Windows Analysis Report
J5kltefeTK.exe

Overview

General Information

Sample name: J5kltefeTK.exe
renamed because original name is a hash value
Original sample name: ccd42c3ef8dbc10ea10f2c447c5b7e72ae788c13a021c26e45a9b58ce9d69ca4.exe
Analysis ID: 1436570
MD5: 2e75151e0cba61964a473728c898692e
SHA1: 74e2042ddd0ee3b404334069df90c459a61a9a18
SHA256: ccd42c3ef8dbc10ea10f2c447c5b7e72ae788c13a021c26e45a9b58ce9d69ca4
Tags: exemofongo-loader
Infos:

Detection

MofongoLoader
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected MofongoLoader
Found direct / indirect Syscall (likely to bypass EDR)
Adds / modifies Windows certificates
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
JA3 SSL client fingerprint seen in connection with other malware
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info

Classification

AV Detection

barindex
Source: J5kltefeTK.exe Virustotal: Detection: 13% Perma Link
Source: J5kltefeTK.exe Static PE information: certificate valid
Source: unknown HTTPS traffic detected: 104.21.30.238:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: J5kltefeTK.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B779F4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00007FF720B779F4
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B41530 _Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,InternetOpenW,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetConnectW,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,HttpSendRequestA,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetReadFile,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress, 0_2_00007FF720B41530
Source: global traffic DNS traffic detected: DNS query: checkcloudnet.com
Source: unknown HTTP traffic detected: POST /check/connection HTTP/1.1Content-Type: application/jsonUser-Agent: UA/1Host: checkcloudnet.comContent-Length: 99Cache-Control: no-cache
Source: J5kltefeTK.exe String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: J5kltefeTK.exe, 00000000.00000003.1980688402.000002A85010B000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1980711810.000002A8500C0000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000002.1994814975.000002A8500A8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: J5kltefeTK.exe String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: J5kltefeTK.exe String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: J5kltefeTK.exe String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: J5kltefeTK.exe String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: J5kltefeTK.exe String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: J5kltefeTK.exe String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: J5kltefeTK.exe String found in binary or memory: http://ocsp.comodoca.com0
Source: J5kltefeTK.exe String found in binary or memory: http://ocsp.sectigo.com0
Source: J5kltefeTK.exe, 00000000.00000002.1994910502.000002A850150000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1994213645.000002A85014F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://checkcloudnet.com/
Source: J5kltefeTK.exe, J5kltefeTK.exe, 00000000.00000002.1994814975.000002A85012F000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000002.1994989333.000002A8502EC000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1994197777.000002A8502E9000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000002.1994814975.000002A8500A8000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000002.1995119808.00007FF720B97000.00000004.00000001.01000000.00000003.sdmp, J5kltefeTK.exe, 00000000.00000002.1994910502.000002A850150000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1994213645.000002A85014F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://checkcloudnet.com/check/connection
Source: J5kltefeTK.exe, 00000000.00000002.1994989333.000002A8502EC000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1994197777.000002A8502E9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://checkcloudnet.com/check/connection7
Source: J5kltefeTK.exe String found in binary or memory: https://sectigo.com/CPS0
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown HTTPS traffic detected: 104.21.30.238:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B52160 shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,CreatePipe,SetHandleInformation,CreateProcessA,CloseHandle,CloseHandle,NtCreateSection,CloseHandle,CloseHandle,CloseHandle,CloseHandle,GetCurrentProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,GetStdHandle,ReadFile,GetCurrentProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle, 0_2_00007FF720B52160
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B52160 0_2_00007FF720B52160
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7DF20 0_2_00007FF720B7DF20
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B721AC 0_2_00007FF720B721AC
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B6E170 0_2_00007FF720B6E170
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7C134 0_2_00007FF720B7C134
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B6C300 0_2_00007FF720B6C300
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B684E0 0_2_00007FF720B684E0
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B6B4A0 0_2_00007FF720B6B4A0
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B6F448 0_2_00007FF720B6F448
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B69580 0_2_00007FF720B69580
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B76698 0_2_00007FF720B76698
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7167C 0_2_00007FF720B7167C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7962C 0_2_00007FF720B7962C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B689F4 0_2_00007FF720B689F4
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B779F4 0_2_00007FF720B779F4
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B6B9AC 0_2_00007FF720B6B9AC
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B67AC8 0_2_00007FF720B67AC8
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7EA24 0_2_00007FF720B7EA24
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7AB5C 0_2_00007FF720B7AB5C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B71B2C 0_2_00007FF720B71B2C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B67CB0 0_2_00007FF720B67CB0
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B70E0C 0_2_00007FF720B70E0C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B67E98 0_2_00007FF720B67E98
