Windows Analysis Report
file.exe

Overview

General Information

Sample Name: file.exe
Analysis ID: 778228
MD5: e0f8085c7cb8eb9cf1c263bb12cfc6df
SHA1: a109ebcf251a1e69923c60330994190e40ab466c
SHA256: a28fb531e91695081ac9a3a08bd9be333462f84a3b1e9de81dda94869fd3d32a
Tags: exe
Infos:

Detection

Nymaim
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection

barindex
Source: http://171.22.30.106/library.php URL Reputation: Label: malware
Source: http://171.22.30.106/library.phpch Avira URL Cloud: Label: malware
Source: http://171.22.30.106/library.phpYQ Avira URL Cloud: Label: malware
Source: http://171.22.30.106/library.php4 Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe ReversingLabs: Detection: 50%
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Joe Sandbox ML: detected
Source: 5.2.SplitFiles131.exe.10000000.6.unpack Avira: Label: TR/Crypt.XPACK.Gen8
Source: 1.2.file.exe.400000.0.unpack Avira: Label: TR/Crypt.XPACK.Gen2
Source: 1.0.file.exe.400000.0.unpack Avira: Label: TR/Crypt.XPACK.Gen2
Source: 5.2.SplitFiles131.exe.400000.0.unpack Malware Configuration Extractor: Nymaim {"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_10001000 ISCryptGetVersion, 4_2_10001000
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_10001130 ArcFourCrypt, 4_2_10001130
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy, 5_2_00403770

Compliance

barindex
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Unpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack
Source: file.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0046CA68 FindFirstFileA,FindNextFileA,FindClose, 4_2_0046CA68
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00474A14 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose, 4_2_00474A14
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045157C FindFirstFileA,GetLastError, 4_2_0045157C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045E244 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 4_2_0045E244
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0048AC5C FindFirstFileA,6CAD69D0,FindNextFileA,FindClose, 4_2_0048AC5C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00472CD4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose, 4_2_00472CD4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045CDA4 FindFirstFileA,FindNextFileA,FindClose, 4_2_0045CDA4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045DEB0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 4_2_0045DEB0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer, 5_2_00404490
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00423E2D FindFirstFileExW, 5_2_00423E2D
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_1000959D FindFirstFileExW, 5_2_1000959D
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_00104A1A FindFirstFileExW, 6_2_00104A1A
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Temp\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\ Jump to behavior

Networking

barindex
Source: Traffic Snort IDS: 2041920 ET TROJAN GCleaner Downloader Activity M8 192.168.2.5:49705 -> 45.139.105.171:80
Source: Traffic Snort IDS: 2852980 ETPRO TROJAN Win32/Fabookie.ek CnC Request M1 (GET) 192.168.2.5:49706 -> 107.182.129.235:80
Source: Traffic Snort IDS: 2852981 ETPRO TROJAN Win32/Fabookie.ek CnC Request M3 (GET) 192.168.2.5:49706 -> 107.182.129.235:80
Source: Traffic Snort IDS: 2852925 ETPRO TROJAN GCleaner Downloader - Payload Response 107.182.129.235:80 -> 192.168.2.5:49706
Source: Malware configuration extractor IPs: 45.139.105.1
Source: Malware configuration extractor IPs: 85.31.46.167
Source: Malware configuration extractor IPs: 107.182.129.235
Source: Malware configuration extractor IPs: 171.22.30.106
Source: Joe Sandbox View ASN Name: CMCSUS CMCSUS
Source: Joe Sandbox View ASN Name: CMCSUS CMCSUS
Source: Joe Sandbox View IP Address: 45.139.105.171 45.139.105.171
Source: unknown TCP traffic detected without corresponding DNS query: 45.139.105.171
Source: unknown TCP traffic detected without corresponding DNS query: 45.139.105.171
Source: unknown TCP traffic detected without corresponding DNS query: 45.139.105.171
Source: unknown TCP traffic detected without corresponding DNS query: 45.139.105.171
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: unknown TCP traffic detected without corresponding DNS query: 107.182.129.235
Source: SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://171.22.30.106/library.php
Source: SplitFiles131.exe, 00000005.00000003.332714577.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://171.22.30.106/library.php4
Source: SplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://171.22.30.106/library.phpYQ
Source: SplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://171.22.30.106/library.phpch
Source: is-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-3OAED.tmp.4.dr, is-FBKGV.tmp.4.dr String found in binary or memory: http://rus.altarsoft.com/split_files.shtml
Source: is-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-8E2LT.tmp.4.dr, is-7O3KV.tmp.4.dr, is-R2P47.tmp.4.dr, is-JMARM.tmp.4.dr, is-B20UO.tmp.4.dr, is-UJJ0L.tmp.4.dr, is-JSP8F.tmp.4.dr, is-79U67.tmp.4.dr, is-APJVT.tmp.4.dr, is-7L4JB.tmp.4.dr String found in binary or memory: http://www.altarsoft.com/split_files.shtml
Source: file.exe String found in binary or memory: http://www.innosetup.com
Source: is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.dr String found in binary or memory: http://www.innosetup.com/
Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.dr String found in binary or memory: http://www.innosetup.comDVarFileInfo$
Source: file.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.dr String found in binary or memory: http://www.remobjects.com/?ps
Source: file.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.dr String found in binary or memory: http://www.remobjects.com/?psU
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar, 5_2_00401B30
Source: global traffic HTTP traffic detected: GET /itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 45.139.105.171Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /storage/ping.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 0Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /storage/extension.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
Source: file.exe, 00000001.00000002.376583060.00000000007AA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud

barindex
Source: Yara match File source: 5.2.SplitFiles131.exe.3340000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SplitFiles131.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SplitFiles131.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SplitFiles131.exe.3340000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: file.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00408280 1_2_00408280
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00468C28 4_2_00468C28
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00461280 4_2_00461280
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0043DE40 4_2_0043DE40
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004302D0 4_2_004302D0
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004445B8 4_2_004445B8
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00434864 4_2_00434864
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0047AA90 4_2_0047AA90
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00444B60 4_2_00444B60
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045ADE0 4_2_0045ADE0
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00480F94 4_2_00480F94
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00445258 4_2_00445258
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004132E1 4_2_004132E1
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00463288 4_2_00463288
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00435568 4_2_00435568
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00445664 4_2_00445664
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0042F874 4_2_0042F874
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00457F04 4_2_00457F04
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00404490 5_2_00404490
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_004096F0 5_2_004096F0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_004056A0 5_2_004056A0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00406800 5_2_00406800
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00406AA0 5_2_00406AA0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00404D40 5_2_00404D40
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00405F40 5_2_00405F40
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00402F20 5_2_00402F20
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_004150D3 5_2_004150D3
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00415305 5_2_00415305
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_004223A9 5_2_004223A9
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00419510 5_2_00419510
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00404840 5_2_00404840
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00426850 5_2_00426850
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00410A50 5_2_00410A50
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0042AB9A 5_2_0042AB9A
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00421C88 5_2_00421C88
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0042ACBA 5_2_0042ACBA
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00447D2D 5_2_00447D2D
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00428D39 5_2_00428D39
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00404F20 5_2_00404F20
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_1000F670 5_2_1000F670
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_1000EC61 5_2_1000EC61
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_0010AE8D 6_2_0010AE8D
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 004035DC appears 90 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00408CA0 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00403548 appears 61 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00446194 appears 58 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00445EC4 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 004037CC appears 193 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 0043477C appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00455D54 appears 48 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00407988 appears 33 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00455B64 appears 86 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00451DE8 appears 62 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: String function: 00405A9C appears 92 times
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: String function: 10003C50 appears 34 times
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: String function: 0040F9E0 appears 54 times
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00423C4C NtdllDefWindowProc_A, 4_2_00423C4C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004126A0 NtdllDefWindowProc_A, 4_2_004126A0
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00455514 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A, 4_2_00455514
Source: is-DTRND.tmp.1.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-DTRND.tmp.1.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
Source: is-DTRND.tmp.1.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-AGVDF.tmp.4.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-AGVDF.tmp.4.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
Source: is-AGVDF.tmp.4.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: file.exe, 00000001.00000000.288145958.0000000000417000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilename" vs file.exe
Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilename6 vs file.exe
Source: file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
Source: file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilename6 vs file.exe
Source: file.exe Binary or memory string: OriginalFilename" vs file.exe
Source: Joe Sandbox View Dropped File: C:\Program Files (x86)\Split Files\is-AGVDF.tmp 1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
Source: SplitFiles131.exe.4.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exe File read: C:\Users\user\Desktop\file.exe Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process created: C:\Program Files (x86)\Split Files\SplitFiles131.exe "C:\Program Files (x86)\Split Files\SplitFiles131.exe"
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process created: C:\Program Files (x86)\Split Files\SplitFiles131.exe "C:\Program Files (x86)\Split Files\SplitFiles131.exe" Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_0040910C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6CF44E70, 1_2_0040910C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00453D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6CF44E70, 4_2_00453D80
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;SplitFiles131.exe&quot;)
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe File created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963} Jump to behavior
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp Jump to behavior
Source: classification engine Classification label: mal96.troj.evad.winEXE@12/39@0/5
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar, 5_2_00401B30
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004547A0 GetModuleHandleA,6CAD5550,GetDiskFreeSpaceA, 4_2_004547A0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree, 5_2_00402BF0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00405350 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,FindCloseChangeNotification, 5_2_00405350
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5272:120:WilError_01
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040B090 FindResourceA,FreeResource, 4_2_0040B090
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Program Files (x86)\Split Files Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Command line argument: `a}{ 5_2_004096F0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Command line argument: MFE. 5_2_004096F0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Command line argument: ZK]Z 5_2_004096F0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Command line argument: ZK]Z 5_2_004096F0
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Window found: window name: TMainForm Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: file.exe Static file information: File size 2094367 > 1048576

Data Obfuscation

barindex
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Unpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Unpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.ave131:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00406594 push 004065D1h; ret 1_2_004065C9
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00404159 push eax; ret 1_2_00404195
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00404229 push 00404435h; ret 1_2_0040442D
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_004042AA push 00404435h; ret 1_2_0040442D
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00404327 push 00404435h; ret 1_2_0040442D
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00408BDC push 00408C0Fh; ret 1_2_00408C07
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_0040438C push 00404435h; ret 1_2_0040442D
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00407F3C push ecx; mov dword ptr [esp], eax 1_2_00407F41
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00409A20 push 00409A5Dh; ret 4_2_00409A55
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040A107 push ds; ret 4_2_0040A108
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004302D0 push ecx; mov dword ptr [esp], eax 4_2_004302D5
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004063C0 push ecx; mov dword ptr [esp], eax 4_2_004063C1
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004785C8 push 00478673h; ret 4_2_0047866B
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00410798 push ecx; mov dword ptr [esp], edx 4_2_0041079D
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004129F0 push 00412A53h; ret 4_2_00412A4B
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045AA9C push ecx; mov dword ptr [esp], eax 4_2_0045AAA1
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00450EB4 push 00450EE7h; ret 4_2_00450EDF
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040D0F0 push ecx; mov dword ptr [esp], edx 4_2_0040D0F2
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00443530 push ecx; mov dword ptr [esp], ecx 4_2_00443534
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004055BD push eax; ret 4_2_004055F9
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040F650 push ecx; mov dword ptr [esp], edx 4_2_0040F652
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040568D push 00405899h; ret 4_2_00405891
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040570E push 00405899h; ret 4_2_00405891
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004057F0 push 00405899h; ret 4_2_00405891
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0040578B push 00405899h; ret 4_2_00405891
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00479B20 push ecx; mov dword ptr [esp], ecx 4_2_00479B25
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00419CF0 push ecx; mov dword ptr [esp], ecx 4_2_00419CF5
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_004311AD push esi; ret 5_2_004311B6
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0040F4BB push ecx; ret 5_2_0040F4CE
Source: SplitFiles131.exe.4.dr Static PE information: section name: .ave131
Source: initial sample Static PE information: section name: .text entropy: 7.2455087113234224
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_iscrypt.dll Jump to dropped file
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe File created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Program Files (x86)\Split Files\SplitFiles131.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Program Files (x86)\Split Files\unins000.exe (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Program Files (x86)\Split Files\is-AGVDF.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp File created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00423CD4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus, 4_2_00423CD4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00423CD4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus, 4_2_00423CD4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00478118 IsIconic,GetWindowLongA,ShowWindow,ShowWindow, 4_2_00478118
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0042425C IsIconic,SetActiveWindow, 4_2_0042425C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_004242A4 IsIconic,SetActiveWindow,SetFocus, 4_2_004242A4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0041844C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient, 4_2_0041844C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00422924 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow, 4_2_00422924
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00417660 IsIconic,GetCapture, 4_2_00417660
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00417D96 IsIconic,SetWindowPos, 4_2_00417D96
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00417D98 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement, 4_2_00417D98
Source: C:\Users\user\Desktop\file.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe TID: 996 Thread sleep count: 31 > 30 Jump to behavior
Source: C:\Users\user\Desktop\file.exe Evasive API call chain: GetSystemTime,DecisionNodes
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Dropped PE file which has not been started: C:\Program Files (x86)\Split Files\unins000.exe (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Dropped PE file which has not been started: C:\Program Files (x86)\Split Files\is-AGVDF.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dll Jump to dropped file
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe API coverage: 9.8 %
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: __Init_thread_footer,GetUserNameA,GetUserNameA,__Init_thread_footer,GetUserNameA,__Init_thread_footer,GetUserNameA,GetForegroundWindow,GetWindowTextA,Sleep,Sleep,GetForegroundWindow,GetWindowTextA, 5_2_004056A0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00409764 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery, 1_2_00409764
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0046CA68 FindFirstFileA,FindNextFileA,FindClose, 4_2_0046CA68
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00474A14 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose, 4_2_00474A14
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045157C FindFirstFileA,GetLastError, 4_2_0045157C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045E244 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 4_2_0045E244
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0048AC5C FindFirstFileA,6CAD69D0,FindNextFileA,FindClose, 4_2_0048AC5C
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00472CD4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose, 4_2_00472CD4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045CDA4 FindFirstFileA,FindNextFileA,FindClose, 4_2_0045CDA4
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_0045DEB0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 4_2_0045DEB0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer, 5_2_00404490
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00423E2D FindFirstFileExW, 5_2_00423E2D
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_1000959D FindFirstFileExW, 5_2_1000959D
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_00104A1A FindFirstFileExW, 6_2_00104A1A
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Temp\ Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\ Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_0041336B
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree, 5_2_00402BF0
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00402F20 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc, 5_2_00402F20
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0044028F mov eax, dword ptr fs:[00000030h] 5_2_0044028F
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0042041F mov eax, dword ptr fs:[00000030h] 5_2_0042041F
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_004429E7 mov eax, dword ptr fs:[00000030h] 5_2_004429E7
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_00417BAF mov eax, dword ptr fs:[00000030h] 5_2_00417BAF
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_100091C7 mov eax, dword ptr fs:[00000030h] 5_2_100091C7
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_10006CE1 mov eax, dword ptr fs:[00000030h] 5_2_10006CE1
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_00105B47 mov eax, dword ptr fs:[00000030h] 6_2_00105B47
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_001033EF mov eax, dword ptr fs:[00000030h] 6_2_001033EF
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0040F789 SetUnhandledExceptionFilter, 5_2_0040F789
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_0041336B
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0040F5F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_0040F5F5
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0040EBD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 5_2_0040EBD2
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_10006180 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_10006180
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_100035DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 5_2_100035DF
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_10003AD4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_10003AD4
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_00101889 SetUnhandledExceptionFilter, 6_2_00101889
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_00101269 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 6_2_00101269
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_001016F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 6_2_001016F5
Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Code function: 6_2_00104362 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 6_2_00104362
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f Jump to behavior
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00459734 GetVersion,GetModuleHandleA,6CAD5550,6CAD5550,6CAD5550,AllocateAndInitializeSid,LocalFree, 4_2_00459734
Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: Program Manager
Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: program manager
Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: F.program manager
Source: C:\Users\user\Desktop\file.exe Code function: GetLocaleInfoA, 1_2_004051D8
Source: C:\Users\user\Desktop\file.exe Code function: GetLocaleInfoA, 1_2_00405224
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: GetLocaleInfoA, 4_2_004085FC
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: GetLocaleInfoA, 4_2_00408648
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetKeyboardLayoutList,GetLocaleInfoA,__Init_thread_footer, 5_2_00404D40
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: EnumSystemLocalesW, 5_2_00427041
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: EnumSystemLocalesW, 5_2_0042708C
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: EnumSystemLocalesW, 5_2_00427127
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 5_2_004271B2
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: EnumSystemLocalesW, 5_2_0041E2FF
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetLocaleInfoW, 5_2_00427405
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 5_2_0042752B
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetLocaleInfoW, 5_2_00427631
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 5_2_00427700
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetLocaleInfoW, 5_2_0041E821
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 5_2_00426D9F
Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe Code function: 5_2_0040F7F3 cpuid 5_2_0040F7F3
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00455E7C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,6CAD5CA0,SetNamedPipeHandleState,6CF47180,CloseHandle,CloseHandle, 4_2_00455E7C
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_004026C4 GetSystemTime, 1_2_004026C4
Source: C:\Users\user\Desktop\file.exe Code function: 1_2_00405CC0 GetVersionExA, 1_2_00405CC0
Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp Code function: 4_2_00453D18 GetUserNameA, 4_2_00453D18

Stealing of Sensitive Information

barindex
Source: Yara match File source: 5.2.SplitFiles131.exe.3340000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SplitFiles131.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SplitFiles131.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SplitFiles131.exe.3340000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs