Windows Analysis Report Unreal.exe

Overview

General Information

Sample Name: Unreal.exe
Analysis ID: 1369
MD5: 35a93d1f2edc044b3d8289abfeb17a43
SHA1: c29f2524ae4bd239c849720b1fc6ce5c13bee93b
SHA256: 88d3b3a6564e25b63b31f4a00361384fd294f228763b3bde4e3162144971d385
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score: 92
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected GuLoader
Hides threads from debuggers
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Creates a DirectInput object (often for capturing keystrokes)
Drops files with a non-matching file extension (content does not match file extension)
PE file does not import any functions
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Enables security privileges
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: Unreal.exe Malware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=dow"}
Multi AV Scanner detection for submitted file
Source: Unreal.exe ReversingLabs: Detection: 13%

Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic Provider
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2C1C4 CreateDirectoryW,FreeLibrary,DecryptFileW,FreeLibrary,FreeLibrary, 24_2_00007FF742E2C1C4

Compliance:

barindex
Uses 32bit PE files
Source: Unreal.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: unknown HTTPS traffic detected: 142.250.185.142:443 -> 192.168.11.20:49763 version: TLS 1.2
Source: Binary string: rsaenh.pdb source: WerFault.exe, 0000000C.00000003.5585066686.00000000069F8000.00000004.00000001.sdmp
Source: Binary string: CLBCatQ.pdb( source: WerFault.exe, 0000000C.00000003.5557061554.0000000005D84000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdb( source: WerFault.exe, 0000000C.00000003.5552355608.0000000002833000.00000004.00000001.sdmp
Source: Binary string: ncryptsslp.pdb1I source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb( source: WerFault.exe, 0000000C.00000003.5571125548.0000000005D73000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000C.00000003.5551962205.00000000027F4000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000C.00000003.5562290340.000000000597C000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000C.00000003.5609465686.00000000049A0000.00000004.00000040.sdmp
Source: Binary string: RegAsm.pdb source: WerFault.exe, 0000000C.00000003.5609368577.00000000049D1000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000C.00000003.5550085829.000000000278F000.00000004.00000001.sdmp
Source: Binary string: winnsi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: cryptsp.pdb source: WerFault.exe, 0000000C.00000003.5590237847.000000000699B000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000C.00000003.5559519325.0000000005D62000.00000004.00000001.sdmp
Source: Binary string: ucrtbase.pdb( source: WerFault.exe, 0000000C.00000003.5554021670.000000000282C000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb( source: WerFault.exe, 0000000C.00000003.5560045007.0000000002839000.00000004.00000001.sdmp
Source: Binary string: qncryptsslp.pdb source: WerFault.exe, 0000000C.00000003.5574373177.0000000006349000.00000004.00000001.sdmp
Source: Binary string: msi.pdb source: WerFault.exe, 0000000C.00000003.5555988282.000000000598D000.00000004.00000001.sdmp
Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: schannel.pdb source: WerFault.exe, 0000000C.00000003.5579000492.0000000006587000.00000004.00000001.sdmp
Source: Binary string: urlmon.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb( source: WerFault.exe, 0000000C.00000003.5553326030.0000000005977000.00000004.00000001.sdmp
Source: Binary string: MpSigStub.pdbGCTL source: mpam-20b5c938.exe, 00000017.00000003.6155056829.000001C6B5161000.00000004.00000001.sdmp, MpSigStub.exe, 00000018.00000003.6173396179.0000025A7B313000.00000004.00000001.sdmp, MpSigStub.exe.23.dr
Source: Binary string: WLDP.pdb( source: WerFault.exe, 0000000C.00000003.5563888052.0000000005D6E000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb( source: WerFault.exe, 0000000C.00000003.5562290340.000000000597C000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb6X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000C.00000003.5551996504.00000000027FA000.00000004.00000001.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb@X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb( source: WerFault.exe, 0000000C.00000003.5557034969.0000000005D7F000.00000004.00000001.sdmp
Source: Binary string: cryptbase.pdb( source: WerFault.exe, 0000000C.00000003.5590481067.0000000006A53000.00000004.00000001.sdmp
Source: Binary string: RegAsm.pdb( source: WerFault.exe, 0000000C.00000003.5554127676.000000000276B000.00000004.00000001.sdmp
Source: Binary string: cryptsp.pdb( source: WerFault.exe, 0000000C.00000003.5590237847.000000000699B000.00000004.00000001.sdmp
Source: Binary string: srvcli.pdb source: WerFault.exe, 0000000C.00000003.5579678253.00000000064BF000.00000004.00000001.sdmp
Source: Binary string: mscoree.pdb source: WerFault.exe, 0000000C.00000003.5550573742.0000000002794000.00000004.00000001.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb( source: WerFault.exe, 0000000C.00000003.5553459243.0000000005993000.00000004.00000001.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: gpapi.pdb( source: WerFault.exe, 0000000C.00000003.5555030899.0000000006AAD000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000C.00000003.5558896267.0000000005D9B000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdb=I source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: dpapi.pdb( source: WerFault.exe, 0000000C.00000003.5590924536.00000000065A3000.00000004.00000001.sdmp
Source: Binary string: wmswsock.pdb( source: WerFault.exe, 0000000C.00000003.5579261146.0000000005D95000.00000004.00000001.sdmp
Source: Binary string: nsi.pdb source: WerFault.exe, 0000000C.00000003.5609368577.00000000049D1000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb( source: WerFault.exe, 0000000C.00000003.5552657974.000000000523E000.00000004.00000001.sdmp
Source: Binary string: gpapi.pdb source: WerFault.exe, 0000000C.00000003.5555030899.0000000006AAD000.00000004.00000001.sdmp
Source: Binary string: rsaenh.pdb( source: WerFault.exe, 0000000C.00000003.5585066686.00000000069F8000.00000004.00000001.sdmp
Source: Binary string: wwin32u.pdb( source: WerFault.exe, 0000000C.00000003.5553896637.0000000002816000.00000004.00000001.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000C.00000003.5609465686.00000000049A0000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: CLBCatQ.pdb.X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msasn1.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb"X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: rasadhlp.pdb( source: WerFault.exe, 0000000C.00000003.5578930131.000000000657C000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000C.00000003.5556924766.0000000005D68000.00000004.00000001.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wininet.pdbLX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wuser32.pdb( source: WerFault.exe, 0000000C.00000003.5553864316.0000000002810000.00000004.00000001.sdmp
