Source: 00000000.00000000.1622453853.0000000000632000.00000002.00000001.01000000.00000003.sdmp |
Malware Configuration Extractor: Njrat {"Host": "berlyn777.con-ip.com", "Port": "7777", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "03f62b4542954"} |
Source: xRzIkuwCyozY.exe |
ReversingLabs: Detection: 92% |
Source: Yara match |
File source: xRzIkuwCyozY.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xRzIkuwCyozY.exe.630000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1622453853.0000000000632000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2088998163.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xRzIkuwCyozY.exe PID: 2892, type: MEMORYSTR |
Source: xRzIkuwCyozY.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll |
Jump to behavior |
Source: unknown |
HTTPS traffic detected: 23.54.42.93:443 -> 192.168.2.4:49745 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.54.42.93:443 -> 192.168.2.4:49747 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49748 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.4:49754 version: TLS 1.2 |
Source: xRzIkuwCyozY.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor |
URLs: berlyn777.con-ip.com |
Source: global traffic |
TCP traffic: 192.168.2.4:49735 -> 45.141.215.185:7777 |
Source: Joe Sandbox View |
IP Address: 239.255.255.250 239.255.255.250 |
Source: Joe Sandbox View |
ASN Name: SPECTRAIPSpectraIPBVNL SPECTRAIPSpectraIPBVNL |
Source: Joe Sandbox View |
JA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.46.162.224 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.54.42.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 208.111.186.0 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 208.111.186.0 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 208.111.186.0 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 208.111.186.0 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 208.111.186.0 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.85.23.86 |
Source: global traffic |
HTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiVocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0 HTTP/1.1Host: apis.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiVocsBCJz+zAEIhaDNAQi5ys0BCIrTzQEY9snNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=yAV88TB9dHccag3&MD=LRADRguV HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=yAV88TB9dHccag3&MD=LRADRguV HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
DNS traffic detected: DNS query: google.com |
Source: global traffic |
DNS traffic detected: DNS query: berlyn777.con-ip.com |
Source: global traffic |
DNS traffic detected: DNS query: www.google.com |
Source: global traffic |
DNS traffic detected: DNS query: apis.google.com |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2087210406.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://go.microsoft. |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2087210406.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://go.microsoft.LinkId=42127 |
Source: chromecache_52.4.dr |
String found in binary or memory: http://www.broofa.com |
Source: chromecache_57.4.dr |
String found in binary or memory: https://accounts.google.com/o/oauth2/auth |
Source: chromecache_57.4.dr |
String found in binary or memory: https://accounts.google.com/o/oauth2/postmessageRelay |
Source: chromecache_52.4.dr, chromecache_57.4.dr |
String found in binary or memory: https://apis.google.com |
Source: chromecache_57.4.dr |
String found in binary or memory: https://clients6.google.com |
Source: chromecache_57.4.dr |
String found in binary or memory: https://content.googleapis.com |
Source: chromecache_57.4.dr |
String found in binary or memory: https://csp.withgoogle.com/csp/lcreport/ |
Source: chromecache_57.4.dr |
String found in binary or memory: https://domains.google.com/suggest/flow |
Source: chromecache_52.4.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/alert/v11/gm_grey200-36dp/2x/gm_alert_gm_grey200_3 |
Source: chromecache_52.4.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/alert/v11/gm_grey600-36dp/2x/gm_alert_gm_grey600_3 |
Source: chromecache_52.4.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/close/v19/gm_grey200-24dp/1x/gm_close_gm_grey200_2 |
Source: chromecache_52.4.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/close/v19/gm_grey600-24dp/1x/gm_close_gm_grey600_2 |
Source: chromecache_52.4.dr |
String found in binary or memory: https://play.google.com/log?format=json&hasfast=true |
Source: chromecache_57.4.dr |
String found in binary or memory: https://plus.google.com |
Source: chromecache_57.4.dr |
String found in binary or memory: https://plus.googleapis.com |
Source: chromecache_57.4.dr |
String found in binary or memory: https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1 |
Source: chromecache_57.4.dr |
String found in binary or memory: https://www.googleapis.com/auth/plus.me |
Source: chromecache_57.4.dr |
String found in binary or memory: https://www.googleapis.com/auth/plus.people.recommended |
Source: chromecache_52.4.dr |
String found in binary or memory: https://www.gstatic.com/gb/html/afbp.html |
Source: chromecache_52.4.dr |
String found in binary or memory: https://www.gstatic.com/images/icons/material/anim/mspin/mspin_googcolor_medium.css |
Source: chromecache_52.4.dr |
String found in binary or memory: https://www.gstatic.com/images/icons/material/anim/mspin/mspin_googcolor_small.css |
Source: unknown |
Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49754 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49742 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49678 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49742 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49748 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49746 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49747 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49745 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49736 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49748 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49754 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49736 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49747 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49746 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49745 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49756 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49756 |
Source: unknown |
HTTPS traffic detected: 23.54.42.93:443 -> 192.168.2.4:49745 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.54.42.93:443 -> 192.168.2.4:49747 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49748 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.4:49754 version: TLS 1.2 |
Source: xRzIkuwCyozY.exe, Keylogger.cs |
.Net Code: VKCodeToUnicode |
Source: Yara match |
File source: xRzIkuwCyozY.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xRzIkuwCyozY.exe.630000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1622453853.0000000000632000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2088998163.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xRzIkuwCyozY.exe PID: 2892, type: MEMORYSTR |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Code function: 0_2_04DE15C0 |
0_2_04DE15C0 |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2087210406.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamemscorwks.dllT vs xRzIkuwCyozY.exe |
Source: xRzIkuwCyozY.exe, 00000000.00000000.1622466786.0000000000638000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameClient7777.exe4 vs xRzIkuwCyozY.exe |
Source: xRzIkuwCyozY.exe |
Binary or memory string: OriginalFilenameClient7777.exe4 vs xRzIkuwCyozY.exe |
Source: xRzIkuwCyozY.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal100.troj.spyw.evad.winEXE@32/15@7/5 |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Code function: 0_2_04E7339E AdjustTokenPrivileges, |
0_2_04E7339E |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Code function: 0_2_04E73367 AdjustTokenPrivileges, |
0_2_04E73367 |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
File created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xRzIkuwCyozY.exe.log |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Mutant created: NULL |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9132:120:WilError_03 |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Mutant created: \Sessions\1\BaseNamedObjects\03f62b4542954 |
Source: xRzIkuwCyozY.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: xRzIkuwCyozY.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79% |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: xRzIkuwCyozY.exe |
ReversingLabs: Detection: 92% |
Source: unknown |
Process created: C:\Users\user\Desktop\xRzIkuwCyozY.exe "C:\Users\user\Desktop\xRzIkuwCyozY.exe" |
|
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:/// |
|
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/ |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2036,i,3006558031417863421,7263643072710997579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=2036,i,5724583149837707848,3027707607016890056,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xRzIkuwCyozY.exe" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xRzIkuwCyozY.exe" |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2036,i,3006558031417863421,7263643072710997579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=2036,i,5724583149837707848,3027707607016890056,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
File opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll |
Jump to behavior |
Source: xRzIkuwCyozY.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll |
Jump to behavior |
Source: xRzIkuwCyozY.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: xRzIkuwCyozY.exe, Program.cs |
.Net Code: Plugin System.Reflection.Assembly.Load(byte[]) |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Code function: 0_2_00F304B7 push cs; retf |
0_2_00F304B8 |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xRzIkuwCyozY.exe" |
|
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xRzIkuwCyozY.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Memory allocated: FD0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Memory allocated: 2CD0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Memory allocated: FD0000 memory commit | memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Window / User API: threadDelayed 1841 |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe TID: 2044 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2087210406.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllontextBindingCollectionElement, System.WorkflowServices, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/> |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2087210406.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: xRzIkuwCyozY.exe, Program.cs |
Reference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, cbName, ref lpszVer, 100) |
Source: xRzIkuwCyozY.exe, Keylogger.cs |
Reference to suspicious API methods: MapVirtualKey(a, 0u) |
Source: xRzIkuwCyozY.exe, Keylogger.cs |
Reference to suspicious API methods: GetAsyncKeyState(num2) |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2088998163.0000000002D60000.00000004.00000800.00020000.00000000.sdmp, xRzIkuwCyozY.exe, 00000000.00000002.2088998163.0000000002D7C000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: xRzIkuwCyozY.exe, 00000000.00000002.2088998163.0000000002D60000.00000004.00000800.00020000.00000000.sdmp, xRzIkuwCyozY.exe, 00000000.00000002.2088998163.0000000002D7C000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program Manager@9 |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xRzIkuwCyozY.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: Yara match |
File source: xRzIkuwCyozY.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xRzIkuwCyozY.exe.630000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1622453853.0000000000632000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2088998163.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xRzIkuwCyozY.exe PID: 2892, type: MEMORYSTR |
Source: Yara match |
File source: xRzIkuwCyozY.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.xRzIkuwCyozY.exe.630000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1622453853.0000000000632000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2088998163.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xRzIkuwCyozY.exe PID: 2892, type: MEMORYSTR |