
              high
              https://api.ipify.org/August:SVTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://curl.se/docs/http-cookies.html12ss323fcw8gsd4bvd.exe, VTP1Ibi1ak.exe.3.drfalse
                  high
                  https://api.ipify.orgy:Feb:FebVTP1Ibi1ak.exe, 00000009.00000002.2520775737.000002681B214000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  46.4.119.125
                  unknownGermany
                  24940HETZNER-ASDEfalse
                  104.26.12.205
                  api.ipify.orgUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  127.0.0.1
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1639740
                  Start date and time:2025-03-16 06:37:15 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 51s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:19
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:12ss323fcw8gsd4bvd.exe
                  Detection:MAL
                  Classification:mal60.evad.winEXE@8/6@1/3
                  EGA Information:Failed
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 23.60.203.209, 4.245.163.56, 20.223.36.55, 150.171.28.10, 2.19.96.128
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target 12ss323fcw8gsd4bvd.exe, PID 7844 because there are no executed function
                  • Execution Graph export aborted for target VTP1Ibi1ak.exe, PID 772 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtCreateKey calls found.
                  TimeTypeDescription
                  01:38:08API Interceptor20x Sleep call for process: powershell.exe modified
                  06:38:09Task SchedulerRun new task: MSTR tsk path: C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.12.205LauncherV9.exeGet hashmaliciousLummaC StealerBrowse
                  • api.ipify.org/
                  Catch Me If You Can (2002) 1080p.BluRay.x264.Full 744MB.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/?format=xml
                  NightFixed 1.0.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  VibeCall.exeGet hashmaliciousRHADAMANTHYSBrowse
                  • api.ipify.org/
                  VRChat_ERP_Setup 1.0.0.msiGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  wEY98gM1Jj.ps1Get hashmaliciousLummaC StealerBrowse
                  • api.ipify.org/
                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  DeepLauncher.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  [Huawei] Contract for YouTube partners.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  api.ipify.orgPayment_Slip.pdf.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                  • 104.26.12.205
                  LauncherV9.exeGet hashmaliciousLummaC StealerBrowse
                  • 104.26.12.205
                  b0hgYat.exeGet hashmaliciousUnknownBrowse
                  • 172.67.74.152
                  Order.jsGet hashmaliciousAgentTeslaBrowse
                  • 172.67.74.152
                  VSAXXKuhCu.exeGet hashmaliciousAmadey, AsyncRATBrowse
                  • 104.26.12.205
                  https://pub-d8608ab2809441ca8bf5355b4fe14129.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                  • 172.67.74.152
                  invoice.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.12.205
                  http://mellifluous-brioche.netlify.app/Get hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  https://case-id-100052538.dafea.co.uk/Get hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  Software Installer.exeGet hashmaliciousUnknownBrowse
                  • 104.26.13.205
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSKYlzMNjRNn.exeGet hashmaliciousAZORultBrowse
                  • 66.235.200.145
                  SecuriteInfo.com.Win32.RATX-gen.20425.5895.exeGet hashmaliciousUnknownBrowse
                  • 104.21.32.1
                  SecuriteInfo.com.Win32.RATX-gen.3254.10881.exeGet hashmaliciousLummaC StealerBrowse
                  • 104.21.112.1
                  SecuriteInfo.com.Win64.Evo-gen.10253.22166.exeGet hashmaliciousUnknownBrowse
                  • 104.21.80.1
                  file.exeGet hashmaliciousVidarBrowse
                  • 172.64.41.3
                  file.exeGet hashmaliciousLummaC StealerBrowse
                  • 104.21.112.1
                  RootkitBuilder.exeGet hashmaliciousUnknownBrowse
                  • 172.67.19.24
                  RootkitBuilder.exeGet hashmaliciousUnknownBrowse
                  • 172.67.19.24
                  ImageG.exeGet hashmaliciousNovaSentinelBrowse
                  • 104.21.6.223
                  ImageG.exeGet hashmaliciousNovaSentinelBrowse
                  • 172.64.41.3
                  HETZNER-ASDEna.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  na.elfGet hashmaliciousPrometeiBrowse
                  • 88.198.246.242
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bd0bf25947d4a37404f0424edf4db9ad1.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  valorant_ESP_aimbot.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  setup.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  Cb523jmji0.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  leFhB1aYaW.exeGet hashmaliciousDCRatBrowse
                  • 104.26.12.205
                  Loader.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  1.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  setup.msiGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  5bf784.msiGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  34.exeGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  No context
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):1.1940658735648508
                  Encrypted:false
                  SSDEEP:3:Nlllul/nq/llh:NllUyt
                  MD5:AB80AD9A08E5B16132325DF5584B2CBE
                  SHA1:F7411B7A5826EE6B139EBF40A7BEE999320EF923
                  SHA-256:5FBE5D71CECADD2A3D66721019E68DD78C755AA39991A629AE81C77B531733A4
                  SHA-512:9DE2FB33C0EA36E1E174850AD894659D6B842CD624C1A543B2D391C8EBC74719F47FA88D0C4493EA820611260364C979C9CDF16AF1C517132332423CA0CB7654
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:@...e................................................@..........
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):13577216
                  Entropy (8bit):6.668299283121651
                  Encrypted:false
                  SSDEEP:196608:V28BF5UoykUxv987qMNR4Ok/RDpgPnqSuR3pfRkGJ6:Q8BhUxFUqMNR4Ok5DpgPnqSuR3pfRZ6
                  MD5:7994502ED5C8FFE9FC84E164B440124E
                  SHA1:3BF7C1BE79C753352B5A6787FB10D84918897887
                  SHA-256:D6DC19434F42EAD855996F06F8292266D3DCEDEAB440F7DDD9F1710BADCF5C11
                  SHA-512:5F41ED0FF3F3E062815CCA49D0A77842DB11B24F39B46BDF658D7F9CA3B2A7F80C164F64D8B71A827E7C7C40F2B5A13C2A6C3A92F09A34F86EABE5110A458C1A
                  Malicious:true
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0@XO^.XO^.XO^..7].PO^..7[..O^..7Z.JO^.H..YO^.H.].RO^.H.Z.HO^.H.[..O^...Z.iO^..7_.SO^.XO_..O^...[.nO^....YO^...\.YO^.RichXO^.........................PE..d...v..g.........."....).J.....................@..........................................`.....................................................x....@.......P...............P...&......T.......................(.......@............`...............................text....I.......J.................. ..`.rdata..v....`.......N..............@..@.data....N.......,..................@....pdata.......P......................@..@.rsrc........@......................@..@.reloc...&...P...(..................@..B........................................................................................................................................................................................................................
                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                  Entropy (8bit):6.632052018237946
                  TrID:
                  • Win64 Executable GUI (202006/5) 92.65%
                  • Win64 Executable (generic) (12005/4) 5.51%
                  • Generic Win/DOS Executable (2004/3) 0.92%
                  • DOS Executable Generic (2002/1) 0.92%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:12ss323fcw8gsd4bvd.exe
                  File size:15'707'648 bytes
                  MD5:e601c2b74b5310c0ca14d51e7f280e31
                  SHA1:964380d913023be7f01024ec1e1ad0a12b8ce09d
                  SHA256:f2a1a5c3caed37986a16eca229a0f4a8a84f124a056c8af296beb4c218f55eb7
                  SHA512:be5af5ab1149e7136b0736c1fa026611205fcbfcfa4f40feefb3b908cb29867da741ac69f475c67ea6624068122d4df88dcab6a5493a7a3f9c3a500bc164c794
                  SSDEEP:393216:FBl8BhUxFUqMNR4Ok5DpgPnqSuR3pfRZ6:FBl8BWGbGZ
                  TLSH:DAF6AE66A6B800E9D47B8078C9965617E772741903F097DB269457FA2F23BE03F3BB40
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0@XO^.XO^.XO^..7].PO^..7[..O^..7Z.JO^.H...YO^.H.].RO^.H.Z.HO^.H.[..O^...Z.iO^..7_.SO^.XO_..O^...[.nO^.....YO^...\.YO^.RichXO^
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x1400bc5e0
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x67D402AE [Fri Mar 14 10:19:26 2025 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:c9d1ef3b58371b8177b0a6ccbdd16831
                  Instruction
                  dec eax
                  sub esp, 28h
                  call 00007FBD38BE48A0h
                  dec eax
                  add esp, 28h
                  jmp 00007FBD38BE3AD7h
                  int3
                  int3
                  inc eax
                  push ebx
                  dec eax
                  sub esp, 20h
                  dec eax
                  mov ebx, ecx
                  xor ecx, ecx
                  call dword ptr [0007AD83h]
                  dec eax
                  mov ecx, ebx
                  call dword ptr [0007AD72h]
                  call dword ptr [0007AA54h]
                  dec eax
                  mov ecx, eax
                  mov edx, C0000409h
                  dec eax
                  add esp, 20h
                  pop ebx
                  dec eax
                  jmp dword ptr [0007AD68h]
                  dec eax
                  mov dword ptr [esp+08h], ecx
                  dec eax
                  sub esp, 38h
                  mov ecx, 00000017h
                  call dword ptr [0007AD5Ch]
                  test eax, eax
                  je 00007FBD38BE3CC9h
                  mov ecx, 00000002h
                  int 29h
                  dec eax
                  lea ecx, dword ptr [00E2EE22h]
                  call 00007FBD38BE3FA2h
                  dec eax
                  mov eax, dword ptr [esp+38h]
                  dec eax
                  mov dword ptr [00E2EF09h], eax
                  dec eax
                  lea eax, dword ptr [esp+38h]
                  dec eax
                  add eax, 08h
                  dec eax
                  mov dword ptr [00E2EE99h], eax
                  dec eax
                  mov eax, dword ptr [00E2EEF2h]
                  dec eax
                  mov dword ptr [00E2ED63h], eax
                  dec eax
                  mov eax, dword ptr [esp+40h]
                  dec eax
                  mov dword ptr [00E2EE67h], eax
                  mov dword ptr [00E2ED3Dh], C0000409h
                  mov dword ptr [00E2ED37h], 00000001h
                  mov dword ptr [00E2ED41h], 00000001h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xee6adc0x78.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xefc0000x1e0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xeed0000xecf4.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xefd0000x26ec.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xec77100x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0xec7a000x28.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xec75d00x140.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x1370000x590.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x1355040x135600c40b3b7d5a759f7cee56e4689c7d9cedFalse0.41537799873737374data6.500046775555982IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x1370000xdb0e9e0xdb100045f00b919953cc3839c18cf8bd59958eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xee80000x4efc0x2c0044cdb414f75f2b532be0be900f427e68False0.15651633522727273data3.849439099818337IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .pdata0xeed0000xecf40xee00f1272e01fdfd4679e46dcc0035fd8585False0.5142463235294118data6.155924453292642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0xefc0000x1e00x200f76a35e599edda0377fd46c32a79f7e8False0.53515625data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xefd0000x26ec0x28007631a572a4840f33345dd3075f47c4afFalse0.59384765625data6.3158741907646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_MANIFEST0xefc0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                  DLLImport
                  ntdll.dllRtlLookupFunctionEntry, RtlCaptureContext, RtlVirtualUnwind, RtlPcToFileHeader, RtlUnwindEx, RtlLeaveCriticalSection, RtlEnterCriticalSection, NtAllocateVirtualMemory, LdrEnumerateLoadedModules, RtlUnwind
                  KERNEL32.dllGetCommandLineA, SetEndOfFile, LoadLibraryA, ExitProcess, CreateDirectoryA, SetFileAttributesA, GetTempPathA, CloseHandle, WaitForSingleObject, CreateProcessA, GetCurrentProcess, GetModuleFileNameW, lstrcpyW, lstrcatW, GetLastError, VirtualProtect, VirtualQueryEx, ReadProcessMemory, WriteProcessMemory, GetSystemInfo, GetCommandLineW, VirtualFree, VirtualQuery, GetProcAddress, OutputDebugStringA, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, GetLargePageMinimum, GetTimeZoneInformation, GetOEMCP, GetACP, WriteConsoleW, SetStdHandle, OutputDebugStringW, GetProcessHeap, SetEnvironmentVariableW, GetEnvironmentStringsW, VirtualAlloc, EncodePointer, IsValidCodePage, SetConsoleCtrlHandler, HeapQueryInformation, HeapSize, HeapReAlloc, LocalFree, FormatMessageA, GetLocaleInfoEx, SetCurrentDirectoryW, GetCurrentDirectoryW, CreateDirectoryW, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetDiskFreeSpaceExW, GetFileAttributesW, GetFileAttributesExW, GetFileInformationByHandle, GetFinalPathNameByHandleW, GetFullPathNameW, SetFileAttributesW, SetFileInformationByHandle, SetFileTime, GetTempPathW, AreFileApisANSI, DeviceIoControl, GetModuleHandleW, CreateDirectoryExW, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, MultiByteToWideChar, WideCharToMultiByte, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetCurrentThreadId, InitializeCriticalSectionEx, ReadConsoleW, DecodePointer, LCMapStringEx, QueryPerformanceCounter, QueryPerformanceFrequency, InitOnceExecuteOnce, CreateEventExW, CreateSemaphoreExW, FlushProcessWriteBuffers, GetCurrentProcessorNumber, GetSystemTimeAsFileTime, GetTickCount64, FreeLibraryWhenCallbackReturns, CreateThreadpoolTimer, SetThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, SetThreadpoolWait, CloseThreadpoolWait, GetStringTypeW, CompareStringEx, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, WakeAllConditionVariable, SleepConditionVariableSRW, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetModuleHandleExW, GetStdHandle, WriteFile, GetCurrentThread, HeapAlloc, HeapFree, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, FreeEnvironmentStringsW
                  SHELL32.dllSHGetKnownFolderPath
                  ole32.dllCoInitializeEx, CoUninitialize, CoTaskMemFree, CoGetObject
                  ADVAPI32.dllOpenProcessToken, GetTokenInformation
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 16, 2025 06:38:08.193190098 CET497207712192.168.2.546.4.119.125
                  Mar 16, 2025 06:38:08.198728085 CET77124972046.4.119.125192.168.2.5
                  Mar 16, 2025 06:38:08.198811054 CET497207712192.168.2.546.4.119.125
                  Mar 16, 2025 06:38:08.231427908 CET49723443192.168.2.5104.26.12.205
                  Mar 16, 2025 06:38:08.231457949 CET44349723104.26.12.205192.168.2.5
                  Mar 16, 2025 06:38:08.231533051 CET49723443192.168.2.5104.26.12.205
                  Mar 16, 2025 06:38:08.246609926 CET49723443192.168.2.5104.26.12.205
                  Mar 16, 2025 06:38:08.246644020 CET44349723104.26.12.205192.168.2.5
                  Mar 16, 2025 06:38:08.681760073 CET44349723104.26.12.205192.168.2.5
                  Mar 16, 2025 06:38:08.681839943 CET49723443192.168.2.5104.26.12.205
                  Mar 16, 2025 06:38:08.784522057 CET49723443192.168.2.5104.26.12.205
                  Mar 16, 2025 06:38:08.784641981 CET44349723104.26.12.205192.168.2.5
                  Mar 16, 2025 06:38:08.784720898 CET49723443192.168.2.5104.26.12.205
                  Mar 16, 2025 06:38:08.784790039 CET497207712192.168.2.546.4.119.125
                  Mar 16, 2025 06:38:08.789572001 CET77124972046.4.119.125192.168.2.5
                  Mar 16, 2025 06:38:08.971412897 CET77124972046.4.119.125192.168.2.5
                  Mar 16, 2025 06:38:09.021212101 CET497207712192.168.2.546.4.119.125
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 16, 2025 06:38:08.218269110 CET6484953192.168.2.51.1.1.1
                  Mar 16, 2025 06:38:08.224929094 CET53648491.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Mar 16, 2025 06:38:08.218269110 CET192.168.2.51.1.1.10x3a2fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Mar 16, 2025 06:38:08.224929094 CET1.1.1.1192.168.2.50x3a2fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                  Mar 16, 2025 06:38:08.224929094 CET1.1.1.1192.168.2.50x3a2fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                  Mar 16, 2025 06:38:08.224929094 CET1.1.1.1192.168.2.50x3a2fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:3
                  Start time:01:38:06
                  Start date:16/03/2025
                  Path:C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\12ss323fcw8gsd4bvd.exe"
                  Imagebase:0x7ff7ac090000
                  File size:15'707'648 bytes
                  MD5 hash:E601C2B74B5310C0CA14D51E7F280E31
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Target ID:6
                  Start time:01:38:06
                  Start date:16/03/2025
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe'"
                  Imagebase:0x7ff7785e0000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:7
                  Start time:01:38:06
                  Start date:16/03/2025
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7e2000000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:9
                  Start time:01:38:07
                  Start date:16/03/2025
                  Path:C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe"
                  Imagebase:0x7ff69a840000
                  File size:13'577'216 bytes
                  MD5 hash:7994502ED5C8FFE9FC84E164B440124E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Target ID:10
                  Start time:01:38:09
                  Start date:16/03/2025
                  Path:C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\AppData\Local\Temp\hjN43jS1b3\VTP1Ibi1ak.exe
                  Imagebase:0x7ff69a840000
                  File size:13'577'216 bytes
                  MD5 hash:7994502ED5C8FFE9FC84E164B440124E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:11
                  Start time:01:38:10
                  Start date:16/03/2025
                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Imagebase:0x7ff686060000
                  File size:496'640 bytes
                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                  Has elevated privileges:true
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Reset < >
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2521866916.00007FF7AC091000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7AC090000, based on PE: true
                    • Associated: 00000003.00000002.2521850819.00007FF7AC090000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2521955465.00007FF7AC1C7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2521955465.00007FF7ACBC7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2521955465.00007FF7ACC57000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2521955465.00007FF7ACC67000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2521955465.00007FF7ACC9E000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2522805204.00007FF7ACF78000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2522818603.00007FF7ACF79000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2522831680.00007FF7ACF7A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000003.00000002.2522844733.00007FF7ACF7D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_7ff7ac090000_12ss323fcw8gsd4bvd.jbxd
                    Similarity
                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                    • String ID:
                    • API String ID: 2933794660-0
                    • Opcode ID: a6006fd8090311c3decfff00a790c14e22b9a71e63de97fed92142b9ea7b788d
                    • Instruction ID: de9daf6d98e27ec5b641e812d21d791f5cff64d7f036275f39029c425a3d7873
                    • Opcode Fuzzy Hash: a6006fd8090311c3decfff00a790c14e22b9a71e63de97fed92142b9ea7b788d
                    • Instruction Fuzzy Hash: B2114862B19F019AEB00AB60E8552B873B4FB19758F851E31EA2D467A4DF78D194C390
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.2521920720.00007FF69A841000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF69A840000, based on PE: true
                    • Associated: 00000009.00000002.2521904393.00007FF69A840000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522005948.00007FF69A976000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522005948.00007FF69B2D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522005948.00007FF69B2E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522005948.00007FF69B317000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522709187.00007FF69B520000.00000004.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522724824.00007FF69B521000.00000008.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522743592.00007FF69B522000.00000004.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000009.00000002.2522758906.00007FF69B525000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_7ff69a840000_VTP1Ibi1ak.jbxd
                    Similarity
                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                    • String ID:
                    • API String ID: 2933794660-0
                    • Opcode ID: 56ebb1c09139a98f3e47967b799df54b3e68fbe0086275fced64051825164333
                    • Instruction ID: 137b3de73c6a2b317618e70f293b6722630157de8114685e0ee6d0bc3635c1e7
                    • Opcode Fuzzy Hash: 56ebb1c09139a98f3e47967b799df54b3e68fbe0086275fced64051825164333
                    • Instruction Fuzzy Hash: 9F115A22B15F058AEB10CF60E8442B833A4FB58B58F040E75EB6DC67A4EF38E1948340