Source: Binary string: iertutil.pdb( source: WerFault.exe, 0000000C.00000003.5560528570.0000000005D57000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000C.00000003.5551962205.00000000027F4000.00000004.00000001.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ncrypt.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: dpapi.pdb source: WerFault.exe, 0000000C.00000003.5590924536.00000000065A3000.00000004.00000001.sdmp
Source: Binary string: profapi.pdbTX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000C.00000003.5609465686.00000000049A0000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb( source: WerFault.exe, 0000000C.00000003.5569202232.000000000599E000.00000004.00000001.sdmp
Source: Binary string: shcore.pdb( source: WerFault.exe, 0000000C.00000003.5563767171.0000000005D5D000.00000004.00000001.sdmp
Source: Binary string: rasadhlp.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: netutils.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb( source: WerFault.exe, 0000000C.00000003.5552283718.0000000002827000.00000004.00000001.sdmp
Source: Binary string: WLDP.pdbZX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdbFX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wininet.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb( source: WerFault.exe, 0000000C.00000003.5573477863.0000000005D79000.00000004.00000001.sdmp
Source: Binary string: wgdi32full.pdb( source: WerFault.exe, 0000000C.00000003.5553966425.0000000002821000.00000004.00000001.sdmp
Source: Binary string: shell32.pdb( source: WerFault.exe, 0000000C.00000003.5553602111.0000000005228000.00000004.00000001.sdmp
Source: Binary string: MpAdlStub.pdb source: mpam-20b5c938.exe, 00000017.00000000.6138920683.00007FF7EC2AF000.00000002.00020000.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 0000000C.00000003.5563767171.0000000005D5D000.00000004.00000001.sdmp
Source: Binary string: ncryptsslp.pdb( source: WerFault.exe, 0000000C.00000003.5595558950.0000000006B6A000.00000004.00000001.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdb( source: WerFault.exe, 0000000C.00000003.5557732587.0000000005233000.00000004.00000001.sdmp
Source: Binary string: ck.pdb) source: WerFault.exe, 0000000C.00000003.5565025438.0000000005F5B000.00000004.00000001.sdmp
Source: Binary string: MpClient.pdb source: MpSigStub.exe, 00000018.00000003.6171462961.0000025A7B312000.00000004.00000001.sdmp
Source: Binary string: ntasn1.pdb7I source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: schannel.pdb( source: WerFault.exe, 0000000C.00000003.5579000492.0000000006587000.00000004.00000001.sdmp
Source: Binary string: dnsapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb( source: WerFault.exe, 0000000C.00000003.5564336996.0000000005982000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: rasadhlp.pdboJ source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winnsi.pdb( source: WerFault.exe, 0000000C.00000003.5579357046.0000000005DA6000.00000004.00000001.sdmp
Source: Binary string: sechost.pdbxX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb( source: WerFault.exe, 0000000C.00000003.5556924766.0000000005D68000.00000004.00000001.sdmp
Source: Binary string: msi.pdb( source: WerFault.exe, 0000000C.00000003.5555988282.000000000598D000.00000004.00000001.sdmp
Source: Binary string: ntasn1.pdb source: WerFault.exe, 0000000C.00000003.5569029216.0000000006592000.00000004.00000001.sdmp
Source: Binary string: fwpuclnt.pdb( source: WerFault.exe, 0000000C.00000003.5570732197.0000000006581000.00000004.00000001.sdmp
Source: Binary string: OnDemandConnRouteHelper.pdb source: WerFault.exe, 0000000C.00000003.5568021975.0000000006245000.00000004.00000001.sdmp
Source: Binary string: MpSigStub.pdb source: mpam-20b5c938.exe, 00000017.00000003.6155056829.000001C6B5161000.00000004.00000001.sdmp, MpSigStub.exe, 00000018.00000003.6173396179.0000025A7B313000.00000004.00000001.sdmp, MpSigStub.exe.23.dr
Source: Binary string: ole32.pdbrX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: combase.pdb( source: WerFault.exe, 0000000C.00000003.5552632966.0000000005239000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000C.00000003.5550085829.000000000278F000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: WLDP.pdb source: WerFault.exe, 0000000C.00000003.5563888052.0000000005D6E000.00000004.00000001.sdmp
Source: Binary string: wsspicli.pdb<X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: setupapi.pdb0X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wmswsock.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wintrust.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: mskeyprotect.pdb# source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: crypt32.pdb( source: WerFault.exe, 0000000C.00000003.5586901895.0000000006598000.00000004.00000001.sdmp
Source: Binary string: dnsapi.pdb( source: WerFault.exe, 0000000C.00000003.5581399598.0000000006576000.00000004.00000001.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb( source: WerFault.exe, 0000000C.00000003.5552064732.0000000002805000.00000004.00000001.sdmp
Source: Binary string: ntasn1.pdb( source: WerFault.exe, 0000000C.00000003.5569029216.0000000006592000.00000004.00000001.sdmp
Source: Binary string: srvcli.pdb( source: WerFault.exe, 0000000C.00000003.5579678253.00000000064BF000.00000004.00000001.sdmp
Source: Binary string: psapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 0000000C.00000003.5570732197.0000000006581000.00000004.00000001.sdmp
Source: Binary string: ws2_32.pdb( source: WerFault.exe, 0000000C.00000003.5559728887.0000000005D8A000.00000004.00000001.sdmp
Source: Binary string: MpAdlStub.pdbGCTL source: mpam-20b5c938.exe, 00000017.00000000.6138920683.00007FF7EC2AF000.00000002.00020000.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000C.00000003.5590481067.0000000006A53000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000C.00000003.5551996504.00000000027FA000.00000004.00000001.sdmp
Source: Binary string: OnDemandConnRouteHelper.pdb( source: WerFault.exe, 0000000C.00000003.5568021975.0000000006245000.00000004.00000001.sdmp
Source: Binary string: MpClient.pdbGCTL source: MpSigStub.exe, 00000018.00000003.6171462961.0000025A7B312000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdb( source: WerFault.exe, 0000000C.00000003.5558896267.0000000005D9B000.00000004.00000001.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb(X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000C.00000003.5553864316.0000000002810000.00000004.00000001.sdmp
Source: Binary string: wininet.pdb( source: WerFault.exe, 0000000C.00000003.5553538636.00000000059A4000.00000004.00000001.sdmp
Source: Binary string: crypt32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2B030 FindNextFileW,FindClose,FindFirstFileW, 24_2_00007FF742E2B030
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2ADEC FindFirstFileW,FindNextFileW,FindClose,FindClose, 24_2_00007FF742E2ADEC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E52504 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 24_2_00007FF742E52504
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDF810 FindFirstFileW,FindNextFileW,FindClose,CloseHandle,CloseHandle, 24_2_00007FF742DDF810

Networking:

barindex
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: https://drive.google.com/uc?export=dow
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /uc?export=download&id=1JZajQIQdUbLIFKGrWeKAj7F2g5cgApuC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=UTF-8x-chromium-appcache-fallback-override: disallow-fallbackP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: script-src 'nonce-MIVbPGF4ZuXsZ2NZTTzVEQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/drive-explorer/Date: Mon, 27 Sep 2021 14:33:04 GMTExpires: Mon, 27 Sep 2021 14:33:04 GMTCache-Control: private, max-age=0X-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINX-XSS-Protection: 1; mode=blockServer: GSESet-Cookie: NID=511=kWh_xUioAXmCXt6QIW6Mm4DtzPI9_fAr2WiFKEmXPAjZvuWqXj1I7phnbwK5qVZOA3KA2Dwc9IGtRHUtfxRy-aBcUQZ4zKf-uCz414_kuMrvIGUe_DgGauW80ouL5dhtM9v6jgmzo75QoUqo2k6HSanF5BaWh7W1UvFmn1Szn94; expires=Tue, 29-Mar-2022 14:33:04 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"Accept-Ranges: noneVary: Accept-EncodingConnection: closeTransfer-Encoding: chunked
Source: RegAsm.exe, 00000008.00000000.5527652097.0000000001197000.00000004.00000020.sdmp, WerFault.exe, 0000000C.00000002.5644218565.0000000005978000.00000004.00000001.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: RegAsm.exe, 00000008.00000000.5527652097.0000000001197000.00000004.00000020.sdmp, WerFault.exe, 0000000C.00000002.5644218565.0000000005978000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: RegAsm.exe, 00000008.00000003.3163191728.0000000001197000.00000004.00000001.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
Source: RegAsm.exe, 00000008.00000000.5537128570.0000000001173000.00000004.00000020.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/Qe
Source: RegAsm.exe, 00000008.00000002.5647356413.0000000001108000.00000004.00000020.sdmp String found in binary or memory: https://drive.google.com/A
Source: RegAsm.exe, 00000008.00000002.5647356413.0000000001108000.00000004.00000020.sdmp String found in binary or memory: https://drive.google.com/I
Source: RegAsm.exe, 00000008.00000000.5526462839.0000000000FE0000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000000.5536952737.0000000001151000.00000004.00000020.sdmp String found in binary or memory: https://drive.google.com/uc?export=download&id=1JZajQIQdUbLIFKGrWeKAj7F2g5cgApuC
Source: RegAsm.exe, 00000008.00000002.5647356413.0000000001108000.00000004.00000020.sdmp String found in binary or memory: https://drive.google.com/uc?export=download&id=1JZajQIQdUbLIFKGrWeKAj7F2g5cgApuCY
Source: unknown DNS traffic detected: queries for: drive.google.com
Source: global traffic HTTP traffic detected: GET /uc?export=download&id=1JZajQIQdUbLIFKGrWeKAj7F2g5cgApuC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
Source: unknown HTTPS traffic detected: 142.250.185.142:443 -> 192.168.11.20:49763 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: WerFault.exe, 0000000C.00000003.5552485796.000000000518D000.00000004.00000001.sdmp Binary or memory string: DWM8And16Bit_DirectDrawCreateEx_CallOut

System Summary:

barindex
Uses 32bit PE files
Source: Unreal.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
One or more processes crash
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7508 -s 828
Deletes files inside the Windows folder
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File deleted: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Jump to behavior
Creates files inside the system directory
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD Jump to behavior
Detected potential crypto function
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5FA0B 8_2_00D5FA0B
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5A31F 8_2_00D5A31F
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5000A 8_2_00D5000A
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D57996 8_2_00D57996
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D50AC4 8_2_00D50AC4
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D57281 8_2_00D57281
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5E2B0 8_2_00D5E2B0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D59AA7 8_2_00D59AA7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D595CB 8_2_00D595CB
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5E567 8_2_00D5E567
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D59515 8_2_00D59515
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D59E3B 8_2_00D59E3B
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DD3728 24_2_00007FF742DD3728
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DC86BC 24_2_00007FF742DC86BC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DCFF90 24_2_00007FF742DCFF90
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDD038 24_2_00007FF742DDD038
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2E410 24_2_00007FF742E2E410
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E4837C 24_2_00007FF742E4837C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF0320 24_2_00007FF742DF0320
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E52504 24_2_00007FF742E52504
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E534D4 24_2_00007FF742E534D4
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF6480 24_2_00007FF742DF6480
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E42480 24_2_00007FF742E42480
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DC1420 24_2_00007FF742DC1420
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DEB20C 24_2_00007FF742DEB20C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E0A288 24_2_00007FF742E0A288
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DE9278 24_2_00007FF742DE9278
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3C21C 24_2_00007FF742E3C21C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E477FC 24_2_00007FF742E477FC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2F76C 24_2_00007FF742E2F76C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E0490C 24_2_00007FF742E0490C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3B88C 24_2_00007FF742E3B88C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DEA818 24_2_00007FF742DEA818
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF15F8 24_2_00007FF742DF15F8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E37600 24_2_00007FF742E37600
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E39520 24_2_00007FF742E39520
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DEC52C 24_2_00007FF742DEC52C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF1C10 24_2_00007FF742DF1C10
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E39B34 24_2_00007FF742E39B34
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DE1D00 24_2_00007FF742DE1D00
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DC9CFC 24_2_00007FF742DC9CFC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF3CE0 24_2_00007FF742DF3CE0
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3CCC8 24_2_00007FF742E3CCC8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DE3C87 24_2_00007FF742DE3C87
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3BC60 24_2_00007FF742E3BC60
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3D9D0 24_2_00007FF742E3D9D0
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DCB944 24_2_00007FF742DCB944
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E41950 24_2_00007FF742E41950
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF0AB0 24_2_00007FF742DF0AB0
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3BA74 24_2_00007FF742E3BA74
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DEAA68 24_2_00007FF742DEAA68
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDEFCC 24_2_00007FF742DDEFCC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDDFB4 24_2_00007FF742DDDFB4
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E45F9C 24_2_00007FF742E45F9C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DD1FA8 24_2_00007FF742DD1FA8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DEFFA8 24_2_00007FF742DEFFA8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E37108 24_2_00007FF742E37108
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DCB0C8 24_2_00007FF742DCB0C8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3D058 24_2_00007FF742E3D058
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E4B058 24_2_00007FF742E4B058
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E27050 24_2_00007FF742E27050
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3C034 24_2_00007FF742E3C034
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DF502C 24_2_00007FF742DF502C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E41E00 24_2_00007FF742E41E00
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E22DD4 24_2_00007FF742E22DD4
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3DD9C 24_2_00007FF742E3DD9C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E21D78 24_2_00007FF742E21D78
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E25ED0 24_2_00007FF742E25ED0
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E3BE48 24_2_00007FF742E3BE48
Found potential string decryption / allocating functions
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: String function: 00007FF742DD0DB4 appears 56 times
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: String function: 00007FF742DD0D88 appears 41 times
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: String function: 00007FF742E2BAAC appears 36 times
Contains functionality to call native functions
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5F3D0 NtProtectVirtualMemory, 8_2_00D5F3D0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5A31F NtAllocateVirtualMemory,LoadLibraryA, 8_2_00D5A31F
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D59E3B NtAllocateVirtualMemory, 8_2_00D59E3B
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDC444 NtQueryInformationProcess,NtQueryInformationProcess,FindCloseChangeNotification,CloseHandle, 24_2_00007FF742DDC444
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DE5B80 ReadFile,FlushFileBuffers,SetEndOfFile,NtSetInformationFile, 24_2_00007FF742DE5B80
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DD9FF0 NtSetInformationFile, 24_2_00007FF742DD9FF0
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DE5DB4 NtQueryInformationFile,NtQueryInformationFile,RtlNtStatusToDosError, 24_2_00007FF742DE5DB4
Abnormal high CPU Usage
Source: C:\Users\user\Desktop\Unreal.exe Process Stats: CPU usage > 98%
PE file does not import any functions
Source: mpasdlta.vdm.23.dr Static PE information: No import functions for PE file found
Source: mpavdlta.vdm.23.dr Static PE information: No import functions for PE file found
PE file contains strange resources
Source: Unreal.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Users\user\Desktop\Unreal.exe Section loaded: edgegdi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Section loaded: edgegdi.dll Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Section loaded: edgegdi.dll Jump to behavior
Enables security privileges
Source: C:\Windows\System32\wevtutil.exe Process token adjusted: Security Jump to behavior
Source: Unreal.exe ReversingLabs: Detection: 13%
Source: Unreal.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Unreal.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\Unreal.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Unreal.exe 'C:\Users\user\Desktop\Unreal.exe'
Source: C:\Users\user\Desktop\Unreal.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Unreal.exe'
Source: C:\Users\user\Desktop\Unreal.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Unreal.exe'
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7508 -s 828
Source: unknown Process created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe 'C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-20b5c938.exe' /q WD
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe /stub 1.1.18500.10 /payload 1.349.1496.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-20b5c938.exe /q WD
Source: unknown Process created: C:\Windows\System32\wevtutil.exe C:\Windows\system32\wevtutil.exe uninstall-manifest C:\Windows\TEMP\A491FE0B-CBB3-0812-A9E9-28E6069853FA.man
Source: C:\Windows\System32\wevtutil.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\System32\wevtutil.exe C:\Windows\system32\wevtutil.exe install-manifest C:\Windows\TEMP\A491FE0B-CBB3-0812-A9E9-28E6069853FA.man '/resourceFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll' '/messageFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll' '/parameterFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll'
Source: C:\Windows\System32\wevtutil.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Unreal.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Unreal.exe' Jump to behavior
Source: C:\Users\user\Desktop\Unreal.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Unreal.exe' Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe /stub 1.1.18500.10 /payload 1.349.1496.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-20b5c938.exe /q WD Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2F118 LookupPrivilegeValueW,GetCurrentProcess,CloseHandle,AdjustTokenPrivileges,CloseHandle,GetLastError,CloseHandle, 24_2_00007FF742E2F118
Source: C:\Users\user\Desktop\Unreal.exe File created: C:\Users\user\AppData\Local\Temp\~DF256AB04E6125E28E.TMP Jump to behavior
Source: classification engine Classification label: mal92.troj.evad.winEXE@14/8@2/1
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DCB0C8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle, 24_2_00007FF742DCB0C8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDB1C4 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,GetLastError,Process32FirstW,GetLastError,Process32NextW,GetLastError,FindCloseChangeNotification,CloseHandle, 24_2_00007FF742DDB1C4
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:8100:304:WilStaging_02
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:3060:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7508
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:3060:304:WilStaging_02
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:8100:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:304:WilStaging_02
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DE1AE0 FindResourceW,GetLastError,LoadResource,GetLastError,LockResource,GetLastError,SizeofResource,GetLastError, 24_2_00007FF742DE1AE0
Source: Window Recorder Window detected: More than 3 window changes detected
Source: Binary string: rsaenh.pdb source: WerFault.exe, 0000000C.00000003.5585066686.00000000069F8000.00000004.00000001.sdmp
Source: Binary string: CLBCatQ.pdb( source: WerFault.exe, 0000000C.00000003.5557061554.0000000005D84000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdb( source: WerFault.exe, 0000000C.00000003.5552355608.0000000002833000.00000004.00000001.sdmp
Source: Binary string: ncryptsslp.pdb1I source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb( source: WerFault.exe, 0000000C.00000003.5571125548.0000000005D73000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000C.00000003.5551962205.00000000027F4000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000C.00000003.5562290340.000000000597C000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000C.00000003.5609465686.00000000049A0000.00000004.00000040.sdmp
Source: Binary string: RegAsm.pdb source: WerFault.exe, 0000000C.00000003.5609368577.00000000049D1000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000C.00000003.5550085829.000000000278F000.00000004.00000001.sdmp
Source: Binary string: winnsi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: cryptsp.pdb source: WerFault.exe, 0000000C.00000003.5590237847.000000000699B000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000C.00000003.5559519325.0000000005D62000.00000004.00000001.sdmp
Source: Binary string: ucrtbase.pdb( source: WerFault.exe, 0000000C.00000003.5554021670.000000000282C000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb( source: WerFault.exe, 0000000C.00000003.5560045007.0000000002839000.00000004.00000001.sdmp
Source: Binary string: qncryptsslp.pdb source: WerFault.exe, 0000000C.00000003.5574373177.0000000006349000.00000004.00000001.sdmp
Source: Binary string: msi.pdb source: WerFault.exe, 0000000C.00000003.5555988282.000000000598D000.00000004.00000001.sdmp
Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: schannel.pdb source: WerFault.exe, 0000000C.00000003.5579000492.0000000006587000.00000004.00000001.sdmp
Source: Binary string: urlmon.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb( source: WerFault.exe, 0000000C.00000003.5553326030.0000000005977000.00000004.00000001.sdmp
Source: Binary string: MpSigStub.pdbGCTL source: mpam-20b5c938.exe, 00000017.00000003.6155056829.000001C6B5161000.00000004.00000001.sdmp, MpSigStub.exe, 00000018.00000003.6173396179.0000025A7B313000.00000004.00000001.sdmp, MpSigStub.exe.23.dr
Source: Binary string: WLDP.pdb( source: WerFault.exe, 0000000C.00000003.5563888052.0000000005D6E000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb( source: WerFault.exe, 0000000C.00000003.5562290340.000000000597C000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb6X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000C.00000003.5551996504.00000000027FA000.00000004.00000001.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb@X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb( source: WerFault.exe, 0000000C.00000003.5557034969.0000000005D7F000.00000004.00000001.sdmp
Source: Binary string: cryptbase.pdb( source: WerFault.exe, 0000000C.00000003.5590481067.0000000006A53000.00000004.00000001.sdmp
Source: Binary string: RegAsm.pdb( source: WerFault.exe, 0000000C.00000003.5554127676.000000000276B000.00000004.00000001.sdmp
Source: Binary string: cryptsp.pdb( source: WerFault.exe, 0000000C.00000003.5590237847.000000000699B000.00000004.00000001.sdmp
Source: Binary string: srvcli.pdb source: WerFault.exe, 0000000C.00000003.5579678253.00000000064BF000.00000004.00000001.sdmp
Source: Binary string: mscoree.pdb source: WerFault.exe, 0000000C.00000003.5550573742.0000000002794000.00000004.00000001.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb( source: WerFault.exe, 0000000C.00000003.5553459243.0000000005993000.00000004.00000001.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: gpapi.pdb( source: WerFault.exe, 0000000C.00000003.5555030899.0000000006AAD000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000C.00000003.5558896267.0000000005D9B000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdb=I source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: dpapi.pdb( source: WerFault.exe, 0000000C.00000003.5590924536.00000000065A3000.00000004.00000001.sdmp
Source: Binary string: wmswsock.pdb( source: WerFault.exe, 0000000C.00000003.5579261146.0000000005D95000.00000004.00000001.sdmp
Source: Binary string: nsi.pdb source: WerFault.exe, 0000000C.00000003.5609368577.00000000049D1000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb( source: WerFault.exe, 0000000C.00000003.5552657974.000000000523E000.00000004.00000001.sdmp
