Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Virustotal: Detection: 23% |
Perma Link |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
ReversingLabs: Detection: 24% |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Process Stats: CPU usage > 98% |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_00404BEE |
0_2_00404BEE |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_00404C48 |
0_2_00404C48 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_00404C21 |
0_2_00404C21 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_00404C80 |
0_2_00404C80 |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000000.331338295.0000000000416000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenamelseferier.exe vs PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367508550.00000000021D0000.00000002.00000001.sdmp |
Binary or memory string: OriginalFilenameuser32j% vs PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Binary or memory string: OriginalFilenamelseferier.exe vs PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: classification engine |
Classification label: mal80.troj.evad.winEXE@1/0@0/0 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
File created: C:\Users\user\AppData\Local\Temp\~DF496457654F946C01.TMP |
Jump to behavior |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Section loaded: C:\Windows\SysWOW64\msvbvm60.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Virustotal: Detection: 23% |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
ReversingLabs: Detection: 24% |
Source: Yara match |
File source: Process Memory Space: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe PID: 7100, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe PID: 7100, type: MEMORY |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_00404592 push ebp; iretd |
0_2_0040459B |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02212459 |
0_2_02212459 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216EA1 |
0_2_02216EA1 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_022124A7 |
0_2_022124A7 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_022168E1 |
0_2_022168E1 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216AF5 |
0_2_02216AF5 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_022168D4 |
0_2_022168D4 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02211D88 |
0_2_02211D88 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 000000000221713A second address: 000000000221713A instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 000000000221651C second address: 0000000002216527 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 0000000002216527 second address: 0000000002216527 instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022165EC second address: 0000000002216603 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp esi, 0000F000h 0x00000010 je 00007F1D7CF4B320h 0x00000016 pushad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 0000000002216603 second address: 0000000002216603 instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022166BF second address: 00000000022166D0 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp dword ptr [edi+14h], 40h 0x0000000e je 00007F1D7CF4B002h 0x00000010 pushad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022166D0 second address: 00000000022166D0 instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022167BD second address: 00000000022167CA instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor eax, eax 0x0000000c pushad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022167CA second address: 00000000022167CA instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 000000000221064F second address: 00000000022162B1 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test ax, 0000701Dh 0x0000000e call 00007F1D7CF509D9h 0x00000013 cmp ebx, ebx 0x00000015 cmp ecx, ecx 0x00000017 call 00007F1D7CF4B190h 0x0000001c test dh, bh 0x0000001e cmp ax, bx 0x00000021 xor edi, edi 0x00000023 test esi, 5B8401F4h 0x00000029 mov dword ptr [ebp+000000F8h], 00A95F60h 0x00000033 test al, 09h 0x00000035 test ah, 00000068h 0x00000038 cmp dh, ah 0x0000003a test ch, 0000007Bh 0x0000003d call 00007F1D7CF4B05Eh 0x00000042 call 00007F1D7CF4AFF8h 0x00000047 lfence 0x0000004a mov edx, dword ptr [7FFE0014h] 0x00000050 lfence 0x00000053 ret 0x00000054 mov esi, edx 0x00000056 pushad 0x00000057 rdtsc |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 000000000221713A second address: 000000000221713A instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 000000000221651C second address: 0000000002216527 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 0000000002216527 second address: 0000000002216527 instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022165EC second address: 0000000002216603 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp esi, 0000F000h 0x00000010 je 00007F1D7CF4B320h 0x00000016 pushad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 0000000002216603 second address: 0000000002216603 instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022166BF second address: 00000000022166D0 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp dword ptr [edi+14h], 40h 0x0000000e je 00007F1D7CF4B002h 0x00000010 pushad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022166D0 second address: 00000000022166D0 instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022167BD second address: 00000000022167CA instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor eax, eax 0x0000000c pushad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022167CA second address: 00000000022167CA instructions: |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 000000000221064F second address: 00000000022162B1 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test ax, 0000701Dh 0x0000000e call 00007F1D7CF509D9h 0x00000013 cmp ebx, ebx 0x00000015 cmp ecx, ecx 0x00000017 call 00007F1D7CF4B190h 0x0000001c test dh, bh 0x0000001e cmp ax, bx 0x00000021 xor edi, edi 0x00000023 test esi, 5B8401F4h 0x00000029 mov dword ptr [ebp+000000F8h], 00A95F60h 0x00000033 test al, 09h 0x00000035 test ah, 00000068h 0x00000038 cmp dh, ah 0x0000003a test ch, 0000007Bh 0x0000003d call 00007F1D7CF4B05Eh 0x00000042 call 00007F1D7CF4AFF8h 0x00000047 lfence 0x0000004a mov edx, dword ptr [7FFE0014h] 0x00000050 lfence 0x00000053 ret 0x00000054 mov esi, edx 0x00000056 pushad 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
RDTSC instruction interceptor: First address: 00000000022162B1 second address: 00000000022162B1 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F1D7C8FA428h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test dh, bh 0x0000001f add edi, edx 0x00000021 cmp ax, bx 0x00000024 dec dword ptr [ebp+000000F8h] 0x0000002a cmp dword ptr [ebp+000000F8h], 00000000h 0x00000031 jne 00007F1D7C8FA402h 0x00000033 cmp dh, ah 0x00000035 test ch, 0000007Bh 0x00000038 call 00007F1D7C8FA49Eh 0x0000003d call 00007F1D7C8FA438h 0x00000042 lfence 0x00000045 mov edx, dword ptr [7FFE0014h] 0x0000004b lfence 0x0000004e ret 0x0000004f mov esi, edx 0x00000051 pushad 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216056 rdtsc |
0_2_02216056 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Process Stats: CPU usage > 90% for more than 60s |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216056 rdtsc |
0_2_02216056 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_022126B7 mov eax, dword ptr fs:[00000030h] |
0_2_022126B7 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216AE8 mov eax, dword ptr fs:[00000030h] |
0_2_02216AE8 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216AF5 mov eax, dword ptr fs:[00000030h] |
0_2_02216AF5 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02216B35 mov eax, dword ptr fs:[00000030h] |
0_2_02216B35 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02215F3E mov eax, dword ptr fs:[00000030h] |
0_2_02215F3E |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02213567 mov eax, dword ptr fs:[00000030h] |
0_2_02213567 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_02211D88 mov eax, dword ptr fs:[00000030h] |
0_2_02211D88 |
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe |
Code function: 0_2_022159EE mov eax, dword ptr fs:[00000030h] |
0_2_022159EE |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp |
Binary or memory string: Progman |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp |
Binary or memory string: &Program Manager |
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp |
Binary or memory string: Progmanlock |