Summary | ZeroBOX

jf.exe

CoinMiner Generic Malware Malicious Library Malicious Packer Downloader Confuser .NET UPX HTTP DNS ScreenShot Create Service Internet API Socket DGA Hijack Network Http API persistence Escalate priviledges Code injection PWS Sniff Audio Steal credential
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 4, 2024, 1:25 p.m. Aug. 4, 2024, 1:39 p.m.
Size 449.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 d161e13cf0731d0b55ad38d6a38cdc21
SHA256 847e71dbcd3917dad9ebc1ad63d497c3257acfeb47164f61423846e1c5dab272
CRC32 13BCC298
ssdeep 12288:Dkq5oiAasoIqnylPWE8Bgq0VxR9H4kIeguM:DkDiAalPnxtKDfg
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
qbuniplugin.html5.qq.com 43.135.106.117
p0.qhimg.com 54.192.175.113
game.kde.qq.com 129.226.103.24
aegis.qq.com 43.137.221.145
www.baidu.com 119.63.197.139
api.bilibili.com 164.52.44.50
live.bilibili.com 164.52.47.54
pcwup.imtt.qq.com 14.22.9.100
wn.pos.baidu.com 182.61.200.11
dns.google 8.8.4.4
dgss0.bdstatic.com 45.113.192.82
ss0.baidu.com 185.10.104.109
live-s3m.mediav.com 111.174.12.100
ssxd.mediav.com 112.65.69.51
hw-v2-web-player-tracker.biliapi.net 101.91.136.148
b60ec859c86b068d2351ce983cebdb01.rdt.tfogc.com 175.4.55.182
b33fca1920f4832d8e3dfbf4c7432b50.rdt.tfogc.com 113.141.160.48
pcupd.com 139.196.217.38
46accc8a55ff111839e2072af218a509.rdt.tfogc.com 183.214.144.4
hotlist.imtt.qq.com 43.154.240.245
xy120x209x212x19xy.mcdn.bilivideo.cn 120.209.212.19
s1.mdvdns.com 112.65.69.52
hm.baidu.com 111.45.3.198
cpro.baidustatic.com 220.169.152.38
r3---sn-j5o7dn7e.gvt1-cn.com 113.108.239.196
mbd.baidu.com 103.235.47.212
www.google.com 142.250.76.132
rpt.gdt.qq.com 43.159.118.117
optimizationguide-pa.googleapis.com 172.217.161.234
novel.html5.qq.com 129.226.107.80
sc0.hao123img.com 58.254.180.65
9d215ea2cab88371652c1ef094554b8f.rdt.tfogc.com 183.214.144.2
snowflake.qq.com 43.129.2.170
wup.imtt.qq.com 43.154.240.161
cm.bilibili.com 164.52.47.54
max-l.mediav.com 180.163.247.134
sofire.baidu.com 36.110.192.107
jx.cdn.qhstatic.com 104.192.108.192
dhrest.2345.com 180.163.196.140
www.bilibili.com 164.52.44.50
adsmind.gdtimg.com 211.152.132.216
v.qq.com 23.7.212.166
imgcdn.toutiaoyule.com 111.47.229.228
puui.qpic.cn 23.210.247.59
st.tencent-cloud.com 211.152.132.216
dhps.2345.com 180.163.203.99
static.res.qq.com 36.250.242.247
183ac55a26eb8ed3211e476f89a40d34.rdt.tfogc.com 111.4.66.14
dhrest-static.2345.com 180.163.147.217
m4.publicimg.browser.qq.com 43.152.15.45
www.2345.com 163.181.22.236
cdn.nfa.qq.com 42.177.83.82
gss0.bdstatic.com 45.113.192.82
arms-retcode.aliyuncs.com 47.96.83.41
ckmap.mediav.com 180.163.247.134
bd-js1.2345.com 112.25.90.131
35d956a39c11b2a14f588d401b8eb2ea.rdt.tfogc.com 183.95.181.108
mc.minibai.com 118.24.85.16
6252cfceac8fd2546906f4522c07fff2.rdt.tfogc.com 219.144.77.71
d9bfba694e0c428248140c78286d3793.rdt.tfogc.com 58.19.46.75
h.trace.qq.com 129.226.102.234
lupic.cdn.bcebos.com 60.188.66.35
f7.baidu.com 103.235.45.243
hector.baidu.com 39.156.68.81
xy117x158x188x37xy.mcdn.bilivideo.cn 117.158.188.37
i2.hdslb.com 122.10.154.135
www-cdn.2345cdn.net 180.163.207.108
otheve.beacon.qq.com 129.226.106.210
ss1.baidu.com 185.10.104.109
v.gdt.qq.com 43.159.118.117
s3m4.fenxi.com 175.6.254.74
7b42f7424e8c39d30019cf95ef41ef02.rdt.tfogc.com 175.4.55.179
cn-sccd-cu-01-09.bilivideo.com 101.206.209.10
www.aliyunpay.shop 118.178.125.54
daohang.qq.com 43.154.240.84
hectorstatic.baidu.com 113.142.207.38
vr.gdt.qq.com 43.159.118.117
tv.puui.qpic.cn 38.60.181.35
daohang.browser.qq.com 43.154.240.84
ca8ac9a6f86c4d42a7e731d17aa125db.rdt.tfogc.com 113.141.160.228
web.50bangzh.com 180.101.190.124
pos.baidu.com 103.235.46.94
pbaccess.video.qq.com 43.155.124.103
content-autofill.googleapis.com 142.250.206.202
www.591888.vip 38.147.189.238
oth.str.beacon.qq.com 14.22.9.180
www.aliyunpay.shop 118.178.125.54
pss.bdstatic.com 103.235.45.242
newtab.browser.qq.com 43.135.106.42
bdb4e1d1d90392c080815d268dfe7f87.rdt.tfogc.com 183.214.52.52
dss2.bdstatic.com 185.10.104.109
search.sogoucdn.com 43.159.81.60
0a0a389bc8b2293cdc7b734e9cf84e2f.rdt.tfogc.com 113.141.160.198
accounts.google.com 64.233.188.84
vfiles.gtimg.cn 211.152.132.216
beacon.cdn.qq.com 211.152.132.208
index-api.2345.com 180.101.190.124
vd6.l.qq.com 129.226.107.33
t12.baidu.com 111.225.213.36
sfp.safe.baidu.com 36.110.219.204
pb.sogou.com 36.155.166.212
data.ab.qq.com 43.154.254.142
s3m6.mdvdns.com 104.192.108.23
api.live.bilibili.com 164.52.47.54
as1.m.hao123.com 42.81.8.130
code.bdstatic.com 103.235.45.242
ipsad.l.qq.com 43.129.2.69
6ad41852c351bbdf31590130781c1f5c.rdt.tfogc.com 175.153.180.110
passport-plugin.hao184.com 61.170.80.232
sapi-wzdh.2345.com 47.102.123.53
publiclog.zhiyan.tencent-cloud.net 121.14.77.149
zj-cn-live-comet.chat.bilibili.com 47.103.12.10
b.bdstatic.com 117.68.52.48
256c3d9bfaf9b50b26a3007eed50f82a.rdt.tfogc.com 111.4.66.8
passport.baidu.com 45.113.194.250
www-stream.2345cdn.net 163.181.22.205
checkip.amazonaws.com 52.221.143.66
clientservices.googleapis.com 142.250.198.3
www.hao123.com 103.235.46.98
hmcdn.baidu.com 124.239.243.48
eclick.baidu.com 111.206.208.190
kde.qq.com 129.226.103.169
i.news.qq.com 38.60.181.105
topnews.imtt.qq.com 101.32.212.153
quickstart.imtt.qq.com 129.226.103.233
3924a2b0e8a2c4ef0b5b941a5d29f50f.rdt.tfogc.com 183.214.52.49
430df5a0d910a183ce55ba9aa34a065f.rdt.tfogc.com 111.4.66.17
data.bilibili.com 164.52.0.98
trpcpb.imtt.qq.com 129.226.107.205
ltscsy.qq.com 116.162.208.149
pcbrowser.dd.qq.com 111.3.90.95
iwan.video.qq.com 124.156.190.80
webrtcpunch.video.qq.com 119.147.179.227
www.hao774.com 61.170.79.225
apd-ugcvlive.apdcdn.tc.qq.com 211.152.132.216
config.ab.qq.com 43.159.234.88
b0218760c889395ec69a3305b7ab05fa.rdt.tfogc.com 183.214.52.58
sofire.bdstatic.com 60.190.116.48
s3m6.fenxi.com 61.170.81.233
www.sogou.com 119.28.109.132
IP Address Status Action
116.62.214.53 Active Moloch
118.178.125.54 Active Moloch
118.24.85.16 Active Moloch
124.223.105.161 Active Moloch
139.196.217.38 Active Moloch
164.124.101.2 Active Moloch
18.138.132.100 Active Moloch
38.147.189.238 Active Moloch
47.96.87.99 Active Moloch
47.97.204.105 Active Moloch
47.98.133.194 Active Moloch
60.12.184.62 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49183 -> 118.24.85.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 124.223.105.161:8902 2027262 ET INFO Dotted Quad Host ZIP Request Potentially Bad Traffic
TCP 192.168.56.101:49166 -> 124.223.105.161:8902 2027262 ET INFO Dotted Quad Host ZIP Request Potentially Bad Traffic
TCP 192.168.56.101:49196 -> 18.138.132.100:443 2054155 ET INFO Observed External IP Lookup Domain (checkip .amazonaws .com) in TLS SNI Device Retrieving External IP Address Detected
TCP 192.168.56.101:49196 -> 18.138.132.100:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49196 -> 18.138.132.100:443 2054155 ET INFO Observed External IP Lookup Domain (checkip .amazonaws .com) in TLS SNI Device Retrieving External IP Address Detected
UDP 192.168.56.101:55146 -> 164.124.101.2:53 2054140 ET INFO External IP Lookup Domain in DNS Lookup (checkip .amazonaws .com) Device Retrieving External IP Address Detected
UDP 192.168.56.101:60411 -> 164.124.101.2:53 2052580 ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com) Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49183
118.24.85.16:443
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 CN=*.minibai.com 40:08:fa:f7:f6:1a:17:0c:aa:c1:99:5b:de:37:59:0c:0e:41:db:cd
TLSv1
192.168.56.101:49196
18.138.132.100:443
C=US, O=Amazon, CN=Amazon RSA 2048 M03 CN=checkip.amazonaws.com 3b:5d:c1:80:5a:4e:53:16:ce:0b:31:80:0c:26:91:07:c7:5b:0d:d0

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: exist C:\Windows\Temp\drsx\svchosi.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "" C:\Windows\Temp\drsx\svchosi.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: exist C:\Windows\Temp\drsx\svchosl.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "" C:\Windows\Temp\drsx\svchosl.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: net
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: stop xbbrowser_service
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: net
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: stop xblanupdate_svc
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: rd/s/q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Program Files (x86)\mxbbrowser"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: ping
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: -n 3 127.0.0.1
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: nul
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: nul
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: exist C:\Windows\Temp\drsx\svchoxb.exe
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: "" C:\Windows\Temp\drsx\svchoxb.exe
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\Temp\drsx\hl.bat
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: The batch file cannot be found.
console_handle: 0x000000000000000f
1 1 0

WriteConsoleW

buffer: The service name is invalid.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: More help is available by typing NET HELPMSG 2185.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: The service name is invalid.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: More help is available by typing NET HELPMSG 2185.
console_handle: 0x000000000000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 232
port: 0
1 0 0

listen

socket: 232
backlog: 1
1 0 0

accept

ip_address:
socket: 232
port: 0
1 240 0

bind

ip_address: 127.0.0.1
socket: 232
port: 0
1 0 0

listen

socket: 232
backlog: 1
1 0 0

accept

ip_address:
socket: 232
port: 0
1 248 0

bind

ip_address: 0.0.0.0
socket: 236
port: 0
1 0 0

bind

ip_address: 0.0.0.0
socket: 740
port: 0
1 0 0
suspicious_features GET method with no useragent header suspicious_request GET http://pcupd.com/tfsoft/xftd/v2/ctf/
suspicious_features POST method with no referer header suspicious_request POST https://mc.minibai.com/api/gv1/push
request GET http://pcupd.com/tfsoft/xftd/v2/ctf/
request POST https://mc.minibai.com/api/gv1/push
request GET https://checkip.amazonaws.com/
request POST https://mc.minibai.com/api/gv1/push
ip 116.62.214.53
ip 118.178.125.54
ip 124.223.105.161
ip 38.147.189.238
ip 47.96.87.99
ip 47.97.204.105
ip 47.98.133.194
ip 60.12.184.62
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106b84 size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00106ff0 size 0x00000076
name RT_VERSION language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0010706c size 0x00000350
domain checkip.amazonaws.com
file C:\Windows\Temp\drsx\hl.bat
file C:\Windows\Temp\drsx\svchoxb.exe
file C:\Windows\Temp\drsx\sf.dll
file C:\Windows\Temp\drsx\svchosi.exe
file C:\Windows\Temp\drsx\svchosl.exe
cmdline C:\Windows\System32\cmd.exe /c del C:\Windows\Temp\drsx\svchosi.exe >> NUL
cmdline "C:\Windows\system32\cmd.exe" /c del C:\Windows\Temp\drsx\svchosi.exe >> NUL
wmi SELECT * FROM Win32_IP4RouteTable
wmi SELECT * FROM Win32_NetworkAdapterConfiguration
wmi SELECT * FROM Win32_PhysicalMemory
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\system32\cmd.exe
parameters: /c del C:\Windows\Temp\drsx\svchosi.exe >> NUL
filepath: C:\Windows\System32\cmd.exe
1 1 0
section {u'size_of_data': u'0x00062800', u'virtual_address': u'0x00097000', u'entropy': 7.932912008549378, u'name': u'UPX1', u'virtual_size': u'0x00063000'} entropy 7.93291200855 description A section with a high entropy has been found
entropy 0.878483835006 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeCreateGlobalPrivilege
1 1 0
url http://crl.comodo.net/TrustedCertificateServices.crl0
url http://users.ocsp.d-trust.net03
url http://crl.ssc.lt/root-b/cacrl.crl0
url http://crl.securetrust.com/STCA.crl0
url http://crl.securetrust.com/SGCA.crl0
url http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0=
url http://www.ssc.lt/cps03
url http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
url http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAII.crl0
url http://www.digsigtrust.com/DST_TRUST_CPS_v990701.html0
url http://www.microsoft.com/pki/certs/TrustListPCA.crt0
url https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
url http://www.pkioverheid.nl/policies/root-policy0
url http://cps.chambersign.org/cps/chambersroot.html0
url http://www.e-szigno.hu/SZSZ/0
url http://www.entrust.net/CRL/Client1.crl0
url http://crl.chambersign.org/publicnotaryroot.crl0
url http://crl.comodo.net/AAACertificateServices.crl0
url http://www.certplus.com/CRL/class3.crl0
url http://logo.verisign.com/vslogo.gif0
url http://www.acabogacia.org/doc0
url http://www.disig.sk/ca/crl/ca_disig.crl0
url https://www.catcert.net/verarrel
url http://www.microsoft.com/schemas/ie8tldlistdescription/1.0
url http://www.sk.ee/cps/0
url http://www.quovadis.bm0
url https://www.catcert.net/verarrel05
url http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0
url http://crl.chambersign.org/chambersroot.crl0
url http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0
url http://crl.globalsign.net/root-r2.crl0
url http://certificates.starfieldtech.com/repository/1604
url http://www.d-trust.net0
url http://pki-root.ecertpki.cl/CertEnroll/E-CERT%20ROOT%20CA.crl0
url http://crl.ssc.lt/root-a/cacrl.crl0
url http://crl.usertrust.com/UTN-DATACorpSGC.crl0
url http://www.certicamara.com/certicamaraca.crl0
url http://www.d-trust.net/crl/d-trust_root_class_2_ca_2007.crl0
url http://crl.usertrust.com/UTN-USERFirst-Object.crl0)
url http://www.post.trust.ie/reposit/cps.html0
url http://www.d-trust.net/crl/d-trust_qualified_root_ca_1_2007_pn.crl0
url http://www2.public-trust.com/crl/ct/ctroot.crl0
url http://www.certicamara.com0
url http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
url http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
url http://www.comsign.co.il/cps0
url http://crl.usertrust.com/UTN-USERFirst-NetworkApplications.crl0
url http://www.microsoft.com/pki/crl/products/TrustListPCA.crl
url http://acraiz.icpbrasil.gov.br/LCRacraiz.crl0
url http://www.signatur.rtr.at/de/directory/cps.html0
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Hijack network configuration rule Hijack_Network
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Install itself for autorun at Windows startup rule Persistence
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
cmdline net stop xblanupdate_svc
cmdline ping -n 3 127.0.0.1
cmdline net stop xbbrowser_service
cmdline C:\Windows\System32\cmd.exe /c del C:\Windows\Temp\drsx\svchosi.exe >> NUL
cmdline "C:\Windows\system32\cmd.exe" /c del C:\Windows\Temp\drsx\svchosi.exe >> NUL
wmi SELECT * FROM Win32_PhysicalMemory
wmi SELECT * FROM Win32_NetworkAdapterConfiguration
buffer Buffer with sha1: fa2dd7cb64847733f417736d51e7a775659df7fa
host 116.62.214.53
host 124.223.105.161
host 47.96.87.99
host 47.97.204.105
host 47.98.133.194
host 60.12.184.62
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1284
region_size: 397312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00820000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0x00000168
1 0 0
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000002b4
regkey_r: ProxyEnable
reg_type: 4 (REG_DWORD)
value: 0
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
1 0 0
file C:\Windows\Temp\drsx\svchosi.exe
file C:\Windows\Temp\drsx\svchosl.exe
file C:\Windows\Temp\drsx\svchoxb.exe
Process injection Process 2728 manipulating memory of non-child process 1284
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1284
region_size: 397312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00820000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0x00000168
1 0 0
Process injection Process 2728 injected into non-child 1284
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: U‹ììă¥Pÿÿÿj…TÿÿÿPèGjNXf‰…<ÿÿÿjtXf‰…>ÿÿÿjdXf‰…@ÿÿÿjlXf‰…BÿÿÿjlXf‰…Dÿÿÿj.Xf‰…FÿÿÿjdXf‰…HÿÿÿjlXf‰…JÿÿÿjlXf‰…Lÿÿÿ3Àf‰…Nÿÿÿ…<ÿÿÿP蘉Eôƒ}u3ÀéÄÆE¤LÆE¥dÆE¦rÆE§GÆE¨eÆE©tÆEªPÆE«rÆE¬oÆE­cÆE®eÆE¯dÆE°uÆE±rÆE²eÆE³AÆE´dÆEµdÆE¶rÆE·eÆE¸sÆE¹sÆEºjXf‰EøjXf‰EúE¤‰Eü…TÿÿÿPjEøPÿuôèBƒ½Tÿÿÿu DžTÿÿÿ– ÆEèLÆEédÆEêrÆEëLÆEìoÆEíaÆEîdÆEïDÆEðlÆEñlÆEòj Xf‰Eøj Xf‰EúEè‰Eü…\ÿÿÿPjEøPÿuôÿ•Tÿÿÿ‹EŠ@$¶À…Àu'…PÿÿÿP‹Eÿpjjÿ•\ÿÿÿ‹M‰‹…Pÿÿÿé ÆEŒNÆEtÆEŽAÆElÆElÆE‘oÆE’cÆE“aÆE”tÆE•eÆE–VÆE—iÆE˜rÆE™tÆEšuÆE›aÆEœlÆEMÆEžeÆEŸmÆE oÆE¡rÆE¢yÆE£jXf‰EøjXf‰EúEŒ‰Eü…XÿÿÿPjEøPÿuôÿ•TÿÿÿÆEÔRÆEÕtÆEÖlÆE×IÆEØnÆEÙiÆEÚtÆEÛAÆEÜnÆEÝsÆEÞiÆEßSÆEàtÆEárÆEâiÆEãnÆEägÆEåjXf‰EøjXf‰EúEԉEü…`ÿÿÿPjEøPÿuôÿ•TÿÿÿƅlÿÿÿRƅmÿÿÿtƅnÿÿÿlƅoÿÿÿAƅpÿÿÿnƅqÿÿÿsƅrÿÿÿiƅsÿÿÿSƅtÿÿÿtƅuÿÿÿrƅvÿÿÿiƅwÿÿÿnƅxÿÿÿgƅyÿÿÿTƅzÿÿÿoƅ{ÿÿÿUƅ|ÿÿÿnƅ}ÿÿÿiƅ~ÿÿÿcƅÿÿÿoÆE€dÆEeÆE‚SÆEƒtÆE„rÆE…iÆE†nÆE‡gÆEˆjXf‰EøjXf‰Eú…lÿÿÿ‰Eü…dÿÿÿPjEøPÿuôÿ•TÿÿÿÆE¼RÆE½tÆE¾lÆE¿FÆEÀrÆEÁeÆEÂeÆEÃUÆEÄnÆEÅiÆEÆcÆEÇoÆEÈdÆEÉeÆEÊSÆEËtÆEÌrÆEÍiÆEÎnÆEÏgÆEÐjXf‰EøjXf‰EúE¼‰Eü…hÿÿÿPjEøPÿuôÿ•Tÿÿÿƒ½Tÿÿÿt-ƒ½Xÿÿÿt$ƒ½\ÿÿÿtƒ½`ÿÿÿtƒ½dÿÿÿt ƒ½hÿÿÿu3À덅TÿÿÿPÿuè–ÉÂU‹ìQƒ}t ƒeüë‹Eü@‰Eü‹Eü;E } ‹EEüÆëæÉÂU‹ì‹M‹E +ÈSŠŠ@„Ût:Útò¶Ê¶Ã+Áë¶Â÷Ø[]ÂU‹ìS‹] VW‹M·1ƒÁ‹Æ‰MH¿ƒÀ ·Ðfƒù‹Æ·3GЍ[‹Æ·úH¾ƒÀ ·Ðfƒù‹ÆGзÂf…ÿt f;øt¶‹È‹Ç+Áë÷Ø_^[]ÂU‹ìd¡0VW…Àt#‹@ …Àtx ‹7ëÿuÿv0ètÿÿÿ…Àt‹6;÷uë3À_^]‹FëõU‹ìSV‹uW…öt}‹M …Étvƒ}tp¸MZf9uf‹F<<0PEuZ‹\0x…ÛtR‹D3 3ÿƉE9|3vA‹I‰M ‹¸ÆPQèÔþÿÿ…Àt‹EG‹M ;|3rãë‹D3$x· 0‹D3ˆ‹M‹0Ɖ_^3À[]ÂU‹ìƒìD‹MV3öWƒy @‹y‰}ä‰uø‰uü†´…ÿ„¬¸MZf9…žS‹_<‰]ðƒø9A ‚‡<;PE…zf‹D;¹ f#Áf;Á…d¸àf9D;…T·D;3҉E؅Àt)ˋu‹A;F ‹uø‡*·D;BƒÁ(;Ð|ߋL;83ҋD;TH‰MèÁ÷ñ‹È·D;¯Mè…Àt;·‹}Øó‹]è‹Fø9O3ÒHv(FÔÃ÷ó¯Ã;ÈMÁ‹Èƒïu܋uø‹}ä‹]ð…É„¹j@hEì‰MìPjEüP‹E jÿÿP‹uü‰uø…ö„·L;3ҋÁ‰MÜkÀ(D;T‰E؅À~‹ÈŠ:ˆ2B‹uü;Ñ|ò·D;‰uøë‹EÜ3É3҉Mèf;ÐsT—ӋBü…Àt2ƒ:t-ƒeØƃ:‰EÜv‹]؋ð‹B ;Šˆ3C;rï‹uü‹]ð‹Mè·D;AƒÂ(‰Mè;È|·‰uø‹„; …À„©ƒ¼;¤†›‹Î3Ò+L;4‰M̍ 0‹A‰Eô‹‰Uè‰MàEô„v‹}ô¾ðÇEÜ0ÇEØ A‰EԍGøÑèj‰EÐ[t*‹}ԋÈf‹Æf#_f;EÜtf;EØuBƒÇC;Ù|ä‹Mà‹}ô‰UèωMà‹y‹‰}ôÇu²‹uø‹}ä‹]ð…Ò„ƒeø•j@‰EìEìhPjEøP‹E jÿÿP‹Eø‹uü‰Eô…À„É‹Œ; ΋‹Q„³‹}ôBøÑèj‰EÔX‰Eà„Š·DA‹Ðâðf;UÜtf;UØu^ƒeô%ÿ‹UèƅÒ~‹]ô‹Ÿ…Û‰]Ћ]ðt 9EÐt5ÿEô9Uô|ã‹UÌ3ҋ}è…ÿ~‹uø‰uôƒ<–t B;×|õ‹}ô뉖‹}ø‹uü‹Eà@‰Eà;EÔŒyÿÿÿ‹Qʋ‹QÂ…Sÿÿÿ‹}䋄;€…À„1 0‹Q ‰Mô…Ò„í‹AƉE؋…ÀtÆë‹E؃eð‰Eä2‹u PEÄPÿV jEÄPE¼PÿVEðPE¼PjjÿVE¼PÿV‹Mð…É„Å‹uäƒe܋…Àtzƒeàƒeè…Ày·À…À„¡UèRP‹E jQÿë+‹uüƒÀÆ„‡‹u PEÄPÿV EèPjEÄPÿuðÿ‹uä‹Eè…Àt`‹Mà‹U؉ ‹UÜB‰UÜÁâ‰Uà‹…Àt‹Mð늋Mô‹uüƒÁéÿÿÿ‹D;(‰t;4‹]EüjjÿuüÇnÿÐöCt h8ÿuüè›ùÿÿ‹uü[_‹Æ^ÉÂ
base_address: 0x0087f600
process_identifier: 1284
process_handle: 0x00000168
1 1 0

WriteProcessMemory

buffer: ‚ö
base_address: 0x008800d6
process_identifier: 1284
process_handle: 0x00000168
1 1 0
Process injection Process 2660 resumed a thread in remote process 2728
Process injection Process 2660 resumed a thread in remote process 2804
Process injection Process 2660 resumed a thread in remote process 1384
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 2728
1 0 0

NtResumeThread

thread_handle: 0x0000000000000068
suspend_count: 0
process_identifier: 2804
1 0 0

NtResumeThread

thread_handle: 0x0000000000000074
suspend_count: 0
process_identifier: 1384
1 0 0
mutex Sandboxie_SingleInstanceMutex_Control
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Reconyc.4!c
Elastic malicious (moderate confidence)
Cynet Malicious (score: 99)
ALYac Trojan.GenericKD.72181802
Cylance Unsafe
VIPRE Trojan.GenericKD.72181802
Sangfor Trojan.Win32.Reconyc.Vq9f
BitDefender Trojan.GenericKD.72181802
Cybereason malicious.cf0731
Arcabit Trojan.Generic.D44D682A
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Generik.FWHPHXK
APEX Malicious
Avast Win64:DropperX-gen [Drp]
Kaspersky Trojan.Win32.Reconyc.pofo
MicroWorld-eScan Trojan.GenericKD.72181802
Rising Trojan.Reconyc!8.153 (CLOUD)
Emsisoft Trojan.GenericKD.72181802 (B)
F-Secure Trojan.TR/Reconyc.thiwi
DrWeb Trojan.Siggen28.118
Zillya Trojan.Fsysna.Win32.66696
TrendMicro TROJ_GEN.R002C0XD524
McAfeeD ti!847E71DBCD39
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.d161e13cf0731d0b
Sophos Mal/Generic-S
Ikarus Trojan.SuspectCRC
Google Detected
Avira TR/Reconyc.thiwi
Antiy-AVL Trojan/Win32.Reconyc
Kingsoft malware.kb.b.789
Microsoft Trojan:Win32/Casdet!rfn
ZoneAlarm Trojan.Win32.Reconyc.pofo
GData Trojan.GenericKD.72181802
AhnLab-V3 Downloader/Win.Powershell.C5655683
DeepInstinct MALICIOUS
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002C0XD524
Tencent Malware.Win32.Gencirc.1409c951
Yandex Trojan.Reconyc!3MDrTkzBlgA
MAX malware (ai score=82)
Fortinet W32/PossibleThreat
AVG Win64:DropperX-gen [Drp]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_90% (W)
alibabacloud Trojan:Win/Reconyc.pofo