Source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmp |
Malware Configuration Extractor: Trickbot {"ver": "2000033", "gtag": "tot153", "servs": ["179.42.137.102:443", "191.36.152.198:443", "179.42.137.104:443", "179.42.137.106:443", "179.42.137.108:443", "202.183.12.124:443", "194.190.18.122:443", "103.56.207.230:443", "171.103.187.218:443", "171.103.189.118:443", "18.139.111.104:443", "179.42.137.105:443", "186.4.193.75:443", "171.101.229.2:443", "179.42.137.107:443", "103.56.43.209:443", "179.42.137.110:443", "45.181.207.156:443", "197.44.54.162:443", "179.42.137.109:443", "103.59.105.226:443", "45.181.207.101:443", "117.196.236.205:443", "72.224.45.102:443", "179.42.137.111:443", "96.47.239.181:443", "171.100.112.190:443", "117.196.239.6:443"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="} |
Source: vXVHRRGG7c.exe |
ReversingLabs: Detection: 22% |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
ReversingLabs: Detection: 22% |
Source: vXVHRRGG7c.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: |
Binary string: K:\HistogramTest\Release\HistogramTest.pdb source: vXVHRRGG7c.exe |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA, |
1_2_0041D4AF |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0041D9C5 FindFirstFileA,FindClose, |
1_2_0041D9C5 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA, |
10_2_0041D4AF |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0041D9C5 FindFirstFileA,FindClose, |
10_2_0041D9C5 |
Source: Traffic |
Snort IDS: 2404342 ET CNC Feodo Tracker Reported CnC Server TCP group 22 192.168.2.3:49719 -> 59.4.68.75:443 |
Source: C:\Windows\System32\wermgr.exe |
DNS query: name: icanhazip.com |
Source: C:\Windows\System32\wermgr.exe |
DNS query: name: icanhazip.com |
Source: Joe Sandbox View |
ASN Name: TelefonicadeArgentinaAR TelefonicadeArgentinaAR |
Source: Joe Sandbox View |
IP Address: 104.18.7.156 104.18.7.156 |
Source: global traffic |
TCP traffic: 192.168.2.3:49716 -> 171.103.189.118:449 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49710 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49695 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49713 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49698 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49697 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49696 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49695 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49711 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49694 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49696 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49693 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49692 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49692 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49697 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49693 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49715 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49715 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49713 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49698 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49711 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49710 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49694 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.42.137.105 |
Source: unknown |
DNS traffic detected: queries for: icanhazip.com |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.76.0Host: icanhazip.com |
Source: vXVHRRGG7c.exe, 00000001.00000002.303924886.000000000078A000.00000004.00000020.sdmp |
Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/> |
|
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00423386 GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA, |
1_2_00423386 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0042339B GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,SendMessageA,GetParent, |
1_2_0042339B |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0041AA1B GetKeyState,GetKeyState,GetKeyState,GetKeyState, |
1_2_0041AA1B |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00417DEB GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, |
1_2_00417DEB |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00423386 GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA, |
10_2_00423386 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0042339B GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,SendMessageA,GetParent, |
10_2_0042339B |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0041AA1B GetKeyState,GetKeyState,GetKeyState,GetKeyState, |
10_2_0041AA1B |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00417DEB GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, |
10_2_00417DEB |
Source: vXVHRRGG7c.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0040A361 |
1_2_0040A361 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004147A0 |
1_2_004147A0 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00416AD2 |
1_2_00416AD2 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0040EF5A |
1_2_0040EF5A |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A4CD0 |
1_2_024A4CD0 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0040A361 |
10_2_0040A361 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_004147A0 |
10_2_004147A0 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00416AD2 |
10_2_00416AD2 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0040EF5A |
10_2_0040EF5A |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01264CD0 |
10_2_01264CD0 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: String function: 00405A18 appears 98 times |
|
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: String function: 004244B5 appears 35 times |
|
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: String function: 00405A18 appears 98 times |
|
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: String function: 004244B5 appears 35 times |
|
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00403C23 KiUserCallbackDispatcher,LoadLibraryW,ExitProcess,GetCurrentThread,QueueUserAPC,NtTestAlert, |
1_2_00403C23 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00403CE2 GetCurrentThread,QueueUserAPC,NtTestAlert, |
1_2_00403CE2 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00403C23 LoadLibraryW,ExitProcess,GetCurrentThread,QueueUserAPC,NtTestAlert, |
10_2_00403C23 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00403CE2 GetCurrentThread,QueueUserAPC,NtTestAlert, |
10_2_00403CE2 |
Source: vXVHRRGG7c.exe, 00000001.00000002.303499051.0000000000435000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameHistogramTest.EXET vs vXVHRRGG7c.exe |
Source: vXVHRRGG7c.exe, 0000000A.00000002.400503286.0000000000435000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameHistogramTest.EXET vs vXVHRRGG7c.exe |
Source: vXVHRRGG7c.exe |
Binary or memory string: OriginalFilenameHistogramTest.EXET vs vXVHRRGG7c.exe |
Source: vXVHRRGG7c.exe |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: vXVHRRGG7c.exe.3.dr |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: vXVHRRGG7c.exe |
ReversingLabs: Detection: 22% |
Source: vXVHRRGG7c.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\vXVHRRGG7c.exe 'C:\Users\user\Desktop\vXVHRRGG7c.exe' |
|
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe |
|
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe |
|
Source: unknown |
Process created: C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c 'C:\Users\user\AppData\Local\browDownload3D\cmd01.bat' |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
|
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe |
|
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe |
|
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
System information queried: HandleInformation |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
File created: C:\Users\user\AppData\Local\browDownload3D |
Jump to behavior |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@13/3@6/6 |
Source: C:\Windows\System32\wermgr.exe |
File read: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Global\{12477072-E440-07DC-0361-112BF0B8DF37} |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \BaseNamedObjects\Local\SM0:5676:120:WilError_01 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0041B297 __EH_prolog,FindResourceA,LoadResource,LockResource,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow, |
1_2_0041B297 |
Source: unknown |
Process created: C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c 'C:\Users\user\AppData\Local\browDownload3D\cmd01.bat' |
Source: C:\Windows\System32\wermgr.exe |
File written: C:\Users\user\AppData\Local\browDownload3D\settings.ini |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: vXVHRRGG7c.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: K:\HistogramTest\Release\HistogramTest.pdb source: vXVHRRGG7c.exe |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00405A18 push eax; ret |
1_2_00405A36 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00407AE0 push eax; ret |
1_2_00407B0E |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A2C90 push dword ptr [edx+14h]; ret |
1_2_024A2D9D |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A4046 push eax; iretd |
1_2_024A4048 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A5B40 push edx; iretd |
1_2_024A5B77 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A4872 push es; iretd |
1_2_024A487B |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A3FA7 push 61992208h; ret |
1_2_024A3FAC |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_024A2D39 push dword ptr [edx+14h]; ret |
1_2_024A2D9D |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00405A18 push eax; ret |
10_2_00405A36 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00407AE0 push eax; ret |
10_2_00407B0E |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01262C90 push dword ptr [edx+14h]; ret |
10_2_01262D9D |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01264046 push eax; iretd |
10_2_01264048 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01264872 push es; iretd |
10_2_0126487B |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01265B40 push edx; iretd |
10_2_01265B77 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01262D39 push dword ptr [edx+14h]; ret |
10_2_01262D9D |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_01263FA7 push 61992208h; ret |
10_2_01263FAC |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004186ED GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary, |
1_2_004186ED |
Source: C:\Windows\System32\wermgr.exe |
File created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Jump to dropped file |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0042343E IsWindowVisible,IsIconic, |
1_2_0042343E |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004044B0 IsIconic, |
1_2_004044B0 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004126B0 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA, |
1_2_004126B0 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00404767 IsIconic,GetWindowPlacement,GetWindowRect, |
1_2_00404767 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00411F00 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC, |
1_2_00411F00 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0042343E IsWindowVisible,IsIconic, |
10_2_0042343E |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_004044B0 IsIconic, |
10_2_004044B0 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_004126B0 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA, |
10_2_004126B0 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00404767 IsIconic,GetWindowPlacement,GetWindowRect, |
10_2_00404767 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00411F00 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC, |
10_2_00411F00 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00424D9A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary, |
1_2_00424D9A |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
Function Chain: threadCreated,threadDelayed,threadDelayed,userTimerSet,threadDelayed,threadDelayed,fileVolumeQueried,languageOrLocalQueried,languageOrLocalQueried,adjustToken,systemQueried,systemQueried,threadDelayed,threadDelayed,mutantCreated,threadInformationSet,threadInformationSet,threadInformationSet,threadInformationSet,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,fileOpened |
Source: C:\Windows\System32\wermgr.exe |
Function Chain: threadCreated,threadDelayed,threadDelayed,userTimerSet,threadDelayed,threadDelayed,fileVolumeQueried,languageOrLocalQueried,languageOrLocalQueried,adjustToken,systemQueried,systemQueried,threadDelayed,threadDelayed,threadInformationSet,threadInformationSet,threadInformationSet |
Source: C:\Windows\System32\wermgr.exe |
RDTSC instruction interceptor: First address: 00000200C1644200 second address: 00000200C1644200 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 ret 0x0000000a dec esp 0x0000000b mov edi, eax 0x0000000d call dword ptr [00020816h] 0x00000013 mov ecx, 7FFE0320h 0x00000018 dec eax 0x00000019 mov ecx, dword ptr [ecx] 0x0000001b mov eax, dword ptr [7FFE0004h] 0x00000022 dec eax 0x00000023 imul eax, ecx 0x00000026 dec eax 0x00000027 shr eax, 18h 0x0000002a ret 0x0000002b inc esp 0x0000002c mov esi, eax 0x0000002e dec ecx 0x0000002f mov ebx, edi 0x00000031 dec eax 0x00000032 xor ebx, FFFFFF00h 0x00000038 dec ecx 0x00000039 and ebx, edi 0x0000003b call 00007F21ACC1B026h 0x00000040 rdtsc |
Source: C:\Windows\System32\wermgr.exe |
RDTSC instruction interceptor: First address: 0000025C6A134200 second address: 0000025C6A134200 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 ret 0x0000000a dec esp 0x0000000b mov edi, eax 0x0000000d call dword ptr [00020816h] 0x00000013 mov ecx, 7FFE0320h 0x00000018 dec eax 0x00000019 mov ecx, dword ptr [ecx] 0x0000001b mov eax, dword ptr [7FFE0004h] 0x00000022 dec eax 0x00000023 imul eax, ecx 0x00000026 dec eax 0x00000027 shr eax, 18h 0x0000002a ret 0x0000002b inc esp 0x0000002c mov esi, eax 0x0000002e dec ecx 0x0000002f mov ebx, edi 0x00000031 dec eax 0x00000032 xor ebx, FFFFFF00h 0x00000038 dec ecx 0x00000039 and ebx, edi 0x0000003b call 00007F21ACB53916h 0x00000040 rdtsc |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe TID: 5920 |
Thread sleep count: 140 > 30 |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\wermgr.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA, |
1_2_0041D4AF |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0041D9C5 FindFirstFileA,FindClose, |
1_2_0041D9C5 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA, |
10_2_0041D4AF |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0041D9C5 FindFirstFileA,FindClose, |
10_2_0041D9C5 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004186ED GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary, |
1_2_004186ED |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_02461030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError, |
1_2_02461030 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_023E095E mov eax, dword ptr fs:[00000030h] |
1_2_023E095E |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_023E0456 mov eax, dword ptr fs:[00000030h] |
1_2_023E0456 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_02461030 mov eax, dword ptr fs:[00000030h] |
1_2_02461030 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00FB095E mov eax, dword ptr fs:[00000030h] |
10_2_00FB095E |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00FB0456 mov eax, dword ptr fs:[00000030h] |
10_2_00FB0456 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_00FF1030 mov eax, dword ptr fs:[00000030h] |
10_2_00FF1030 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004039E7 LdrFindResource_U,LdrAccessResource,VirtualAllocExNuma,VirtualAlloc,WriteProcessMemory, |
