Source: 001982_Invoice_confirmation.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: initial sample |
Icon embedded in PE file: bad icon match: 20047c7c70f0e004 |
Source: 001982_Invoice_confirmation.exe |
Static file information: Suspicious name |
Source: initial sample |
Static PE information: Filename: 001982_Invoice_confirmation.exe |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Process Stats: CPU usage > 98% |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_00401600 |
0_2_00401600 |
Source: 001982_Invoice_confirmation.exe |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426308273.0000000000416000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameRaala.exe vs 001982_Invoice_confirmation.exe |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1427161222.0000000002090000.00000002.00000001.sdmp |
Binary or memory string: OriginalFilenameuser32j% vs 001982_Invoice_confirmation.exe |
Source: 001982_Invoice_confirmation.exe |
Binary or memory string: OriginalFilenameRaala.exe vs 001982_Invoice_confirmation.exe |
Source: 001982_Invoice_confirmation.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: classification engine |
Classification label: mal76.rans.troj.evad.winEXE@1/0@0/0 |
Source: 001982_Invoice_confirmation.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Section loaded: C:\Windows\SysWOW64\msvbvm60.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: Yara match |
File source: Process Memory Space: 001982_Invoice_confirmation.exe PID: 7120, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 001982_Invoice_confirmation.exe PID: 7120, type: MEMORY |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_0040597E push AAA4CA0Bh; retf |
0_2_004059C0 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426657754.00000000004F0000.00000040.00000001.sdmp |
Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
RDTSC instruction interceptor: First address: 000000000040433A second address: 000000000040433A instructions: 0x00000000 rdtsc 0x00000002 wait 0x00000003 nop 0x00000004 dec esi 0x00000005 nop 0x00000006 nop 0x00000007 cmp esi, 00000000h 0x0000000a jne 00007FCAB4A39366h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1060 rdtsc |
0_2_004F1060 |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426657754.00000000004F0000.00000040.00000001.sdmp |
Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1060 rdtsc |
0_2_004F1060 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1C6F mov eax, dword ptr fs:[00000030h] |
0_2_004F1C6F |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1C6D mov eax, dword ptr fs:[00000030h] |
0_2_004F1C6D |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F4CC8 mov eax, dword ptr fs:[00000030h] |
0_2_004F4CC8 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F516B mov eax, dword ptr fs:[00000030h] |
0_2_004F516B |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F2D97 mov eax, dword ptr fs:[00000030h] |
0_2_004F2D97 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F164F mov eax, dword ptr fs:[00000030h] |
0_2_004F164F |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1ED7 mov eax, dword ptr fs:[00000030h] |
0_2_004F1ED7 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1ED1 mov eax, dword ptr fs:[00000030h] |
0_2_004F1ED1 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F5AEA mov eax, dword ptr fs:[00000030h] |
0_2_004F5AEA |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F5AE0 mov eax, dword ptr fs:[00000030h] |
0_2_004F5AE0 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F5B46 mov eax, dword ptr fs:[00000030h] |
0_2_004F5B46 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F5B06 mov eax, dword ptr fs:[00000030h] |
0_2_004F5B06 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F1F00 mov eax, dword ptr fs:[00000030h] |
0_2_004F1F00 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe |
Code function: 0_2_004F5B27 mov eax, dword ptr fs:[00000030h] |
0_2_004F5B27 |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp |
Binary or memory string: Progman |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp |
Binary or memory string: &Program Manager |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp |
Binary or memory string: Progmanlock |