Source: 21558_Invoice_confirmation.exe | Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: initial sample | Icon embedded in PE file: bad icon match: 20047c7c70f0e004 |
Source: 21558_Invoice_confirmation.exe | Static file information: Suspicious name |
Source: initial sample | Static PE information: Filename: 21558_Invoice_confirmation.exe |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Process Stats: CPU usage > 98% |
Source: 21558_Invoice_confirmation.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1398199064.0000000002090000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameuser32j% vs 21558_Invoice_confirmation.exe |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1397787159.0000000000416000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameASSACU.exe vs 21558_Invoice_confirmation.exe |
Source: 21558_Invoice_confirmation.exe | Binary or memory string: OriginalFilenameASSACU.exe vs 21558_Invoice_confirmation.exe |
Source: 21558_Invoice_confirmation.exe | Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: classification engine | Classification label: mal76.rans.troj.evad.winEXE@1/0@0/0 |
Source: 21558_Invoice_confirmation.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Section loaded: C:\Windows\SysWOW64\msvbvm60.dll | Jump to behavior |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: Yara match | File source: Process Memory Space: 21558_Invoice_confirmation.exe PID: 7052, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 21558_Invoice_confirmation.exe PID: 7052, type: MEMORY |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_00404F88 push cs; iretd | 0_2_00404F96 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F366A push ebp; retf | 0_2_004F4222 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F4230 push ebp; retf | 0_2_004F4222 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F12CC push ebp; retf | 0_2_004F4222 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F4368 push C8F1A01Fh; iretd | 0_2_004F4375 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1397946122.00000000004F0000.00000040.00000001.sdmp | Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | RDTSC instruction interceptor: First address: 0000000000404336 second address: 0000000000404336 instructions: 0x00000000 rdtsc 0x00000002 wait 0x00000003 nop 0x00000004 dec esi 0x00000005 nop 0x00000006 nop 0x00000007 cmp esi, 00000000h 0x0000000a jne 00007F3534BA1396h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_0040432C rdtsc | 0_2_0040432C |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F2A03 sgdt fword ptr [eax] | 0_2_004F2A03 |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1397946122.00000000004F0000.00000040.00000001.sdmp | Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_0040432C rdtsc | 0_2_0040432C |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F49C6 mov eax, dword ptr fs:[00000030h] | 0_2_004F49C6 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F4D8B mov eax, dword ptr fs:[00000030h] | 0_2_004F4D8B |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F56FE mov eax, dword ptr fs:[00000030h] | 0_2_004F56FE |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F56F9 mov eax, dword ptr fs:[00000030h] | 0_2_004F56F9 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F2E83 mov eax, dword ptr fs:[00000030h] | 0_2_004F2E83 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F5749 mov eax, dword ptr fs:[00000030h] | 0_2_004F5749 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F5761 mov eax, dword ptr fs:[00000030h] | 0_2_004F5761 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F5779 mov eax, dword ptr fs:[00000030h] | 0_2_004F5779 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F5713 mov eax, dword ptr fs:[00000030h] | 0_2_004F5713 |
Source: C:\Users\user\Desktop\21558_Invoice_confirmation.exe | Code function: 0_2_004F572B mov eax, dword ptr fs:[00000030h] | 0_2_004F572B |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1398081537.0000000000C20000.00000002.00000001.sdmp | Binary or memory string: Shell_TrayWnd |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1398081537.0000000000C20000.00000002.00000001.sdmp | Binary or memory string: Progman |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1398081537.0000000000C20000.00000002.00000001.sdmp | Binary or memory string: &Program Manager |
Source: 21558_Invoice_confirmation.exe, 00000000.00000002.1398081537.0000000000C20000.00000002.00000001.sdmp | Binary or memory string: Progmanlock |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.