1_2_004039E7 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0040B68A SetUnhandledExceptionFilter, |
1_2_0040B68A |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_0040B69C SetUnhandledExceptionFilter, |
1_2_0040B69C |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0040B68A SetUnhandledExceptionFilter, |
10_2_0040B68A |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: 10_2_0040B69C SetUnhandledExceptionFilter, |
10_2_0040B69C |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Memory written: C:\Windows\System32\wermgr.exe base: 200C1640000 |
Jump to behavior |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Memory written: C:\Windows\System32\wermgr.exe base: 7FF7EE4D2860 |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Memory written: C:\Windows\System32\wermgr.exe base: 25C6A130000 |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Memory written: C:\Windows\System32\wermgr.exe base: 7FF7EE4D2860 |
Jump to behavior |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Memory allocated: C:\Windows\System32\wermgr.exe base: 200C1640000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Memory allocated: C:\Windows\System32\wermgr.exe base: 25C6A130000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe |
Jump to behavior |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\wermgr.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte, |
1_2_004100FD |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: EnumSystemLocalesA, |
1_2_0040E0FD |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: GetLocaleInfoA,MultiByteToWideChar, |
1_2_004100A7 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: GetLocaleInfoW,WideCharToMultiByte, |
1_2_004101C0 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: EnumSystemLocalesA, |
1_2_0040E388 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: EnumSystemLocalesA, |
1_2_0040E49B |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: GetLocaleInfoA, |
1_2_0040E68F |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: GetLocaleInfoA,IsValidCodePage,IsValidLocale, |
1_2_0040DF28 |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar, |
1_2_0040FFEA |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte, |
10_2_004100FD |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: EnumSystemLocalesA, |
10_2_0040E0FD |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: GetLocaleInfoA,MultiByteToWideChar, |
10_2_004100A7 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: GetLocaleInfoW,WideCharToMultiByte, |
10_2_004101C0 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: EnumSystemLocalesA, |
10_2_0040E388 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: EnumSystemLocalesA, |
10_2_0040E49B |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: GetLocaleInfoA, |
10_2_0040E68F |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: GetLocaleInfoA,IsValidCodePage,IsValidLocale, |
10_2_0040DF28 |
Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe |
Code function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar, |
10_2_0040FFEA |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004066CD GetLocalTime,GetSystemTime,GetTimeZoneInformation, |
1_2_004066CD |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_004066CD GetLocalTime,GetSystemTime,GetTimeZoneInformation, |
1_2_004066CD |
Source: C:\Users\user\Desktop\vXVHRRGG7c.exe |
Code function: 1_2_00424F12 GetVersion,GetProcessVersion,LoadCursorA,LoadCursorA,LoadCursorA, |
1_2_00424F12 |
Source: Yara match |
File source: 1.2.vXVHRRGG7c.exe.24a0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.vXVHRRGG7c.exe.1260000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.vXVHRRGG7c.exe.23e052e.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.vXVHRRGG7c.exe.fb052e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.vXVHRRGG7c.exe.23e052e.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.vXVHRRGG7c.exe.fb052e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000002.400799901.0000000000FF4000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.400763097.0000000000FB0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.304517846.0000000002464000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.400850600.0000000001261000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.304177777.00000000023E0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 1.2.vXVHRRGG7c.exe.24a0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.vXVHRRGG7c.exe.1260000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.vXVHRRGG7c.exe.23e052e.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.vXVHRRGG7c.exe.fb052e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.vXVHRRGG7c.exe.23e052e.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.vXVHRRGG7c.exe.fb052e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000002.400799901.0000000000FF4000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.400763097.0000000000FB0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.304517846.0000000002464000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.400850600.0000000001261000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.304177777.00000000023E0000.00000040.00000001.sdmp, type: MEMORY |