Source: Binary string: gpapi.pdb source: WerFault.exe, 0000000C.00000003.5555030899.0000000006AAD000.00000004.00000001.sdmp
Source: Binary string: rsaenh.pdb( source: WerFault.exe, 0000000C.00000003.5585066686.00000000069F8000.00000004.00000001.sdmp
Source: Binary string: wwin32u.pdb( source: WerFault.exe, 0000000C.00000003.5553896637.0000000002816000.00000004.00000001.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000C.00000003.5609465686.00000000049A0000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: CLBCatQ.pdb.X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msasn1.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb"X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: rasadhlp.pdb( source: WerFault.exe, 0000000C.00000003.5578930131.000000000657C000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000C.00000003.5556924766.0000000005D68000.00000004.00000001.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wininet.pdbLX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wuser32.pdb( source: WerFault.exe, 0000000C.00000003.5553864316.0000000002810000.00000004.00000001.sdmp
Source: Binary string: iertutil.pdb( source: WerFault.exe, 0000000C.00000003.5560528570.0000000005D57000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000C.00000003.5551962205.00000000027F4000.00000004.00000001.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ncrypt.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: dpapi.pdb source: WerFault.exe, 0000000C.00000003.5590924536.00000000065A3000.00000004.00000001.sdmp
Source: Binary string: profapi.pdbTX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000C.00000003.5609465686.00000000049A0000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb( source: WerFault.exe, 0000000C.00000003.5569202232.000000000599E000.00000004.00000001.sdmp
Source: Binary string: shcore.pdb( source: WerFault.exe, 0000000C.00000003.5563767171.0000000005D5D000.00000004.00000001.sdmp
Source: Binary string: rasadhlp.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: netutils.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb( source: WerFault.exe, 0000000C.00000003.5552283718.0000000002827000.00000004.00000001.sdmp
Source: Binary string: WLDP.pdbZX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdbFX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wininet.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb( source: WerFault.exe, 0000000C.00000003.5573477863.0000000005D79000.00000004.00000001.sdmp
Source: Binary string: wgdi32full.pdb( source: WerFault.exe, 0000000C.00000003.5553966425.0000000002821000.00000004.00000001.sdmp
Source: Binary string: shell32.pdb( source: WerFault.exe, 0000000C.00000003.5553602111.0000000005228000.00000004.00000001.sdmp
Source: Binary string: MpAdlStub.pdb source: mpam-20b5c938.exe, 00000017.00000000.6138920683.00007FF7EC2AF000.00000002.00020000.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 0000000C.00000003.5563767171.0000000005D5D000.00000004.00000001.sdmp
Source: Binary string: ncryptsslp.pdb( source: WerFault.exe, 0000000C.00000003.5595558950.0000000006B6A000.00000004.00000001.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdb( source: WerFault.exe, 0000000C.00000003.5557732587.0000000005233000.00000004.00000001.sdmp
Source: Binary string: ck.pdb) source: WerFault.exe, 0000000C.00000003.5565025438.0000000005F5B000.00000004.00000001.sdmp
Source: Binary string: MpClient.pdb source: MpSigStub.exe, 00000018.00000003.6171462961.0000025A7B312000.00000004.00000001.sdmp
Source: Binary string: ntasn1.pdb7I source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: schannel.pdb( source: WerFault.exe, 0000000C.00000003.5579000492.0000000006587000.00000004.00000001.sdmp
Source: Binary string: dnsapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb( source: WerFault.exe, 0000000C.00000003.5564336996.0000000005982000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: rasadhlp.pdboJ source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winnsi.pdb( source: WerFault.exe, 0000000C.00000003.5579357046.0000000005DA6000.00000004.00000001.sdmp
Source: Binary string: sechost.pdbxX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb( source: WerFault.exe, 0000000C.00000003.5556924766.0000000005D68000.00000004.00000001.sdmp
Source: Binary string: msi.pdb( source: WerFault.exe, 0000000C.00000003.5555988282.000000000598D000.00000004.00000001.sdmp
Source: Binary string: ntasn1.pdb source: WerFault.exe, 0000000C.00000003.5569029216.0000000006592000.00000004.00000001.sdmp
Source: Binary string: fwpuclnt.pdb( source: WerFault.exe, 0000000C.00000003.5570732197.0000000006581000.00000004.00000001.sdmp
Source: Binary string: OnDemandConnRouteHelper.pdb source: WerFault.exe, 0000000C.00000003.5568021975.0000000006245000.00000004.00000001.sdmp
Source: Binary string: MpSigStub.pdb source: mpam-20b5c938.exe, 00000017.00000003.6155056829.000001C6B5161000.00000004.00000001.sdmp, MpSigStub.exe, 00000018.00000003.6173396179.0000025A7B313000.00000004.00000001.sdmp, MpSigStub.exe.23.dr
Source: Binary string: ole32.pdbrX source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: combase.pdb( source: WerFault.exe, 0000000C.00000003.5552632966.0000000005239000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000C.00000003.5550085829.000000000278F000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: WLDP.pdb source: WerFault.exe, 0000000C.00000003.5563888052.0000000005D6E000.00000004.00000001.sdmp
Source: Binary string: wsspicli.pdb<X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: setupapi.pdb0X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wmswsock.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wintrust.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: mskeyprotect.pdb# source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: crypt32.pdb( source: WerFault.exe, 0000000C.00000003.5586901895.0000000006598000.00000004.00000001.sdmp
Source: Binary string: dnsapi.pdb( source: WerFault.exe, 0000000C.00000003.5581399598.0000000006576000.00000004.00000001.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb( source: WerFault.exe, 0000000C.00000003.5552064732.0000000002805000.00000004.00000001.sdmp
Source: Binary string: ntasn1.pdb( source: WerFault.exe, 0000000C.00000003.5569029216.0000000006592000.00000004.00000001.sdmp
Source: Binary string: srvcli.pdb( source: WerFault.exe, 0000000C.00000003.5579678253.00000000064BF000.00000004.00000001.sdmp
Source: Binary string: psapi.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 0000000C.00000003.5570732197.0000000006581000.00000004.00000001.sdmp
Source: Binary string: ws2_32.pdb( source: WerFault.exe, 0000000C.00000003.5559728887.0000000005D8A000.00000004.00000001.sdmp
Source: Binary string: MpAdlStub.pdbGCTL source: mpam-20b5c938.exe, 00000017.00000000.6138920683.00007FF7EC2AF000.00000002.00020000.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000C.00000003.5590481067.0000000006A53000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000C.00000003.5551996504.00000000027FA000.00000004.00000001.sdmp
Source: Binary string: OnDemandConnRouteHelper.pdb( source: WerFault.exe, 0000000C.00000003.5568021975.0000000006245000.00000004.00000001.sdmp
Source: Binary string: MpClient.pdbGCTL source: MpSigStub.exe, 00000018.00000003.6171462961.0000025A7B312000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdb( source: WerFault.exe, 0000000C.00000003.5558896267.0000000005D9B000.00000004.00000001.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb(X source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000C.00000003.5553864316.0000000002810000.00000004.00000001.sdmp
Source: Binary string: wininet.pdb( source: WerFault.exe, 0000000C.00000003.5553538636.00000000059A4000.00000004.00000001.sdmp
Source: Binary string: crypt32.pdb source: WerFault.exe, 0000000C.00000003.5609518898.00000000049A8000.00000004.00000040.sdmp

