Source: 0000000A.00000000.509732142.0000000001300000.00000040.00000001.sdmp |
Malware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=5A15FDA1AE98540B&r"} |
Source: Purchase Order PO20211027STK.exe |
ReversingLabs: Detection: 11% |
Source: Purchase Order PO20211027STK.exe |
Joe Sandbox ML: detected |
Source: Purchase Order PO20211027STK.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: Purchase Order PO20211027STK.exe |
Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: |
Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\SPORENE.pdb source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_00406873 FindFirstFileW,FindClose, |
0_2_00406873 |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, |
0_2_00405C49 |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040290B FindFirstFileW, |
0_2_0040290B |
Source: Malware configuration extractor |
URLs: https://onedrive.live.com/download?cid=5A15FDA1AE98540B&r |
Source: Purchase Order PO20211027STK.exe |
String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: http://s.symcb.com/universal-root.crl0 |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: http://s.symcd.com06 |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0( |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0 |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: http://ts-ocsp.ws.symantec.com0; |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: https://d.symcb.com/cps0% |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: https://d.symcb.com/rpa0 |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
String found in binary or memory: https://d.symcb.com/rpa0. |
Source: unknown |
DNS traffic detected: queries for: onedrive.live.com |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, |
0_2_004056DE |
Source: initial sample |
Static PE information: Filename: Purchase Order PO20211027STK.exe |
Source: Purchase Order PO20211027STK.exe |
Static file information: Suspicious name |
Source: Purchase Order PO20211027STK.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, |
0_2_0040352D |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040755C |
0_2_0040755C |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_00406D85 |
0_2_00406D85 |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Code function: 2_2_00401724 |
2_2_00401724 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130C57E |
10_2_0130C57E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01313A78 |
10_2_01313A78 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130CD7B |
10_2_0130CD7B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01308F7F |
10_2_01308F7F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013121A1 |
10_2_013121A1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01311990 |
10_2_01311990 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130B198 |
10_2_0130B198 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01313632 |
10_2_01313632 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130880F |
10_2_0130880F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130C57E NtAllocateVirtualMemory, |
10_2_0130C57E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01313445 NtProtectVirtualMemory, |
10_2_01313445 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Process Stats: CPU usage > 98% |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process Stats: CPU usage > 98% |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp |
Binary or memory string: OriginalFilenameSPORENE.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDNB10 vs Purchase Order PO20211027STK.exe |
Source: Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp |
Binary or memory string: OriginalFilenameSPORENE.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDNB10 vs Purchase Order PO20211027STK.exe |
Source: SPORENE.exe.0.dr |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: Purchase Order PO20211027STK.exe |
ReversingLabs: Detection: 11% |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
File read: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Jump to behavior |
Source: Purchase Order PO20211027STK.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Section loaded: C:\Windows\SysWOW64\msvbvm60.dll |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe "C:\Users\user\Desktop\Purchase Order PO20211027STK.exe" |
|
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Process created: C:\Users\user\AppData\Local\Temp\SPORENE.exe C:\Users\user\AppData\Local\Temp\SPORENE.exe |
|
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\SPORENE.exe |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Process created: C:\Users\user\AppData\Local\Temp\SPORENE.exe C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 |
Jump to behavior |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, |
0_2_0040352D |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
File created: C:\Users\user\AppData\Local\Temp\nsdBD47.tmp |
Jump to behavior |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@6/1@2/0 |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_004021AA CoCreateInstance, |
0_2_004021AA |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
File read: C:\Users\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, |
0_2_0040498A |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6836:120:WilError_01 |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: Purchase Order PO20211027STK.exe |
Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: |
Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\SPORENE.pdb source: Purchase Order PO20211027STK.exe, 00000000.00000002.364244028.0000000000426000.00000004.00020000.sdmp, Purchase Order PO20211027STK.exe, 00000000.00000002.364228139.0000000000411000.00000004.00020000.sdmp, SPORENE.exe.0.dr |
Source: Yara match |
File source: 0000000A.00000000.509732142.0000000001300000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.626110069.0000000001300000.00000040.00000001.sdmp, type: MEMORY |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Code function: 2_2_03F03DF2 push ebp; iretd |
2_2_03F03E03 |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Code function: 2_2_03F018AA push es; retf |
2_2_03F018AB |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Code function: 2_2_03F00E2E push ebp; iretd |
2_2_03F00E2F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130136D push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01301321 push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01305B1D push esp; ret |
10_2_01305B83 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130130F push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130076A push ds; iretd |
10_2_0130085B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130076D push ds; iretd |
10_2_0130085B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130696E push eax; ret |
10_2_0130696F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130494C push ds; iretd |
10_2_0130494E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013121A1 push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01301590 push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01303580 push edi; iretd |
10_2_01303581 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01313582 push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013049F4 pushfd ; ret |
10_2_01304A92 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013075E0 push es; retf |
10_2_013075F1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013007C0 push ds; iretd |
10_2_0130085B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013033C9 push esp; ret |
10_2_013033CA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01304A31 pushfd ; ret |
10_2_01304A92 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01300822 push ds; iretd |
10_2_0130085B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130AC24 push esi; retf |
10_2_0130E74F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01303E12 push 0000000Ch; ret |
10_2_01303E16 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01300000 push es; retf |
10_2_013015D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01305A7B push esp; ret |
10_2_01305B83 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01305AB2 push esp; ret |
10_2_01305B83 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130ACE8 push esi; retf |
10_2_0130E74F |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
File created: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Jump to dropped file |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
File opened: C:\Program Files\Qemu-ga\qemu-ga.exe |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
File opened: C:\Program Files\qga\qga.exe |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
File opened: C:\Program Files\Qemu-ga\qemu-ga.exe |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
File opened: C:\Program Files\qga\qga.exe |
Jump to behavior |
Source: SPORENE.exe, 00000002.00000002.630328200.0000000003F20000.00000004.00000001.sdmp |
Binary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSVBVM60.DLL |
Source: SPORENE.exe, 00000002.00000002.630328200.0000000003F20000.00000004.00000001.sdmp |
Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_00406873 FindFirstFileW,FindClose, |
0_2_00406873 |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, |
0_2_00405C49 |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040290B FindFirstFileW, |
0_2_0040290B |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
System information queried: ModuleInformation |
Jump to behavior |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Guest Shutdown Service |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Remote Desktop Virtualization Service |
Source: CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: vmicshutdown |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Volume Shadow Copy Requestor |
Source: SPORENE.exe, 00000002.00000002.630328200.0000000003F20000.00000004.00000001.sdmp |
Binary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\msvbvm60.dll |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V PowerShell Direct Service |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Time Synchronization Service |
Source: CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: vmicvss |
Source: SPORENE.exe, 00000002.00000002.630328200.0000000003F20000.00000004.00000001.sdmp |
Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Data Exchange Service |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Heartbeat Service |
Source: SPORENE.exe, 00000002.00000002.630501912.000000000606A000.00000004.00000001.sdmp, CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V Guest Service Interface |
Source: CasPol.exe, 0000000A.00000002.626781810.000000000316A000.00000004.00000001.sdmp |
Binary or memory string: vmicheartbeat |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_0130FD16 mov eax, dword ptr fs:[00000030h] |
10_2_0130FD16 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_013121A1 mov eax, dword ptr fs:[00000030h] |
10_2_013121A1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01310ABF mov eax, dword ptr fs:[00000030h] |
10_2_01310ABF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01305BFC LdrInitializeThunk, |
10_2_01305BFC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Code function: 10_2_01313A78 RtlAddVectoredExceptionHandler, |
10_2_01313A78 |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 1300000 |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\SPORENE.exe |
Jump to behavior |
Source: SPORENE.exe, 00000002.00000002.628178990.0000000002080000.00000002.00020000.sdmp, CasPol.exe, 0000000A.00000002.626654609.0000000001D10000.00000002.00020000.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: SPORENE.exe, 00000002.00000002.628178990.0000000002080000.00000002.00020000.sdmp, CasPol.exe, 0000000A.00000002.626654609.0000000001D10000.00000002.00020000.sdmp |
Binary or memory string: Progman |
Source: SPORENE.exe, 00000002.00000002.628178990.0000000002080000.00000002.00020000.sdmp, CasPol.exe, 0000000A.00000002.626654609.0000000001D10000.00000002.00020000.sdmp |
Binary or memory string: &Program Manager |
Source: SPORENE.exe, 00000002.00000002.628178990.0000000002080000.00000002.00020000.sdmp, CasPol.exe, 0000000A.00000002.626654609.0000000001D10000.00000002.00020000.sdmp |
Binary or memory string: Progmanlock |
Source: C:\Users\user\Desktop\Purchase Order PO20211027STK.exe |
Code function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, |
0_2_0040352D |
Source: Initial file |
Signature Results: GuLoader behavior |