Classification:
rans.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
AI detected malicious Powershell script
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Delayed program exit found
Drops PE files with benign system names
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Unusual module load detection (module proxying)
Uses cmd line tools excessively to alter registry or file data
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
WScript reads language and country specific registry keys (likely country aware script)
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1868079
Sample:
0FNwde2oBz.exe
Startdate:
12/02/2026
Architecture:
WINDOWS
Score:
100
140
keyauth.win
2->140
142
geoplugin.net
2->142
144
discordapp.com
2->144
156
Suricata IDS alerts
for network traffic
2->156
158
Found malware configuration
2->158
160
Malicious sample detected
(through community Yara
rule)
2->160
162
22 other signatures
2->162
13
0FNwde2oBz.exe
2
5
2->13
started
17
rc7injection.exe
2->17
started
19
rc7injection.exe
2->19
started
21
11 other processes
2->21
signatures3
process4
dnsIp5
116
C:\Users\user\Desktop\RC7_UI.exe, PE32
13->116
dropped
118
C:\Users\user\AppData\...\rc7injection.exe, PE32+
13->118
dropped
128
2 other malicious files
13->128
dropped
192
Creates multiple autostart
registry keys
13->192
194
Bypasses PowerShell
execution policy
13->194
196
Adds a directory exclusion
to Windows Defender
13->196
24
RuntimeBroker.exe
13->24
started
29
rc7injection.exe
246
13->29
started
31
powershell.exe
23
13->31
started
33
RC7_UI.exe
2
13->33
started
120
C:\Users\user\AppData\...\win32trace.pyd, PE32+
17->120
dropped
122
C:\Users\user\AppData\Local\...\win32pdh.pyd, PE32+
17->122
dropped
124
C:\Users\user\AppData\...\win32event.pyd, PE32+
17->124
dropped
130
55 other malicious files
17->130
dropped
35
rc7injection.exe
17->35
started
126
C:\Users\user\AppData\...\win32trace.pyd, PE32+
19->126
dropped
132
57 other malicious files
19->132
dropped
37
rc7injection.exe
19->37
started
146
geoplugin.net
178.237.33.50
ATOM86-ASATOM86NL
Netherlands
21->146
198
Detected Remcos RAT
21->198
200
Changes security center
settings (notifications,
updates, antivirus,
firewall)
21->200
202
Writes to foreign memory
regions
21->202
204
Maps a DLL or memory
area into another process
21->204
39
svchost.exe
21->39
started
41
cmd.exe
21->41
started
43
4 other processes
21->43
file6
signatures7
process8
dnsIp9
148
64.89.163.7, 49741, 49746, 8888
DIXIE-NETUS
United States
24->148
100
C:\Users\user\AppData\Roaming\svchost.exe, PE32
24->100
dropped
102
C:\Users\user\AppData\Local\Temp\cmgcme.exe, PE32
24->102
dropped
104
C:\Users\user\...\python311.dll (copy), PE32+
24->104
dropped
112
117 other malicious files
24->112
dropped
172
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
24->172
174
Protects its processes
via BreakOnTermination
flag
24->174
176
Creates multiple autostart
registry keys
24->176
186
2 other signatures
24->186
45
cmgcme.exe
24->45
started
106
C:\Users\user\AppData\...\win32trace.pyd, PE32+
29->106
dropped
108
C:\Users\user\AppData\Local\...\win32pdh.pyd, PE32+
29->108
dropped
110
C:\Users\user\AppData\...\win32event.pyd, PE32+
29->110
dropped
114
55 other malicious files
29->114
dropped
49
rc7injection.exe
29->49
started
178
Loading BitLocker PowerShell
Module
31->178
52
conhost.exe
31->52
started
54
WmiPrvSE.exe
31->54
started
56
WerFault.exe
21
16
33->56
started
58
cmd.exe
35->58
started
180
Detected Remcos RAT
39->180
182
Unusual module load
detection (module proxying)
39->182
184
Uses cmd line tools
excessively to alter
registry or file data
41->184
62
2 other processes
41->62
60
conhost.exe
43->60
started
64
3 other processes
43->64
file10
signatures11
process12
dnsIp13
134
C:\ProgramData\Microsoft\runtimebroker.exe, PE32
45->134
dropped
136
C:\Users\user\AppData\Local\...\install.vbs, data
45->136
dropped
206
Detected Remcos RAT
45->206
208
Creates an undocumented
autostart registry key
45->208
210
Contains functionalty
to change the wallpaper
45->210
212
5 other signatures
45->212
66
wscript.exe
45->66
started
69
cmd.exe
45->69
started
138
discordapp.com
162.159.133.233, 443, 49740, 49743
CLOUDFLARENETUS
United States
49->138
71
cmd.exe
49->71
started
73
cmd.exe
49->73
started
75
conhost.exe
58->75
started
file14
signatures15
process16
signatures17
150
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
66->150
152
WScript reads language
and country specific
registry keys (likely
country aware script)
66->152
77
cmd.exe
66->77
started
154
Uses cmd line tools
excessively to alter
registry or file data
69->154
79
reg.exe
69->79
started
82
conhost.exe
69->82
started
84
conhost.exe
71->84
started
process18
signatures19
86
runtimebroker.exe
77->86
started
89
conhost.exe
77->89
started
214
Disables UAC (registry)
79->214
process20
signatures21
164
Antivirus detection
for dropped file
86->164
166
Detected Remcos RAT
86->166
168
Writes to foreign memory
regions
86->168
170
Maps a DLL or memory
area into another process
86->170
91
cmd.exe
86->91
started
94
iexplore.exe
86->94
started
process22
signatures23
188
Uses cmd line tools
excessively to alter
registry or file data
91->188
96
conhost.exe
91->96
started
98
reg.exe
91->98
started
190
Detected Remcos RAT
94->190
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.