Source: J5kltefeTK.exe, 00000000.00000003.1982602611.000002A8507F3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCloudSecurity.exeX8 vs J5kltefeTK.exe
Source: J5kltefeTK.exe, 00000000.00000002.1995131630.00007FF720BE8000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameCloudSecurity.exeX8 vs J5kltefeTK.exe
Source: J5kltefeTK.exe Binary or memory string: OriginalFilenameCloudSecurity.exeX8 vs J5kltefeTK.exe
Source: classification engine Classification label: mal60.troj.evad.winEXE@3/0@1/1
Source: J5kltefeTK.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\J5kltefeTK.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: J5kltefeTK.exe Virustotal: Detection: 13%
Source: C:\Users\user\Desktop\J5kltefeTK.exe File read: C:\Users\user\Desktop\J5kltefeTK.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\J5kltefeTK.exe "C:\Users\user\Desktop\J5kltefeTK.exe"
Source: C:\Users\user\Desktop\J5kltefeTK.exe Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
Source: C:\Users\user\Desktop\J5kltefeTK.exe Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: J5kltefeTK.exe Static PE information: certificate valid
Source: J5kltefeTK.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: J5kltefeTK.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: J5kltefeTK.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: J5kltefeTK.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: J5kltefeTK.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: J5kltefeTK.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: J5kltefeTK.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: J5kltefeTK.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: Yara match File source: 00000000.00000003.1981334718.000002A85010F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1981543481.000002A850139000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1983110208.000002A850111000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1980286561.000002A8500DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1981419433.000002A85011F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1995079712.00007FF720B41000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1982602611.000002A850751000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1981712482.000002A8502E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000000.1979702975.00007FF720B41000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1982855690.000002A8502E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B51520 OpenProcessToken,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,GetTokenInformation,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,GetTokenInformation,CloseHandle,CloseHandle,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress, 0_2_00007FF720B51520
Source: J5kltefeTK.exe Static PE information: real checksum: 0xa7e3c should be: 0xaf0a6
Source: J5kltefeTK.exe Static PE information: section name: _RDATA
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B41530 _Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,InternetOpenW,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetConnectW,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,HttpSendRequestA,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetReadFile,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress, 0_2_00007FF720B41530
Source: C:\Users\user\Desktop\J5kltefeTK.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B779F4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00007FF720B779F4
Source: J5kltefeTK.exe, 00000000.00000002.1994910502.000002A850150000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1994213645.000002A85014F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWK`
Source: J5kltefeTK.exe, 00000000.00000002.1994910502.000002A85016C000.00000004.00000020.00020000.00000000.sdmp, J5kltefeTK.exe, 00000000.00000003.1994213645.000002A85016C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: J5kltefeTK.exe, 00000000.00000002.1994814975.000002A85012F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B66CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF720B66CD0
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B51520 OpenProcessToken,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,GetTokenInformation,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,GetTokenInformation,CloseHandle,CloseHandle,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress, 0_2_00007FF720B51520
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B7BE4C GetProcessHeap, 0_2_00007FF720B7BE4C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B602BC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00007FF720B602BC
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B66CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF720B66CD0
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B60EBC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF720B60EBC
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B61060 SetUnhandledExceptionFilter, 0_2_00007FF720B61060

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\J5kltefeTK.exe NtCreateSection: Indirect: 0x7FF720B52665 Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B81040 cpuid 0_2_00007FF720B81040
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: EnumSystemLocalesW, 0_2_00007FF720B7B44C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: EnumSystemLocalesW, 0_2_00007FF720B735A8
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 0_2_00007FF720B7B5B4
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: EnumSystemLocalesW, 0_2_00007FF720B7B51C
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: GetLocaleInfoW, 0_2_00007FF720B7B800
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: GetLocaleInfoW, 0_2_00007FF720B739E8
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: GetLocaleInfoW, 0_2_00007FF720B7BA08
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 0_2_00007FF720B7B958
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 0_2_00007FF720B7BB34
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW, 0_2_00007FF720B7B100
Source: C:\Users\user\Desktop\J5kltefeTK.exe Code function: 0_2_00007FF720B60DA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00007FF720B60DA0
Source: C:\Users\user\Desktop\J5kltefeTK.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Users\user\Desktop\J5kltefeTK.exe Registry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Blob Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs