Source: 001982_Invoice_confirmation.exe | Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: initial sample | Icon embedded in PE file: bad icon match: 20047c7c70f0e004 |
Source: 001982_Invoice_confirmation.exe | Static file information: Suspicious name |
Source: initial sample | Static PE information: Filename: 001982_Invoice_confirmation.exe |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Process Stats: CPU usage > 98% |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_00401600 | 0_2_00401600 |
Source: 001982_Invoice_confirmation.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426308273.0000000000416000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameRaala.exe vs 001982_Invoice_confirmation.exe |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1427161222.0000000002090000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameuser32j% vs 001982_Invoice_confirmation.exe |
Source: 001982_Invoice_confirmation.exe | Binary or memory string: OriginalFilenameRaala.exe vs 001982_Invoice_confirmation.exe |
Source: 001982_Invoice_confirmation.exe | Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: classification engine | Classification label: mal76.rans.troj.evad.winEXE@1/0@0/0 |
Source: 001982_Invoice_confirmation.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Section loaded: C:\Windows\SysWOW64\msvbvm60.dll | Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: Yara match | File source: Process Memory Space: 001982_Invoice_confirmation.exe PID: 7120, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 001982_Invoice_confirmation.exe PID: 7120, type: MEMORY |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_0040597E push AAA4CA0Bh; retf | 0_2_004059C0 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426657754.00000000004F0000.00000040.00000001.sdmp | Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | RDTSC instruction interceptor: First address: 000000000040433A second address: 000000000040433A instructions: 0x00000000 rdtsc 0x00000002 wait 0x00000003 nop 0x00000004 dec esi 0x00000005 nop 0x00000006 nop 0x00000007 cmp esi, 00000000h 0x0000000a jne 00007FCAB4A39366h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1060 rdtsc | 0_2_004F1060 |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426657754.00000000004F0000.00000040.00000001.sdmp | Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1060 rdtsc | 0_2_004F1060 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1C6F mov eax, dword ptr fs:[00000030h] | 0_2_004F1C6F |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1C6D mov eax, dword ptr fs:[00000030h] | 0_2_004F1C6D |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F4CC8 mov eax, dword ptr fs:[00000030h] | 0_2_004F4CC8 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F516B mov eax, dword ptr fs:[00000030h] | 0_2_004F516B |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F2D97 mov eax, dword ptr fs:[00000030h] | 0_2_004F2D97 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F164F mov eax, dword ptr fs:[00000030h] | 0_2_004F164F |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1ED7 mov eax, dword ptr fs:[00000030h] | 0_2_004F1ED7 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1ED1 mov eax, dword ptr fs:[00000030h] | 0_2_004F1ED1 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F5AEA mov eax, dword ptr fs:[00000030h] | 0_2_004F5AEA |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F5AE0 mov eax, dword ptr fs:[00000030h] | 0_2_004F5AE0 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F5B46 mov eax, dword ptr fs:[00000030h] | 0_2_004F5B46 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F5B06 mov eax, dword ptr fs:[00000030h] | 0_2_004F5B06 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F1F00 mov eax, dword ptr fs:[00000030h] | 0_2_004F1F00 |
Source: C:\Users\user\Desktop\001982_Invoice_confirmation.exe | Code function: 0_2_004F5B27 mov eax, dword ptr fs:[00000030h] | 0_2_004F5B27 |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp | Binary or memory string: Shell_TrayWnd |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp | Binary or memory string: Progman |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp | Binary or memory string: &Program Manager |
Source: 001982_Invoice_confirmation.exe, 00000000.00000002.1426938215.0000000000C50000.00000002.00000001.sdmp | Binary or memory string: Progmanlock |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.