Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender real time protection (registry)
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Schedule system process
Sigma detected: Stop EventLog
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Windows Service Tampering
Sigma detected: System File Execution Location Anomaly
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Unusual module load detection (module proxying)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1861913
Sample:
loader.exe
Startdate:
02/02/2026
Architecture:
WINDOWS
Score:
100
97
pastebin.com
2->97
99
bore.pub
2->99
101
pool.hashvault.pro
2->101
109
Found malware configuration
2->109
111
Malicious sample detected
(through community Yara
rule)
2->111
113
Multi AV Scanner detection
for submitted file
2->113
117
18 other signatures
2->117
10
loader.exe
4
2->10
started
14
pniwpwjwqkyw.exe
2->14
started
16
svchost.exe
2->16
injected
18
3 other processes
2->18
signatures3
115
Connects to a pastebin
service (likely for
C&C)
97->115
process4
file5
87
C:\Users\user\AppData\Local\...\svchost.exe, PE32+
10->87
dropped
89
C:\Users\user\AppData\...\Client-built.exe, PE32
10->89
dropped
91
C:\Users\user\AppData\...\loader.exe.log, CSV
10->91
dropped
163
Drops PE files with
benign system names
10->163
20
svchost.exe
1
2
10->20
started
24
Client-built.exe
1
5
10->24
started
93
C:\Windows\Temp\dvjenxntephj.sys, PE32+
14->93
dropped
165
Antivirus detection
for dropped file
14->165
167
Multi AV Scanner detection
for dropped file
14->167
169
Modifies the context
of a thread in another
process (thread injection)
14->169
173
3 other signatures
14->173
26
dialer.exe
14->26
started
28
dialer.exe
14->28
started
31
powershell.exe
14->31
started
37
6 other processes
14->37
171
Unusual module load
detection (module proxying)
16->171
33
consent.exe
16->33
started
35
svchost.exe
16->35
started
signatures6
process7
dnsIp8
83
C:\ProgramData\...\pniwpwjwqkyw.exe, PE32+
20->83
dropped
119
Antivirus detection
for dropped file
20->119
121
Multi AV Scanner detection
for dropped file
20->121
123
Uses powercfg.exe to
modify the power settings
20->123
139
3 other signatures
20->139
39
dialer.exe
20->39
started
42
powershell.exe
20->42
started
44
cmd.exe
20->44
started
54
8 other processes
20->54
85
C:\Users\user\AppData\Roaming\...\svchost.exe, PE32
24->85
dropped
125
Creates an undocumented
autostart registry key
24->125
127
Uses schtasks.exe or
at.exe to add and modify
task schedules
24->127
141
2 other signatures
24->141
46
svchost.exe
8
24->46
started
50
schtasks.exe
1
24->50
started
129
Injects code into the
Windows Explorer (explorer.exe)
26->129
131
Writes to foreign memory
regions
26->131
143
3 other signatures
26->143
56
2 other processes
26->56
103
185.84.98.85, 443, 49698
COLTENGINECOLTENGINENetworkIT
Italy
28->103
133
Query firmware table
information (likely
to detect VMs)
28->133
135
Found strings related
to Crypto-Mining
28->135
137
Loading BitLocker PowerShell
Module
31->137
52
conhost.exe
31->52
started
58
6 other processes
37->58
file9
signatures10
process11
dnsIp12
145
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->145
147
Contains functionality
to inject code into
remote processes
39->147
149
Writes to foreign memory
regions
39->149
159
5 other signatures
39->159
60
lsass.exe
39->60
injected
63
winlogon.exe
39->63
injected
73
2 other processes
39->73
151
Loading BitLocker PowerShell
Module
42->151
65
conhost.exe
42->65
started
75
2 other processes
44->75
105
bore.pub
159.223.171.199, 37020, 49696, 49699
CELANESE-US
United States
46->105
107
pastebin.com
172.66.171.73, 443, 49694
CLOUDFLARENETUS
United States
46->107
95
C:\Program Files\PulsarX AV\PulsarXAV.exe, PE32
46->95
dropped
153
Antivirus detection
for dropped file
46->153
155
System process connects
to network (likely due
to code injection or
exploit)
46->155
157
Multi AV Scanner detection
for dropped file
46->157
161
4 other signatures
46->161
67
powershell.exe
7
15
46->67
started
69
schtasks.exe
1
46->69
started
71
conhost.exe
50->71
started
77
8 other processes
54->77
file13
signatures14
process15
signatures16
175
Writes to foreign memory
regions
60->175
177
Unusual module load
detection (module proxying)
60->177
179
Changes security center
settings (notifications,
updates, antivirus,
firewall)
67->179
181
Disable Windows Defender
real time protection
(registry)
67->181
79
conhost.exe
67->79
started
81
conhost.exe
69->81
started
process17
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.