Data Obfuscation:

barindex
Yara detected GuLoader
Source: Yara match File source: 00000008.00000002.5646431545.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000000.5536067468.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000000.5526072916.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_00406669 push ds; iretd 0_2_0040666C
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_00404623 push esp; iretd 0_2_00404625
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_004064A6 push ebx; retf 0_2_004064B5
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_0040276E push ebx; iretd 0_2_00402771
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_02240A49 push FFFFFF86h; retf 0_2_02240A4B
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_022444AF push FFFFFFF7h; iretd 0_2_022444BE
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_022442DD push esi; retf 0_2_022442E6
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_0224310D push ss; retf 0_2_022431C2
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_02243169 push ss; retf 0_2_022431C2
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_022411CC push ds; iretd 0_2_022411EF
Source: C:\Users\user\Desktop\Unreal.exe Code function: 0_2_022447D0 push ss; retf 0_2_022447D6
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D52167 push DE1ECAFBh; retf DE1Eh 8_2_00D52176
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D55AED push eax; retf 8_2_00D55A8A
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5628C push ds; iretd 8_2_00D56293
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D53221 push esp; retf 8_2_00D53223
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D51B33 push cs; iretd 8_2_00D51B34
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D50B2A push FFFFFFDEh; iretd 8_2_00D50B2C
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D52544 push ebp; retf 8_2_00D52546

Persistence and Installation Behavior:

barindex
Drops files with a non-matching file extension (content does not match file extension)
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpasdlta.vdm Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpavdlta.vdm Jump to dropped file
Drops PE files
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpavdlta.vdm Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpasdlta.vdm Jump to dropped file
Drops PE files to the windows directory (C:\Windows)
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpavdlta.vdm Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe File created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpasdlta.vdm Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DCB0C8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle, 24_2_00007FF742DCB0C8

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender Jump to behavior
Source: C:\Users\user\Desktop\Unreal.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect Any.run
Source: C:\Users\user\Desktop\Unreal.exe File opened: C:\Program Files\Qemu-ga\qemu-ga.exe Jump to behavior
Source: C:\Users\user\Desktop\Unreal.exe File opened: C:\Program Files\qga\qga.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe File opened: C:\Program Files\Qemu-ga\qemu-ga.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe File opened: C:\Program Files\qga\qga.exe Jump to behavior
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: Unreal.exe, 00000000.00000002.3501073850.00000000005B4000.00000004.00000020.sdmp Binary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE8
Source: Unreal.exe, 00000000.00000002.3501696726.0000000002260000.00000004.00000001.sdmp Binary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
Source: Unreal.exe, 00000000.00000002.3501696726.0000000002260000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000000.5526462839.0000000000FE0000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 2724 Thread sleep time: -225000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Found dropped PE file which has not been started or loaded
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Dropped PE file which has not been started: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpavdlta.vdm Jump to dropped file
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Dropped PE file which has not been started: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\mpasdlta.vdm Jump to dropped file
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D599BA rdtsc 8_2_00D599BA
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2B030 FindNextFileW,FindClose,FindFirstFileW, 24_2_00007FF742E2B030
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2ADEC FindFirstFileW,FindNextFileW,FindClose,FindClose, 24_2_00007FF742E2ADEC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E52504 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 24_2_00007FF742E52504
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDF810 FindFirstFileW,FindNextFileW,FindClose,CloseHandle,CloseHandle, 24_2_00007FF742DDF810
Source: C:\Users\user\Desktop\Unreal.exe System information queried: ModuleInformation Jump to behavior
Source: WerFault.exe, 0000000C.00000002.5640399370.0000000002748000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW<
Source: RegAsm.exe, 00000008.00000002.5647356413.0000000001108000.00000004.00000020.sdmp, WerFault.exe, 0000000C.00000003.5635072235.000000000277E000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: mpasdlta.vdm.23.dr Binary or memory string: KqEMUm
Source: Unreal.exe, 00000000.00000002.3501696726.0000000002260000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000000.5526462839.0000000000FE0000.00000004.00000001.sdmp Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
Source: Unreal.exe, 00000000.00000002.3501696726.0000000002260000.00000004.00000001.sdmp Binary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
Source: Unreal.exe, 00000000.00000002.3501073850.00000000005B4000.00000004.00000020.sdmp Binary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe8

Anti Debugging:

barindex
Hides threads from debuggers
Source: C:\Users\user\Desktop\Unreal.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Thread information set: HideFromDebugger Jump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E33BFC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 24_2_00007FF742E33BFC
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E30C0C GetProcessHeap,HeapAlloc,InitializeCriticalSectionAndSpinCount, 24_2_00007FF742E30C0C
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D599BA rdtsc 8_2_00D599BA
Contains functionality to read the PEB
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5E567 mov eax, dword ptr fs:[00000030h] 8_2_00D5E567
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D5D56C mov eax, dword ptr fs:[00000030h] 8_2_00D5D56C
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Code function: 8_2_00D59749 mov eax, dword ptr fs:[00000030h] 8_2_00D59749
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\Unreal.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E4B798 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 24_2_00007FF742E4B798
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E33BFC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 24_2_00007FF742E33BFC
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E4BF4C SetUnhandledExceptionFilter, 24_2_00007FF742E4BF4C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E4BD68 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 24_2_00007FF742E4BD68

HIPS / PFW / Operating System Protection Evasion:

barindex
Writes to foreign memory regions
Source: C:\Users\user\Desktop\Unreal.exe Memory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: D50000 Jump to behavior
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Source: unknown Process created: C:\Windows\System32\wevtutil.exe C:\Windows\system32\wevtutil.exe install-manifest C:\Windows\TEMP\A491FE0B-CBB3-0812-A9E9-28E6069853FA.man '/resourceFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll' '/messageFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll' '/parameterFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll'
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\Unreal.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Unreal.exe' Jump to behavior
Source: C:\Users\user\Desktop\Unreal.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Unreal.exe' Jump to behavior
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2F884 GetCurrentProcess,GetLengthSid,InitializeSecurityDescriptor,InitializeAcl,AddAccessAllowedAce,AddAccessAllowedAce,AddAccessAllowedAce,AddAccessAllowedAce,SetSecurityDescriptorDacl,GetLastError,CloseHandle,SetLastError, 24_2_00007FF742E2F884
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2E0C4 AllocateAndInitializeSid,FreeSid, 24_2_00007FF742E2E0C4
Source: RegAsm.exe, 00000008.00000000.5538042827.0000000001700000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: RegAsm.exe, 00000008.00000000.5538042827.0000000001700000.00000002.00020000.sdmp Binary or memory string: Progman
Source: RegAsm.exe, 00000008.00000000.5538042827.0000000001700000.00000002.00020000.sdmp Binary or memory string: Progmanlock
Source: RegAsm.exe, 00000008.00000000.5538042827.0000000001700000.00000002.00020000.sdmp Binary or memory string: /Program Manager

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2418C cpuid 24_2_00007FF742E2418C
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742DDF3E8 GetCurrentProcessId,GetCurrentProcessId,CreateNamedPipeW,GetCurrentProcessId, 24_2_00007FF742DDF3E8
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-20b5c938.exe Code function: 23_2_00007FF7EC298ED4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 23_2_00007FF7EC298ED4
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\029C0225-A9FE-4247-9FEB-6A4C69D031CD\MpSigStub.exe Code function: 24_2_00007FF742E2D78C RtlGetVersion,RtlNtStatusToDosError,SetLastError,GetLastError, 24_2_00007FF742E2D78C

Stealing of Sensitive Information:

barindex
GuLoader behavior detected
Source: Initial file Signature Results: GuLoader behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs