Source: warzones12.duckdns.org |
Avira URL Cloud: Label: malware |
Source: xrPfnwOyJZqd.exe |
Malware Configuration Extractor: Xworm {"C2 url": ["warzones12.duckdns.org"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"} |
Source: xrPfnwOyJZqd.exe |
ReversingLabs: Detection: 76% |
Source: xrPfnwOyJZqd.exe |
String decryptor: warzones12.duckdns.org |
Source: xrPfnwOyJZqd.exe |
String decryptor: 7000 |
Source: xrPfnwOyJZqd.exe |
String decryptor: <123456789> |
Source: xrPfnwOyJZqd.exe |
String decryptor: <Xwormmm> |
Source: xrPfnwOyJZqd.exe |
String decryptor: XWorm V5.2 |
Source: xrPfnwOyJZqd.exe |
String decryptor: USB.exe |
Source: xrPfnwOyJZqd.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: unknown |
HTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.7:49720 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.7:49721 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.7:49722 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.7:49728 version: TLS 1.2 |
Source: xrPfnwOyJZqd.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Traffic |
Snort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 179.13.0.175:7000 -> 192.168.2.7:49714 |
Source: Traffic |
Snort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.7:49714 -> 179.13.0.175:7000 |
Source: Traffic |
Snort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.7:49714 -> 179.13.0.175:7000 |
Source: Traffic |
Snort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 179.13.0.175:7000 -> 192.168.2.7:49714 |
Source: Traffic |
Snort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.7:49714 -> 179.13.0.175:7000 |
Source: Malware configuration extractor |
URLs: warzones12.duckdns.org |
Source: unknown |
DNS query: name: warzones12.duckdns.org |
Source: global traffic |
TCP traffic: 192.168.2.7:49714 -> 179.13.0.175:7000 |
Source: Joe Sandbox View |
IP Address: 239.255.255.250 239.255.255.250 |
Source: Joe Sandbox View |
IP Address: 179.13.0.175 179.13.0.175 |
Source: Joe Sandbox View |
ASN Name: ColombiaMovilCO ColombiaMovilCO |
Source: Joe Sandbox View |
JA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.98.116.138 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.221.246.93 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.229.211.108 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.229.211.108 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.229.211.108 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.229.211.108 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.50.201.200 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 40.68.123.157 |
Source: global traffic |
HTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIlaHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIlaHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0 HTTP/1.1Host: apis.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIlaHLAQiFoM0BCLnKzQEIitPNARj1yc0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tc2PCTAgnFcyOnv&MD=oD+GSurf HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tc2PCTAgnFcyOnv&MD=oD+GSurf HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
DNS traffic detected: DNS query: www.google.com |
Source: global traffic |
DNS traffic detected: DNS query: warzones12.duckdns.org |
Source: global traffic |
DNS traffic detected: DNS query: apis.google.com |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3783913668.0000000002331000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: chromecache_49.12.dr |
String found in binary or memory: http://www.broofa.com |
Source: chromecache_55.12.dr |
String found in binary or memory: https://accounts.google.com/o/oauth2/auth |
Source: chromecache_55.12.dr |
String found in binary or memory: https://accounts.google.com/o/oauth2/postmessageRelay |
Source: chromecache_55.12.dr, chromecache_49.12.dr |
String found in binary or memory: https://apis.google.com |
Source: chromecache_55.12.dr |
String found in binary or memory: https://clients6.google.com |
Source: chromecache_55.12.dr |
String found in binary or memory: https://content.googleapis.com |
Source: chromecache_55.12.dr |
String found in binary or memory: https://csp.withgoogle.com/csp/lcreport/ |
Source: chromecache_55.12.dr |
String found in binary or memory: https://domains.google.com/suggest/flow |
Source: chromecache_49.12.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/alert/v11/gm_grey200-36dp/2x/gm_alert_gm_grey200_3 |
Source: chromecache_49.12.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/alert/v11/gm_grey600-36dp/2x/gm_alert_gm_grey600_3 |
Source: chromecache_49.12.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/close/v19/gm_grey200-24dp/1x/gm_close_gm_grey200_2 |
Source: chromecache_49.12.dr |
String found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/close/v19/gm_grey600-24dp/1x/gm_close_gm_grey600_2 |
Source: chromecache_49.12.dr |
String found in binary or memory: https://play.google.com/log?format=json&hasfast=true |
Source: chromecache_55.12.dr |
String found in binary or memory: https://plus.google.com |
Source: chromecache_55.12.dr |
String found in binary or memory: https://plus.googleapis.com |
Source: chromecache_55.12.dr |
String found in binary or memory: https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1 |
Source: chromecache_55.12.dr |
String found in binary or memory: https://www.googleapis.com/auth/plus.me |
Source: chromecache_55.12.dr |
String found in binary or memory: https://www.googleapis.com/auth/plus.people.recommended |
Source: chromecache_49.12.dr |
String found in binary or memory: https://www.gstatic.com/gb/html/afbp.html |
Source: chromecache_49.12.dr |
String found in binary or memory: https://www.gstatic.com/images/icons/material/anim/mspin/mspin_googcolor_medium.css |
Source: chromecache_49.12.dr |
String found in binary or memory: https://www.gstatic.com/images/icons/material/anim/mspin/mspin_googcolor_small.css |
Source: unknown |
Network traffic detected: HTTP traffic on port 49674 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49722 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49672 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49722 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49677 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49671 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown |
HTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.7:49720 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.7:49721 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.7:49722 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.7:49728 version: TLS 1.2 |
Source: xrPfnwOyJZqd.exe, type: SAMPLE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 5.0.xrPfnwOyJZqd.exe.40000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000005.00000000.1321318210.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Code function: 5_2_00007FFAAC879D4D |
5_2_00007FFAAC879D4D |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Code function: 5_2_00007FFAAC876D92 |
5_2_00007FFAAC876D92 |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Code function: 5_2_00007FFAAC875FE6 |
5_2_00007FFAAC875FE6 |
Source: xrPfnwOyJZqd.exe, 00000005.00000000.1321318210.0000000000042000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameXClient1q.exe4 vs xrPfnwOyJZqd.exe |
Source: xrPfnwOyJZqd.exe |
Binary or memory string: OriginalFilenameXClient1q.exe4 vs xrPfnwOyJZqd.exe |
Source: xrPfnwOyJZqd.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: xrPfnwOyJZqd.exe, type: SAMPLE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 5.0.xrPfnwOyJZqd.exe.40000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000005.00000000.1321318210.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: xrPfnwOyJZqd.exe, Helper.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: xrPfnwOyJZqd.exe, Helper.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: xrPfnwOyJZqd.exe, AlgorithmAES.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@18/14@5/6 |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Mutant created: NULL |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Mutant created: \Sessions\1\BaseNamedObjects\iv9mvoCdSZUsML3p |
Source: xrPfnwOyJZqd.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: xrPfnwOyJZqd.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80% |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: xrPfnwOyJZqd.exe |
ReversingLabs: Detection: 76% |
Source: unknown |
Process created: C:\Users\user\Desktop\xrPfnwOyJZqd.exe "C:\Users\user\Desktop\xrPfnwOyJZqd.exe" |
|
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:/// |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=2064,i,9320462037478548023,11330767766689099081,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=2064,i,9320462037478548023,11330767766689099081,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 |
Jump to behavior |
Source: xrPfnwOyJZqd.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: xrPfnwOyJZqd.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: xrPfnwOyJZqd.exe, Messages.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: xrPfnwOyJZqd.exe, Messages.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: xrPfnwOyJZqd.exe, Messages.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true) |
Source: xrPfnwOyJZqd.exe, Messages.cs |
.Net Code: Plugin System.AppDomain.Load(byte[]) |
Source: xrPfnwOyJZqd.exe, Messages.cs |
.Net Code: Memory System.AppDomain.Load(byte[]) |
Source: xrPfnwOyJZqd.exe, Messages.cs |
.Net Code: Memory |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Code function: 5_2_00007FFAAC8750F2 push ecx; iretd |
5_2_00007FFAAC8750F3 |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Memory allocated: 770000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Memory allocated: 1A330000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Window / User API: threadDelayed 3833 |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Window / User API: threadDelayed 6012 |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe TID: 8016 |
Thread sleep time: -26747778906878833s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe TID: 8020 |
Thread sleep count: 3833 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe TID: 8020 |
Thread sleep count: 6012 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3782553938.0000000000522000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllz |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Process token adjusted: Debug |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3783913668.00000000027E9000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0 |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3783913668.00000000027E9000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3783913668.00000000027E9000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0 |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3783913668.00000000027E9000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Program Manager2[ |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3783913668.00000000027E9000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@ |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Queries volume information: C:\Users\user\Desktop\xrPfnwOyJZqd.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: xrPfnwOyJZqd.exe, 00000005.00000002.3782553938.0000000000522000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\xrPfnwOyJZqd.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: Yara match |
File source: xrPfnwOyJZqd.exe, type: SAMPLE |
Source: Yara match |
File source: 5.0.xrPfnwOyJZqd.exe.40000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000000.1321318210.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3783913668.0000000002331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xrPfnwOyJZqd.exe PID: 3468, type: MEMORYSTR |
Source: Yara match |
File source: xrPfnwOyJZqd.exe, type: SAMPLE |
Source: Yara match |
File source: 5.0.xrPfnwOyJZqd.exe.40000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000000.1321318210.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3783913668.0000000002331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: xrPfnwOyJZqd.exe PID: 3468, type: MEMORYSTR |