Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
Analysis ID:1663899
MD5:44269f3383c745b0656f94ebdf04bb4c
SHA1:c5406153af11c61f10cbc1d49cec53654d3649f0
SHA256:0303f9d6082240e16f0d503cf900f5f378a5cf906088a7c6312f58ad50472d8a
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected GhostRat
.NET source code contains potential unpacker
AI detected suspicious PE digital signature
Drops VBS files to the startup folder
Drops large PE files
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (SLDT)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe (PID: 6700 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe" MD5: 44269F3383C745B0656F94EBDF04BB4C)
    • MSBuild.exe (PID: 7428 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" MD5: 2EDD0B288FE2459DA84E4274D1942343)
  • wscript.exe (PID: 7396 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • overmelod.exe (PID: 7468 cmdline: "C:\Users\user\AppData\Local\Temp\overmelod.exe" MD5: 55F39A32209CCB51775828EB07A3DA96)
      • MSBuild.exe (PID: 7632 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" MD5: 2EDD0B288FE2459DA84E4274D1942343)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1344510463.0000018E54D9E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.1655849966.0000018E5B780000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000009.00000002.1416648850.0000018895C72000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e5b780000.8.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e5b780000.8.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

                System Summary

                barindex
                Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 104.26.12.205, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7428, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49723
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" , ProcessId: 7396, ProcessName: wscript.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" , ProcessId: 7396, ProcessName: wscript.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, ProcessId: 6700, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-04-12T21:33:35.618499+020020612001A Network Trojan was detected192.168.2.44972045.227.252.1997712TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeAvira: detected
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeAvira: detection malicious, Label: HEUR/AGEN.1313033
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeReversingLabs: Detection: 19%
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeVirustotal: Detection: 20%Perma Link
                Source: Submited SampleNeural Call Log Analysis: 100.0%
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_249974ab-b
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49723 version: TLS 1.2
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: .pdbz?x source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 4x nop then jmp 00007FFC3DDB1576h9_2_00007FFC3DDB136E
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 4x nop then jmp 00007FFC3DF76A23h9_2_00007FFC3DF765FB
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 4x nop then jmp 00007FFC3DF76A23h9_2_00007FFC3DF76A16

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2061200 - Severity 1 - ET MALWARE Aurotun Stealer CnC Checkin : 192.168.2.4:49720 -> 45.227.252.199:7712
                Source: global trafficTCP traffic: 192.168.2.4:49720 -> 45.227.252.199:7712
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewASN Name: WS171-ASRU WS171-ASRU
                Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: unknownTCP traffic detected without corresponding DNS query: 45.227.252.199
                Source: global trafficHTTP traffic detected: GET /r/gsr1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
                Source: global trafficHTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: c.pki.goog
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/US
                Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgk
                Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgptography
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894681000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drString found in binary or memory: https://sectigo.com/CPS0
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49723 version: TLS 1.2

                System Summary

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile dump: overmelod.exe.0.dr 298710982Jump to dropped file
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DD970800_2_00007FFC3DD97080
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DD905100_2_00007FFC3DD90510
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DD9D0F00_2_00007FFC3DD9D0F0
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DDB73C99_2_00007FFC3DDB73C9
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DDBBDD49_2_00007FFC3DDBBDD4
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DD970809_2_00007FFC3DD97080
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DD905109_2_00007FFC3DD90510
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DD9D0F09_2_00007FFC3DD9D0F0
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF59BB89_2_00007FFC3DF59BB8
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF59BD89_2_00007FFC3DF59BD8
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF59C189_2_00007FFC3DF59C18
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5DFD19_2_00007FFC3DF5DFD1
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5DFF09_2_00007FFC3DF5DFF0
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5781D9_2_00007FFC3DF5781D
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF51C8D9_2_00007FFC3DF51C8D
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5EE489_2_00007FFC3DF5EE48
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5EE589_2_00007FFC3DF5EE58
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5830F9_2_00007FFC3DF5830F
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF5D2149_2_00007FFC3DF5D214
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF6CD109_2_00007FFC3DF6CD10
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF71B2D9_2_00007FFC3DF71B2D
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF6D4499_2_00007FFC3DF6D449
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF782E59_2_00007FFC3DF782E5
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF731A19_2_00007FFC3DF731A1
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: invalid certificate
                Source: overmelod.exe.0.drStatic PE information: No import functions for PE file found
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: No import functions for PE file found
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRdvlcvkrhps.dll" vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000000.1194583552.0000018E406DC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametl_test_video.exe: vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeBinary or memory string: OriginalFilenametl_test_video.exe: vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, abl.csCryptographic APIs: 'CreateDecryptor'
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, zu.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@8/2@2/3
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMutant created: NULL
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMutant created: \Sessions\1\BaseNamedObjects\Rkodxebqn
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Mutant-3563EDB20EFE8B836FF5BB7F6C4FB7D17B73C53114B51E5BABA26D2280D33D9C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile created: C:\Users\user\AppData\Local\Temp\overmelod.exeJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs"
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E559D8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.00000188952B8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898B4B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.0000000140000000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E559D8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.00000188952B8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898B4B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.0000000140000000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeReversingLabs: Detection: 19%
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeVirustotal: Detection: 20%
                Source: MSBuild.exeString found in binary or memory: Accept-Additions
                Source: MSBuild.exeString found in binary or memory: List-Help
                Source: MSBuild.exeString found in binary or memory: MMHS-Exempted-Address
                Source: MSBuild.exeString found in binary or memory: Originator-Return-Address
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\overmelod.exe "C:\Users\user\AppData\Local\Temp\overmelod.exe"
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\overmelod.exe "C:\Users\user\AppData\Local\Temp\overmelod.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic file information: File size 6614144 > 1048576
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x618800
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: .pdbz?x source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr

                Data Obfuscation

                barindex
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e5b780000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e5b780000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1344510463.0000018E54D9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1655849966.0000018E5B780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1416648850.0000018895C72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe PID: 6700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: overmelod.exe PID: 7468, type: MEMORYSTR
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeStatic PE information: real checksum: 0x652a98 should be: 0x650542
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DD900BD pushad ; iretd 0_2_00007FFC3DD900C1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DE3C350 push es; ret 0_2_00007FFC3DE3C351
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DF46F75 push eax; iretd 0_2_00007FFC3DF46F76
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeCode function: 0_2_00007FFC3DF4B670 push ds; iretd 0_2_00007FFC3DF4B671
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DDC3E78 pushad ; retf 9_2_00007FFC3DDC3F59
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DDC55CB push ebx; iretd 9_2_00007FFC3DDC55DA
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DDC3F6D pushad ; retf 9_2_00007FFC3DDC3F59
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DD900BD pushad ; iretd 9_2_00007FFC3DD900C1
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF58C50 push eax; ret 9_2_00007FFC3DF58CBC
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF46F75 push eax; iretd 9_2_00007FFC3DF46F76
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF85487 push ds; iretd 9_2_00007FFC3DF8556F
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF75921 push ds; retf 9_2_00007FFC3DF7596F

                Persistence and Installation Behavior

                barindex
                Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple high-risk indicators present: 1) Signature is invalid with verification failure - critical red flag. 2) Organization 'FLASH-INTEGRO LLC' from Uzbekistan (UZ) raises concerns due to geographic location and limited reputation. 3) Compilation timestamp (Apr 9, 2025) is very recent and close to current date (Apr 12, 2025), which is common in malware. 4) While Sectigo is a known Certificate Authority, the invalid signature nullifies any trust. 5) The certificate is technically still within validity period (Nov 2022 - Nov 2025) but the signature validation failure overrides this. The combination of an invalid signature, recent compilation, and entity from a higher-risk region strongly suggests this is likely malicious code.
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile created: C:\Users\user\AppData\Local\Temp\overmelod.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbsJump to dropped file
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory allocated: 18E40930000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory allocated: 18E5A420000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory allocated: 188829C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory allocated: 1889C670000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeCode function: 9_2_00007FFC3DF7C998 sldt word ptr [eax]9_2_00007FFC3DF7C998
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: wscript.exe, 00000007.00000002.1346135673.0000022E82374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}.
                Source: MSBuild.exe, 0000000B.00000002.1393835741.000001A0F3EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>>A
                Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmCipcst1pNSXsKUbtH
                Source: wscript.exe, 00000007.00000002.1346135673.0000022E82374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\-
                Source: overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZZ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtQueryValueKey: Direct from: 0x7FFC9B783695Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtUnmapViewOfSection: Direct from: 0x7FFC3DF9F1B6Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtResumeThread: Direct from: 0x7FFC3DF9E44CJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtClose: Direct from: 0x7FFC9B6D0CB8
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtSetInformationProcess: Direct from: 0x7FFC9D2DFF46Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtProtectVirtualMemory: Direct from: 0x7FFC9D2E0906Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtProtectVirtualMemory: Direct from: 0x7FFC3DF9B599Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtQueryAttributesFile: Direct from: 0x7FFC9D35BC4AJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtOpenKeyEx: Direct from: 0x7FFC9B787FC1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtWriteVirtualMemory: Direct from: 0x7FFC3DF9D632Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtProtectVirtualMemory: Direct from: 0x7FFC3DF9D659Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtResumeThread: Direct from: 0x7FFC3DFA07FCJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtReadFile: Direct from: 0x7FFC9B77C9C8Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtQueryValueKey: Direct from: 0x7FFC9B7855C5Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtDeviceIoControlFile: Direct from: 0x7FFC9D42F207Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtAdjustPrivilegesToken: Direct from: 0x7FFC9A841BECJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtUnmapViewOfSection: Direct from: 0x7FFC3DF9CE06Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtQueryValueKey: Direct from: 0x7FFC99DB1DC5Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtQueryVolumeInformationFile: Direct from: 0x7FFC9B78734CJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtSetInformationProcess: Direct from: 0x7FFC9D2DFF6BJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtSetTimerEx: Direct from: 0x7FFCC36E26A1Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtQueryInformationToken: Direct from: 0x7FFC9D3167CBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtOpenFile: Direct from: 0x7FFC9D3632D3Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtClose: Direct from: 0x7FFC9AC99A3C
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtQuerySystemInformation: Direct from: 0x7FFC9D2A53EEJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtQuerySystemInformation: Direct from: 0x7FFC9A841285Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtOpenKeyEx: Direct from: 0x7FFC9D3587B7Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtProtectVirtualMemory: Direct from: 0x7FFC9D2DFF57Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtMapViewOfSection: Direct from: 0x7FFC9D37A7F5Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtDelayExecution: Direct from: 0x7FFC9D285073Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtSetContextThread: Direct from: 0x7FFC3DF9DBB6Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtReadFile: Direct from: 0x7FFC9D375F36Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtQueryValueKey: Direct from: 0x7FFC9B784413Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtCreateFile: Direct from: 0x7FFC9B78517FJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtClose: Direct from: 0x7FFC9B78713F
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtClose: Direct from: 0x7FFC9D375F5A
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeNtCreateFile: Direct from: 0x7FFC9D375FD7Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtSetContextThread: Direct from: 0x7FFC3DF9FF66Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeNtWriteVirtualMemory: Direct from: 0x7FFC3DF9F9E2Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140000000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140000000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeThread register set: target process: 7428Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeThread register set: target process: 7632Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140000000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140001000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140833000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140A8F000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140AD9000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B29000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B2A000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: D791CA6010Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140000000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140001000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140833000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140A8F000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140AD9000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B29000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B2A000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 86F300E010Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\overmelod.exe "C:\Users\user\AppData\Local\Temp\overmelod.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\overmelod.exeQueries volume information: C:\Users\user\AppData\Local\Temp\overmelod.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeCode function: 11_2_00000001407B4F8C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,11_2_00000001407B4F8C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe PID: 6700, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe PID: 6700, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                Valid Accounts2
                Command and Scripting Interpreter
                111
                Scripting
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                OS Credential Dumping1
                System Time Discovery
                Remote Services12
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                File and Directory Discovery
                Remote Desktop ProtocolData from Removable Media12
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                Scheduled Task/Job
                311
                Process Injection
                1
                Abuse Elevation Control Mechanism
                Security Account Manager13
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron2
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                2
                Obfuscated Files or Information
                NTDS11
                Security Software Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                Registry Run Keys / Startup Folder
                1
                Software Packing
                LSA Secrets2
                Virtualization/Sandbox Evasion
                SSHKeylogging3
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1663899 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 12/04/2025 Architecture: WINDOWS Score: 100 26 pki-goog.l.google.com 2->26 28 c.pki.goog 2->28 30 2 other IPs or domains 2->30 46 Suricata IDS alerts for network traffic 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 8 other signatures 2->52 8 SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe 4 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 22 C:\Users\user\AppData\Local\...\overmelod.exe, PE32+ 8->22 dropped 24 C:\Users\user\AppData\...\overmelod.vbs, ASCII 8->24 dropped 54 Drops VBS files to the startup folder 8->54 56 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->56 58 Writes to foreign memory regions 8->58 62 4 other signatures 8->62 14 MSBuild.exe 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 17 overmelod.exe 2 12->17         started        signatures6 process7 dnsIp8 32 45.227.252.199, 49720, 7712 WS171-ASRU Panama 14->32 34 api.ipify.org 104.26.12.205, 443, 49723 CLOUDFLARENETUS United States 14->34 36 127.0.0.1 unknown unknown 14->36 38 Antivirus detection for dropped file 17->38 40 Writes to foreign memory regions 17->40 42 Modifies the context of a thread in another process (thread injection) 17->42 44 2 other signatures 17->44 20 MSBuild.exe 17->20         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe19%ReversingLabsByteCode-MSIL.Trojan.Zilla
                SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe21%VirustotalBrowse
                SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe100%AviraHEUR/AGEN.1304644
                SAMPLE100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\overmelod.exe100%AviraHEUR/AGEN.1313033
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ipify.orgptography0%Avira URL Cloudsafe
                https://api.ipify.orgk0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  high
                  api.ipify.org
                  104.26.12.205
                  truefalse
                    high
                    pki-goog.l.google.com
                    172.217.215.94
                    truefalse
                      high
                      c.pki.goog
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://c.pki.goog/r/r4.crlfalse
                          high
                          http://c.pki.goog/r/gsr1.crlfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org/USMSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://api.ipify.orgkMSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://sectigo.com/CPS0SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                  high
                                  http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                    high
                                    https://stackoverflow.com/q/14436606/23354SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://github.com/mgravell/protobuf-netJSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894681000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                          high
                                          http://ocsp.sectigo.com0SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                            high
                                            https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmpfalse
                                              high
                                              http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                                high
                                                https://github.com/mgravell/protobuf-netSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                                    high
                                                    https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      high
                                                      https://curl.se/docs/hsts.htmlSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                                          high
                                                          https://api.ipify.orgMSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://github.com/mgravell/protobuf-netiSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ySecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                                                high
                                                                https://api.ipify.orgptographyMSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://stackoverflow.com/q/11564914/23354;SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://stackoverflow.com/q/2152978/23354SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.drfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          104.26.12.205
                                                                          api.ipify.orgUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          45.227.252.199
                                                                          unknownPanama
                                                                          41995WS171-ASRUtrue
                                                                          IP
                                                                          127.0.0.1
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1663899
                                                                          Start date and time:2025-04-12 21:32:21 +02:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 9m 32s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:14
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.expl.evad.winEXE@8/2@2/3
                                                                          EGA Information:
                                                                          • Successful, ratio: 33.3%
                                                                          HCA Information:
                                                                          • Successful, ratio: 56%
                                                                          • Number of executed functions: 379
                                                                          • Number of non-executed functions: 8
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 184.28.213.193, 23.64.172.197, 199.232.214.172, 4.245.163.56, 20.242.39.171, 20.109.210.53, 199.232.210.172, 204.79.197.222
                                                                          • Excluded domains from analysis (whitelisted): fp.msedge.net, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, slscr.update.microsoft.com, e3913.cd.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fe3cr.delivery.mp.microsoft.com, cac-ocsp.digicert.com.edgekey.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                                          • Execution Graph export aborted for target MSBuild.exe, PID 7632 because there are no executed function
                                                                          • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, PID 6700 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          TimeTypeDescription
                                                                          15:33:24AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          104.26.12.205NightGame Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                                          • api.ipify.org/
                                                                          b8Q7mSvddr.exeGet hashmaliciousDOENERIUM STEALERBrowse
                                                                          • api.ipify.org/
                                                                          70N2w0orPh.exeGet hashmaliciousDOENERIUM STEALERBrowse
                                                                          • api.ipify.org/
                                                                          70N2w0orPh.exeGet hashmaliciousDOENERIUM STEALERBrowse
                                                                          • api.ipify.org/
                                                                          1208_37832604.docGet hashmaliciousHancitorBrowse
                                                                          • api.ipify.org/
                                                                          ArenaWarsSetup.exeGet hashmaliciousUnknownBrowse
                                                                          • api.ipify.org/
                                                                          ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                                                                          • api.ipify.org/
                                                                          LauncherV9.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • api.ipify.org/
                                                                          Catch Me If You Can (2002) 1080p.BluRay.x264.Full 744MB.exeGet hashmaliciousUnknownBrowse
                                                                          • api.ipify.org/?format=xml
                                                                          NightFixed 1.0.exeGet hashmaliciousUnknownBrowse
                                                                          • api.ipify.org/
                                                                          45.227.252.199SecuriteInfo.com.Win64.MalwareX-gen.4322.24447.exeGet hashmaliciousUnknownBrowse
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            pki-goog.l.google.comSecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exeGet hashmaliciousDcRatBrowse
                                                                            • 64.233.185.94
                                                                            2zb8yjqduP.dllGet hashmaliciousUnknownBrowse
                                                                            • 74.125.21.94
                                                                            GSRuGK48Ex.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                            • 142.250.9.94
                                                                            rxm.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                            • 142.251.15.94
                                                                            Rd_client_w_a_s_d_patched.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 74.125.21.94
                                                                            67f525209658e.vbsGet hashmaliciousLummaC StealerBrowse
                                                                            • 108.177.122.94
                                                                            IMSoftware{Launcher}3.21.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 142.251.15.94
                                                                            SoftWare(2).exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 74.125.21.94
                                                                            SoftWare(1).exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 74.125.21.94
                                                                            Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 173.194.219.94
                                                                            api.ipify.orghttps://www.canva.com/design/DAGkPkwDgSg/u9VDlBP5gFpCWakWq8SpPQ/view?utm_content=DAGkPkwDgSg&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=hc42c7e8522Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                            • 104.26.13.205
                                                                            SecuriteInfo.com.Win64.MalwareX-gen.4322.24447.exeGet hashmaliciousUnknownBrowse
                                                                            • 172.67.74.152
                                                                            https://cola-careers.site/apply/id834285345Get hashmaliciousUnknownBrowse
                                                                            • 172.67.74.152
                                                                            https://forms.office.com/e/v86Z0QdF5RGet hashmaliciousTycoon2FABrowse
                                                                            • 172.67.74.152
                                                                            pkbXo7ZcIQ.exeGet hashmaliciousMeduza StealerBrowse
                                                                            • 104.26.12.205
                                                                            New Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 172.67.74.152
                                                                            https://drive.google.com/uc?export=download&id=1FYPPFFRzb0m4iLuTzYE2x-LVa2_xHVD0Get hashmaliciousHTMLPhisherBrowse
                                                                            • 104.26.13.205
                                                                            FAV.ps1Get hashmaliciousAgentTeslaBrowse
                                                                            • 104.26.12.205
                                                                            PtOrnXcy.exe.bin.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 104.26.13.205
                                                                            Request for Quotation #3200025006.PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 104.26.13.205
                                                                            bg.microsoft.map.fastly.netSecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exeGet hashmaliciousDcRatBrowse
                                                                            • 199.232.210.172
                                                                            support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            • 199.232.210.172
                                                                            support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            • 199.232.210.172
                                                                            jre-8u441-windows-x64.exeGet hashmaliciousUnknownBrowse
                                                                            • 199.232.210.172
                                                                            jre-8u441-windows-x64.exeGet hashmaliciousUnknownBrowse
                                                                            • 199.232.214.172
                                                                            AxgHj313r7.exeGet hashmaliciousRhysida, TrojanRansomBrowse
                                                                            • 199.232.210.172
                                                                            Dd73LmElYt.pptGet hashmaliciousUnknownBrowse
                                                                            • 199.232.214.172
                                                                            Dd73LmElYt.pptGet hashmaliciousUnknownBrowse
                                                                            • 199.232.210.172
                                                                            GSRuGK48Ex.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                            • 199.232.210.172
                                                                            rxm.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                            • 199.232.210.172
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CLOUDFLARENETUShttps://chrissys-marshall-site.webflow.io/Get hashmaliciousUnknownBrowse
                                                                            • 104.21.96.1
                                                                            support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            • 104.21.48.239
                                                                            support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            • 172.67.157.1
                                                                            QuarantineMessage.zipGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.16.117.116
                                                                            https://webshuaw.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                            • 162.247.243.29
                                                                            SecuriteInfo.com.Win32.MalwareX-gen.25317.7450.exeGet hashmaliciousUnknownBrowse
                                                                            • 1.1.1.1
                                                                            SecuriteInfo.com.Win32.MalwareX-gen.25317.7450.exeGet hashmaliciousUnknownBrowse
                                                                            • 1.1.1.1
                                                                            M605aSgwAR.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.21.91.46
                                                                            ZcvUiE3Wl5.exeGet hashmaliciousUnknownBrowse
                                                                            • 172.67.166.185
                                                                            M605aSgwAR.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.21.91.46
                                                                            WS171-ASRUSecuriteInfo.com.Win64.MalwareX-gen.4322.24447.exeGet hashmaliciousUnknownBrowse
                                                                            • 45.227.252.199
                                                                            https://digitaleconomy.space/wp-content/plugins/ultrapress/packages/background-image-cropper/oueupr.php?xtt=7up620kGet hashmaliciousUnknownBrowse
                                                                            • 88.214.27.56
                                                                            Radico-Asia_Star-PO-2024-0102.pdf.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                            • 185.222.163.245
                                                                            https://bit.ly/3RPzJ7AGet hashmaliciousPorn ScamBrowse
                                                                            • 88.214.27.36
                                                                            file.exeGet hashmaliciousDjvu, SmokeLoaderBrowse
                                                                            • 85.217.144.143
                                                                            file.exeGet hashmaliciousGlupteba, SmokeLoader, VidarBrowse
                                                                            • 85.217.144.143
                                                                            file.exeGet hashmaliciousGlupteba, SmokeLoader, VidarBrowse
                                                                            • 85.217.144.143
                                                                            file.exeGet hashmaliciousGlupteba, Neoreklami, Phonk Miner, RedLine, SmokeLoader, VidarBrowse
                                                                            • 85.217.144.143
                                                                            file.exeGet hashmaliciousGlupteba, SmokeLoaderBrowse
                                                                            • 85.217.144.143
                                                                            file.exeGet hashmaliciousPrivateLoader, RedLine, SmokeLoaderBrowse
                                                                            • 85.217.144.143
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            bd0bf25947d4a37404f0424edf4db9adM605aSgwAR.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            ZcvUiE3Wl5.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            M605aSgwAR.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            SecuriteInfo.com.Win64.MalwareX-gen.4322.24447.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            pkbXo7ZcIQ.exeGet hashmaliciousMeduza StealerBrowse
                                                                            • 104.26.12.205
                                                                            BuNsxf1fHNGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            7 copy2.xlsmGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            Spartacus.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            Spartacus.exeGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            cagWUQ0Cti.xlsmGet hashmaliciousUnknownBrowse
                                                                            • 104.26.12.205
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                                                                            File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                            Category:modified
                                                                            Size (bytes):298710982
                                                                            Entropy (8bit):7.999984125109136
                                                                            Encrypted:true
                                                                            SSDEEP:
                                                                            MD5:55F39A32209CCB51775828EB07A3DA96
                                                                            SHA1:D451124F2ACF67A88B08C827DD5F52F1661FC498
                                                                            SHA-256:22EFFE43A7A53A24B2A2397431FEADACD2D9B2B04D9B5A124636D48E9668CA27
                                                                            SHA-512:67EC3AC0C7392D7CC8DDDF3703EF745EDB5538521226C29C9976944C09848AA9CA653EB16B2D910104209098FD4A2D2E723B53A66C19E5B5FBDCCF34A7DECD48
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            Reputation:low
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g..........".......a..4........... ....@...... ........................e......*e...`...........................................................a..4............d.............................................................................. ..H............text.....a.. ....a................. ..`.rsrc....4....a..4....a.............@..@........................................H........._.P.................]..........................................0.......... ..P....(....&*..0.......... ..P....(....&*..0..(....... .P.(....o.....(....o....(......(....&*.0..(....... d.P.(....o.....(....o....(......(....&*.0.......... 8.P....(....&*..0.......... .P....(....&*..0.......... ..P....(....&*J.(q...}.....(....*...0..,....... :.P.(....o.....(....o....(......(....t....*.0................%.... .@P....(....t....*...0.......... .@P....(....t....*..(....*..0..7.......
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):87
                                                                            Entropy (8bit):4.7207804462415135
                                                                            Encrypted:false
                                                                            SSDEEP:3:FER/n0eFHHot+kiE2J5xAIkBJn:FER/lFHIwkn23fkP
                                                                            MD5:9764AA7705080A02861E7FE11FF83EAA
                                                                            SHA1:5DAAF14465670ABD329D11D05D01FA531553838B
                                                                            SHA-256:382697C98158FAE6A7F9DED8422033545DDA0F91DA61A83042D56545AB6AC547
                                                                            SHA-512:B80CFE1EEC17C9F1C06EA7D1F47FE5888BA7CE1DBD1D78C96FA38A923C86703EE3CF86E579B8CEF124FDFD7AF19CB2DC54B2021E9BEE64877E3D5BA6ADBB112B
                                                                            Malicious:true
                                                                            Reputation:low
                                                                            Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Local\Temp\overmelod.exe"""
                                                                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.980429501111477
                                                                            TrID:
                                                                            • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                                            • Win64 Executable GUI (202006/5) 46.43%
                                                                            • Win64 Executable (generic) (12005/4) 2.76%
                                                                            • Generic Win/DOS Executable (2004/3) 0.46%
                                                                            • DOS Executable Generic (2002/1) 0.46%
                                                                            File name:SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                                                                            File size:6'614'144 bytes
                                                                            MD5:44269f3383c745b0656f94ebdf04bb4c
                                                                            SHA1:c5406153af11c61f10cbc1d49cec53654d3649f0
                                                                            SHA256:0303f9d6082240e16f0d503cf900f5f378a5cf906088a7c6312f58ad50472d8a
                                                                            SHA512:d8ae4b5a27fb05e936f604b320ae575ae41ba58aefd140e0f218fbaec02e099a230456829cb1425f10c8d49f464d4838bc8e74ffcec72553ab9dcc7c1806fa39
                                                                            SSDEEP:196608:6/kwAaMPhvv4IBhYJqbqEq3JYByB3FvBBnf4:68NaMPhvv42KJzFwyBvJf4
                                                                            TLSH:4666230A9EF8AF4CCE8D5276B7C41962C83805361AD5E32D99895CDC79EE33F81489C7
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g..........".......a..4........... ....@...... ........................e......*e...`................................
                                                                            Icon Hash:5fc1c131094d9e07
                                                                            Entrypoint:0x400000
                                                                            Entrypoint Section:
                                                                            Digitally signed:true
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x67F69688 [Wed Apr 9 15:47:20 2025 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:
                                                                            Signature Valid:false
                                                                            Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                                                            Signature Validation Error:The digital signature of the object did not verify
                                                                            Error Number:-2146869232
                                                                            Not Before, Not After
                                                                            • 11/04/2022 01:00:00 11/04/2025 00:59:59
                                                                            Subject Chain
                                                                            • CN=FLASH-INTEGRO LLC, O=FLASH-INTEGRO LLC, S=Toshkent, C=UZ
                                                                            Version:3
                                                                            Thumbprint MD5:87868FADE2CE1EF98CC36261B4E35B35
                                                                            Thumbprint SHA-1:BBA5B7F9BC2BF9447B4AC9061935B4178FBFBCDE
                                                                            Thumbprint SHA-256:690FE7D1A1176892A26FD6867440623E6D8443CA2026E86E6C9F9DB68BBAC043
                                                                            Serial:00EEC85D0449E4B3B5DA7FE2D58B77E339
                                                                            Instruction
                                                                            dec ebp
                                                                            pop edx
                                                                            nop
                                                                            add byte ptr [ebx], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax+eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x61c0000x33400.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x64be000x2e80.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x6187100x618800ac49de37116f3b0f9f69dc5d80e85c0aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x61c0000x334000x33400ab87f8ea0290c0b6cf18edc0f005ea26False0.2387528582317073data6.938661643278315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_CURSOR0x61c6cc0x134Targa image data 64 x 65536 x 1 +32 "\001"FrenchFrance0.5714285714285714
                                                                            RT_CURSOR0x61c8000x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                                                            RT_CURSOR0x61c9340x134data0.4642857142857143
                                                                            RT_CURSOR0x61ca680x134data0.4805194805194805
                                                                            RT_CURSOR0x61cb9c0x134data0.38311688311688313
                                                                            RT_CURSOR0x61ccd00x134data0.36038961038961037
                                                                            RT_CURSOR0x61ce040x134data0.4090909090909091
                                                                            RT_CURSOR0x61cf380x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                                                            RT_ICON0x61d06c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsFrenchFrance0.6252665245202559
                                                                            RT_ICON0x61df140x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsFrenchFrance0.769404332129964
                                                                            RT_ICON0x61e7bc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsFrenchFrance0.611271676300578
                                                                            RT_ICON0x61ed240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600FrenchFrance0.3741701244813278
                                                                            RT_ICON0x6212cc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224FrenchFrance0.599671669793621
                                                                            RT_ICON0x6223740x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088FrenchFrance0.725177304964539
                                                                            RT_RCDATA0x6227dc0x10data1.5
                                                                            RT_RCDATA0x6227ec0x164data0.7837078651685393
                                                                            RT_RCDATA0x6229500x31fDelphi compiled form 'TVerificationVideoDlg'0.5857321652065082
                                                                            RT_RCDATA0x622c700x2c147Delphi compiled form 'TVerificationVideoInfoDlg'0.19591694313518065
                                                                            RT_GROUP_CURSOR0x64edb80x14Lotus unknown worksheet or configuration, revision 0x1FrenchFrance1.25
                                                                            RT_GROUP_CURSOR0x64edcc0x14Lotus unknown worksheet or configuration, revision 0x11.25
                                                                            RT_GROUP_CURSOR0x64ede00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x64edf40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x64ee080x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x64ee1c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x64ee300x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x64ee440x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_ICON0x64ee580x5adataFrenchFrance0.7222222222222222
                                                                            RT_VERSION0x64eeb40x388dataFrenchFrance0.4668141592920354
                                                                            RT_MANIFEST0x64f23c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                            DescriptionData
                                                                            CompanyNamedit par AxBx
                                                                            FileDescriptionTestLAB 2008 : contrle vido
                                                                            FileVersion8.0.0.0
                                                                            InternalNametl_test_video.exe
                                                                            LegalCopyright 2005-2007 g.snauwaert.
                                                                            LegalTrademarksTestLAB est une marque dpose.
                                                                            OriginalFilenametl_test_video.exe
                                                                            ProductNameTestLAB 2008
                                                                            ProductVersion8.0.0
                                                                            Comments
                                                                            Translation0x040c 0x04e4
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            FrenchFrance
                                                                            EnglishUnited States
                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                            2025-04-12T21:33:35.618499+02002061200ET MALWARE Aurotun Stealer CnC Checkin1192.168.2.44972045.227.252.1997712TCP
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 12, 2025 21:33:19.668581009 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:19.980845928 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:20.590303898 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:21.793467999 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:24.199738979 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:28.601553917 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:28.902892113 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:29.012208939 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:29.512293100 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:30.715343952 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:33.121761084 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:34.686091900 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:33:34.912079096 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:33:34.912198067 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:33:35.032944918 CEST49723443192.168.2.4104.26.12.205
                                                                            Apr 12, 2025 21:33:35.033066034 CEST44349723104.26.12.205192.168.2.4
                                                                            Apr 12, 2025 21:33:35.033133030 CEST49723443192.168.2.4104.26.12.205
                                                                            Apr 12, 2025 21:33:35.037693024 CEST49723443192.168.2.4104.26.12.205
                                                                            Apr 12, 2025 21:33:35.037774086 CEST44349723104.26.12.205192.168.2.4
                                                                            Apr 12, 2025 21:33:35.049743891 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:33:35.272722006 CEST44349723104.26.12.205192.168.2.4
                                                                            Apr 12, 2025 21:33:35.272937059 CEST49723443192.168.2.4104.26.12.205
                                                                            Apr 12, 2025 21:33:35.355853081 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:33:35.547766924 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.550297022 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.550332069 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.618029118 CEST49723443192.168.2.4104.26.12.205
                                                                            Apr 12, 2025 21:33:35.618314028 CEST44349723104.26.12.205192.168.2.4
                                                                            Apr 12, 2025 21:33:35.618499041 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:33:35.618530035 CEST49723443192.168.2.4104.26.12.205
                                                                            Apr 12, 2025 21:33:35.669435978 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.671518087 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.671576023 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.671595097 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.671612024 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.671627045 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.671647072 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.672647953 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.674892902 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.674942017 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.674966097 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.674985886 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.685224056 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.794043064 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.806541920 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.809057951 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.809164047 CEST44349713131.253.33.254192.168.2.4
                                                                            Apr 12, 2025 21:33:35.809303045 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.809303999 CEST49713443192.168.2.4131.253.33.254
                                                                            Apr 12, 2025 21:33:35.845519066 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:33:35.881369114 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:33:35.887141943 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:33:35.965231895 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:33:35.988195896 CEST8049728172.217.215.94192.168.2.4
                                                                            Apr 12, 2025 21:33:35.988296032 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:33:35.988981962 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:33:36.095554113 CEST8049728172.217.215.94192.168.2.4
                                                                            Apr 12, 2025 21:33:36.096103907 CEST8049728172.217.215.94192.168.2.4
                                                                            Apr 12, 2025 21:33:36.096167088 CEST8049728172.217.215.94192.168.2.4
                                                                            Apr 12, 2025 21:33:36.098462105 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:33:36.403522015 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:33:36.511707067 CEST8049728172.217.215.94192.168.2.4
                                                                            Apr 12, 2025 21:33:36.558996916 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:33:37.168395042 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:33:37.980961084 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:38.715364933 CEST49671443192.168.2.4204.79.197.203
                                                                            Apr 12, 2025 21:33:39.684005022 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:33:44.684000015 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:33:47.684145927 CEST49678443192.168.2.420.189.173.27
                                                                            Apr 12, 2025 21:33:51.114450932 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:33:51.114541054 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:33:54.293440104 CEST4968180192.168.2.42.17.190.73
                                                                            Apr 12, 2025 21:34:02.168682098 CEST4971080192.168.2.4172.64.149.23
                                                                            Apr 12, 2025 21:34:02.168730974 CEST4971180192.168.2.4172.64.149.23
                                                                            Apr 12, 2025 21:34:02.168762922 CEST4970980192.168.2.4172.64.149.23
                                                                            Apr 12, 2025 21:34:02.275126934 CEST8049711172.64.149.23192.168.2.4
                                                                            Apr 12, 2025 21:34:02.275299072 CEST4971180192.168.2.4172.64.149.23
                                                                            Apr 12, 2025 21:34:02.275599003 CEST8049709172.64.149.23192.168.2.4
                                                                            Apr 12, 2025 21:34:02.275753975 CEST4970980192.168.2.4172.64.149.23
                                                                            Apr 12, 2025 21:34:02.276283026 CEST8049710172.64.149.23192.168.2.4
                                                                            Apr 12, 2025 21:34:02.276355028 CEST4971080192.168.2.4172.64.149.23
                                                                            Apr 12, 2025 21:34:06.342230082 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:34:06.342442036 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:34:21.568358898 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:34:21.568449020 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:34:36.795196056 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:34:36.795427084 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:34:52.021564007 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:34:52.021647930 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:35:05.949995995 CEST49712443192.168.2.452.113.196.254
                                                                            Apr 12, 2025 21:35:07.247880936 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:35:07.247967958 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:35:22.476641893 CEST77124972045.227.252.199192.168.2.4
                                                                            Apr 12, 2025 21:35:22.476893902 CEST497207712192.168.2.445.227.252.199
                                                                            Apr 12, 2025 21:35:25.543706894 CEST4972880192.168.2.4172.217.215.94
                                                                            Apr 12, 2025 21:35:25.650286913 CEST8049728172.217.215.94192.168.2.4
                                                                            Apr 12, 2025 21:35:25.650346994 CEST4972880192.168.2.4172.217.215.94
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 12, 2025 21:33:34.921956062 CEST6002853192.168.2.41.1.1.1
                                                                            Apr 12, 2025 21:33:35.029361010 CEST53600281.1.1.1192.168.2.4
                                                                            Apr 12, 2025 21:33:35.772022009 CEST5751853192.168.2.41.1.1.1
                                                                            Apr 12, 2025 21:33:35.879754066 CEST53575181.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Apr 12, 2025 21:33:34.921956062 CEST192.168.2.41.1.1.10x90feStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.772022009 CEST192.168.2.41.1.1.10x6683Standard query (0)c.pki.googA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Apr 12, 2025 21:33:35.029361010 CEST1.1.1.1192.168.2.40x90feNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.029361010 CEST1.1.1.1192.168.2.40x90feNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.029361010 CEST1.1.1.1192.168.2.40x90feNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.397176981 CEST1.1.1.1192.168.2.40x65a4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.397176981 CEST1.1.1.1192.168.2.40x65a4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.879754066 CEST1.1.1.1192.168.2.40x6683No error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                            Apr 12, 2025 21:33:35.879754066 CEST1.1.1.1192.168.2.40x6683No error (0)pki-goog.l.google.com172.217.215.94A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:34:36.069478035 CEST1.1.1.1192.168.2.40x5adNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                            Apr 12, 2025 21:34:36.069478035 CEST1.1.1.1192.168.2.40x5adNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                            • c.pki.goog
                                                                            Session IDSource IPSource PortDestination IPDestination Port
                                                                            0192.168.2.449728172.217.215.9480
                                                                            TimestampBytes transferredDirectionData
                                                                            Apr 12, 2025 21:33:35.988981962 CEST202OUTGET /r/gsr1.crl HTTP/1.1
                                                                            Cache-Control: max-age = 3000
                                                                            Connection: Keep-Alive
                                                                            Accept: */*
                                                                            If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMT
                                                                            User-Agent: Microsoft-CryptoAPI/10.0
                                                                            Host: c.pki.goog
                                                                            Apr 12, 2025 21:33:36.096103907 CEST1358INHTTP/1.1 200 OK
                                                                            Accept-Ranges: bytes
                                                                            Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                                                                            Cross-Origin-Resource-Policy: cross-origin
                                                                            Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                                                                            Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                                                                            Content-Length: 1739
                                                                            X-Content-Type-Options: nosniff
                                                                            Server: sffe
                                                                            X-XSS-Protection: 0
                                                                            Date: Sat, 12 Apr 2025 19:11:43 GMT
                                                                            Expires: Sat, 12 Apr 2025 20:01:43 GMT
                                                                            Cache-Control: public, max-age=3000
                                                                            Age: 1313
                                                                            Last-Modified: Mon, 07 Apr 2025 13:58:00 GMT
                                                                            Content-Type: application/pkix-crl
                                                                            Vary: Accept-Encoding
                                                                            Data Raw: 30 82 06 c7 30 82 05 af 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 57 31 0b 30 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 55 04 0a 13 10 47 6c 6f 62 61 6c 53 69 67 6e 20 6e 76 2d 73 61 31 10 30 0e 06 03 55 04 0b 13 07 52 6f 6f 74 20 43 41 31 1b 30 19 06 03 55 04 03 13 12 47 6c 6f 62 61 6c 53 69 67 6e 20 52 6f 6f 74 20 43 41 17 0d 32 35 30 34 30 37 30 30 30 30 30 30 5a 17 0d 32 35 30 37 31 35 30 30 30 30 30 30 5a 30 82 04 f1 30 2a 02 0b 04 00 00 00 00 01 1e 44 a5 e4 04 17 0d 31 34 31 31 32 35 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2a 02 0b 04 00 00 00 00 01 29 45 c3 a8 0f 17 0d 31 34 31 31 32 35 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2a 02 0b 04 00 00 00 00 01 20 19 c1 8d 68 17 0d 31 34 31 31 32 35 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2a 02 0b 04 00 00 00 00 01 2c 5e 7f 1a 88 17 0d 31 34 31 31 32 35 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2a 02 0b 04 00 00 00 00 01 15 4b 5a [TRUNCATED]
                                                                            Data Ascii: 000*H0W10UBE10UGlobalSign nv-sa10URoot CA10UGlobalSign Root CA250407000000Z250715000000Z00*D141125000000Z00U0*)E141125000000Z00U0* h141125000000Z00U0*,^141125000000Z00U0*KZ160107000000Z00U0*/NIR170419000000Z00U0*/NG170419000000Z00U0*/N9191120000000Z00U0*/N=k191204000000Z00U0*/N;X191204000000Z00U0-Ga7.u200630000000Z00U0-G
                                                                            Apr 12, 2025 21:33:36.096167088 CEST1095INData Raw: 18 9d c0 41 1c 9f 3e 54 68 41 17 0d 32 30 30 36 33 30 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2d 02 0e 47 c3 10 00 c0 4b fa 8a 26 54 b7 41 ec 2b 17 0d 32 30 30 36 33 30 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04
                                                                            Data Ascii: A>ThA200630000000Z00U0-GK&TA+200630000000Z00U0*6::200711160000Z00U0/vSBS%V>200728000000Z00U0/vSF-Kg>)200728000000Z00U0/vSHqe]c
                                                                            Apr 12, 2025 21:33:36.403522015 CEST200OUTGET /r/r4.crl HTTP/1.1
                                                                            Cache-Control: max-age = 3000
                                                                            Connection: Keep-Alive
                                                                            Accept: */*
                                                                            If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
                                                                            User-Agent: Microsoft-CryptoAPI/10.0
                                                                            Host: c.pki.goog
                                                                            Apr 12, 2025 21:33:36.511707067 CEST1243INHTTP/1.1 200 OK
                                                                            Accept-Ranges: bytes
                                                                            Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                                                                            Cross-Origin-Resource-Policy: cross-origin
                                                                            Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                                                                            Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                                                                            Content-Length: 530
                                                                            X-Content-Type-Options: nosniff
                                                                            Server: sffe
                                                                            X-XSS-Protection: 0
                                                                            Date: Sat, 12 Apr 2025 19:01:39 GMT
                                                                            Expires: Sat, 12 Apr 2025 19:51:39 GMT
                                                                            Cache-Control: public, max-age=3000
                                                                            Age: 1917
                                                                            Last-Modified: Thu, 03 Apr 2025 14:18:00 GMT
                                                                            Content-Type: application/pkix-crl
                                                                            Vary: Accept-Encoding
                                                                            Data Raw: 30 82 02 0e 30 82 01 93 02 01 01 30 0a 06 08 2a 86 48 ce 3d 04 03 03 30 47 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 22 30 20 06 03 55 04 0a 13 19 47 6f 6f 67 6c 65 20 54 72 75 73 74 20 53 65 72 76 69 63 65 73 20 4c 4c 43 31 14 30 12 06 03 55 04 03 13 0b 47 54 53 20 52 6f 6f 74 20 52 34 17 0d 32 35 30 34 30 33 30 38 30 30 30 30 5a 17 0d 32 36 30 32 32 38 30 37 35 39 35 39 5a 30 81 e9 30 2f 02 10 6e 47 a9 ce 4f 46 c2 3d e2 49 ea cc 38 94 53 73 17 0d 31 39 30 39 33 30 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 01 f0 9c 5b 70 05 a6 dc 86 e2 f9 9e f3 17 0d 32 30 30 31 33 31 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 01 fe a5 81 44 7e 3b fd 3b b8 1c 24 98 17 0d 32 33 30 36 31 33 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 02 16 68 25 e1 70 04 40 61 24 91 f5 40 17 0d 32 35 30 34 30 33 30 38 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 02 00 8e b2 58 e7 b5 94 0c 1f f9 00 44 17 0d 32 35 30 [TRUNCATED]
                                                                            Data Ascii: 000*H=0G10UUS1"0 UGoogle Trust Services LLC10UGTS Root R4250403080000Z260228075959Z00/nGOF=I8Ss190930000000Z00U0,[p200131000000Z00U0,D~;;$230613000000Z00U0,h%p@a$@250403080000Z00U0,XD250403080000Z00U/0-0U0U#0LtI6>j0*H=i0f1>2en:IN@g=;bQZ~`NX1?^4y[$\4{;$zDeU6O


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:15:33:20
                                                                            Start date:12/04/2025
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe"
                                                                            Imagebase:0x18e400c0000
                                                                            File size:6'614'144 bytes
                                                                            MD5 hash:44269F3383C745B0656F94EBDF04BB4C
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1344510463.0000018E54D9E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1655849966.0000018E5B780000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:7
                                                                            Start time:15:33:33
                                                                            Start date:12/04/2025
                                                                            Path:C:\Windows\System32\wscript.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs"
                                                                            Imagebase:0x7ff7558e0000
                                                                            File size:170'496 bytes
                                                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:8
                                                                            Start time:15:33:33
                                                                            Start date:12/04/2025
                                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                                                                            Imagebase:0x800000
                                                                            File size:258'544 bytes
                                                                            MD5 hash:2EDD0B288FE2459DA84E4274D1942343
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:false

                                                                            Target ID:9
                                                                            Start time:15:33:35
                                                                            Start date:12/04/2025
                                                                            Path:C:\Users\user\AppData\Local\Temp\overmelod.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\overmelod.exe"
                                                                            Imagebase:0x18882050000
                                                                            File size:298'710'982 bytes
                                                                            MD5 hash:55F39A32209CCB51775828EB07A3DA96
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.1416648850.0000018895C72000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Antivirus matches:
                                                                            • Detection: 100%, Avira
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:11
                                                                            Start time:15:33:36
                                                                            Start date:12/04/2025
                                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                                                                            Imagebase:0x1a0f3cb0000
                                                                            File size:258'544 bytes
                                                                            MD5 hash:2EDD0B288FE2459DA84E4274D1942343
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Reset < >